Harmony Horizon Bridge and Lazarus APT Activities Revealed

SecurityAffairs recently shed light on a report by FireEye security researchers about the activities of the Harmony Horizon Bridge and Lazarus APTs. The report includes a new variant of the Bridge malware named “Ovorum”, as well as the TVShow malware in the context of the cyberespionage attacks of these groups. The report reveals that Harmony Horizon and Bridge are two different but related threat actors, because there are commonalities between the malware samples and evidence that suggests the same people could be behind it. Harmony Horizon is a North Korean-linked APT focused on collecting intelligence from South Korea and Japan by using spear-phishing techniques and “Living-off-the-Land” tactics to deploy their tools. FireEye researchers discovered that Oliviasn, a previous version of the Harmony Horizon malware, was the first sample found that was linked to the group. In addition, the researchers observed connections between the malware used by the Harmony Horizon group and the Bridge group, a set of hackers that specialize in developing advanced tools to monetize through cybercrime such as ransomware, data exfiltration, and fraud. The two groups share similar code patterns and appear to use the same toolset. The Bridge-linked malware was discovered as well. Two samples, Ovorum and TVShow, have been connected to the threat actors. Ovorum was used to collect information from the victim’s computer and exfiltrate large amounts of data, while TVShow was coded for specific targets and to take screenshots. The Lazarus APT is one of the best-known threat actor groups and is heavily involved in cyberespionage activities and computer network attack campaigns. The analysis of the newly discovered malware variants of Bridge and Harmony Horizon highlights the need for enterprises to be especially vigilant with their cybersecurity practices and implementing preventative measures. Organizations should deploy effective detection capabilities in their security programs and introduce countermeasures to monitor and protect themselves against malicious actors attempting to access their networks. Analysis of the malware samples used to target organizations should be conducted regularly to ensure that networks are secure. Companies should also be aware of the attack network of the Harmony Horizon Bridge and Lazarus APT, as well as the malware analysis and attack strategies used by the threat actors. All of these measures will help protect against targeted attacks and reduce risk of data theft.

This Cyber News was published on securityaffairs.com. Publication date: Thu, 26 Jan 2023 10:39:02 +0000


Cyber News related to Harmony Horizon Bridge and Lazarus APT Activities Revealed

Harmony Horizon Bridge and Lazarus APT Activities Revealed - SecurityAffairs recently shed light on a report by FireEye security researchers about the activities of the Harmony Horizon Bridge and Lazarus APTs. The report includes a new variant of the Bridge malware named “Ovorum”, as well as the TVShow ...
1 year ago Securityaffairs.com
Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus - In its continued efforts to crack down on North Korea's most formidable state-sponsored threat group, the US government has seized a virtual currency mixer that has been serving as the principal way the group launders money stolen from its ...
11 months ago Darkreading.com
Empower Cyber Security Defenses with Horizon IOC - Cyber security threats move fast, so having a robust and centralized solution for managing Indicators of Compromise is crucial. Check Point introduces Horizon IOC, an innovative platform designed to streamline IOC management across the enterprise. ...
11 months ago Blog.checkpoint.com
Lazarus hackers drop new RAT malware using 2-year-old Log4j bug - The new malware are two remote access trojans named NineRAT and DLRAT and a malware downloader named BottomLoader. The D programming language is rarely seen in cybercrime operations, so Lazarus probably chose it for new malware development to evade ...
11 months ago Bleepingcomputer.com
US seizes Sinbad crypto mixer used by North Korean Lazarus hackers - The U.S. Department of the Treasury has sanctioned the Sinbad cryptocurrency mixing service for its use as a money-laundering tool by the North Korean Lazarus hacking group. A cryptocurrency mixer is a server that allows people to deposit crypto, ...
11 months ago Bleepingcomputer.com
Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security - As we enter 2024, your organization may have unused MACC or Azure commit-to-consume credits as your annual renewal date draws near. Whether you have credits that will soon expire or are starting to plan your Azure spend for the next 12 months, Check ...
10 months ago Blog.checkpoint.com
What is an advanced persistent threat? - An advanced persistent threat is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period. APT attacks are initiated to steal highly sensitive data rather than cause damage to ...
11 months ago Techtarget.com
US Sanctions Sinbad Mixer: Disrupting Threats Unveiled - The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It's a virtual currency mixer utilized by the North Korea-linked Lazarus Group to launder funds obtained through ...
11 months ago Securityboulevard.com
CVE-2021-28671 - Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 ...
3 years ago
CVE-2021-28672 - Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 ...
3 years ago
CVE-2021-28673 - Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 ...
3 years ago
Is Your Organization Infected by Mobile Spyware? - The surge in mobile device usage within organizations has inevitably opened the floodgates to a new kind of cyber threat-mobile spyware. The growing dependence on mobile technology has made it imperative for organizations to recognize and mitigate ...
10 months ago Blog.checkpoint.com
Government Quash All Post Office Horizon Convictions - It comes after the government in July 2021 had promised to compensate those postmasters who had their Horizon-related convictions overturned. The Government said this week it has committed to making sure these convictions are overturned by the end of ...
10 months ago Silicon.co.uk
CVE-2024-26837 - In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before this change, generation of the list of MDB events to replay would race against the creation of new group ...
7 months ago Tenable.com
CVE-2021-47222 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
North Korean hackers exploit critical TeamCity flaw to breach networks - Microsoft says that the North Korean Lazarus and Andariel hacking groups are exploiting the CVE-2023-42793 flaw in TeamCity servers to deploy backdoor malware, likely to conduct software supply chain attacks. In September, TeamCity fixed a critical ...
11 months ago Bleepingcomputer.com
North Korean Hackers Developing Malware in Dlang Programming Language - The North Korea-linked hacking group Lazarus has been observed deploying Dlang malware in attacks against organizations in the manufacturing, agriculture, and physical security sectors, Cisco's Talos security researchers report. Released in 2001, ...
11 months ago Packetstormsecurity.com
North Korean Hackers Developing Malware in Dlang Programming Language - The North Korea-linked hacking group Lazarus has been observed deploying Dlang malware in attacks against organizations in the manufacturing, agriculture, and physical security sectors, Cisco's Talos security researchers report. Released in 2001, ...
11 months ago Securityweek.com
Leveraging a digital twin with machine learning to revitalize bridges - In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology to implement a repeatable solution for bridges that reduces the cost of bridge ...
10 months ago Feedpress.me
North Korea's state hackers stole $3 billion in crypto since 2017 - North Korean-backed state hackers have stolen an estimated $3 billion in a long string of hacks targeting the cryptocurrency industry over the last six years since January 2017. Kimsuky, Lazarus Group, Andariel, and other North Korean hacking groups ...
11 months ago Bleepingcomputer.com
US Treasury sanctions Sinbad cryptocurrency mixer used by North Korean hackers - The U.S. Treasury Department on Wednesday sanctioned a popular cryptocurrency mixer used to launder funds stolen by hackers connected to the North Korean government. The Treasury Department's Office of Foreign Assets Control announced new sanctions ...
11 months ago Therecord.media
North Korean Hackers' $12M Ethereum Laundering Via Tornado Cash Unveiled - It has been reported that North Korean hackers associated with the Lazarus Group have exploited Tornado Cash in a recent development to launder approximately $12 million worth of stolen Ethereum in the last 24 hours, using the coin mix-up service ...
8 months ago Cysecurity.news
UK, ROK sound alarm over North Korean supply chain attacks The Register - The national cybersecurity organizations of the UK and the Republic of Korea have issued a joint advisory warning of an increased volume and sophistication of North Korean software supply chain attacks. "In an increasingly digital and interconnected ...
11 months ago Theregister.com
CVE-2023-52578 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
Lazarus Group hackers appear to return to Tornado Cash for money laundering - North Korea's Lazarus hacking group allegedly has turned back to an old service in order to launder $23 million stolen during an attack in November. Investigators at blockchain research company Elliptic said on Friday that in the last day they had ...
8 months ago Therecord.media

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)