Connect with us
Lazarus Group attacks cybersecurity experts with the IDA Pro trojanized Lazarus Group attacks cybersecurity experts with the IDA Pro trojanized

Security

Lazarus Group attacks cybersecurity experts with the IDA Pro trojanized application

Published

on

The modified software allows you to access the system to steal files, take screenshots, and register keys.

North Korean cybercriminal group Lazarus Group is again launching attacks on cybersecurity researchers. This time hackers use a trojanized version of the popular reverse engineering application IDA Pro.

IDA Pro is an application that converts an executable file into assembly language, allowing researchers and programmers to analyze the operation of a program and detect potential errors. Security researchers typically use IDA to analyze legitimate software for vulnerabilities and malware, and to identify malicious behavior.

However, IDA Pro is an expensive application and some researchers download a pirated hacked version. As with any pirated software, there is always the risk of running malicious executables. This is exactly what ESET researcher Anton Cherepanov discovered in a pirated version of IDA Pro 7.5, distributed by the Lazarus hacker group.

The criminals injected two malicious DLLs (idahelp.dll and win_fw.dll) into the IDA Pro installer, which are launched when the program is installed. The win_fw.dll file creates a new task in the Windows Task Scheduler that launches the idahelper.dll program. Then idahelper.dll connects to devguardmap site[.]org and downloads the NukeSped remote access trojan. The Trojan allows attackers to gain access to the device to steal files, take screenshots, and register. “Based on the domain and the trojanized application, we linked the malware to the previously reported Lazarus Group activity. Google Threat Analysis Group and Microsoft “, – said the experts.

Click to comment

Leave a Reply

Your email address will not be published.

Electric Cars

Hackers hacked Tesla twice, for which they received 350 thousand dollars and Tesla Model 3

Published

on

Hackers hacked Tesla twice for which they received 350 thousand

As part of Pwn2Own’s Vancouver-based commercial vulnerability finding event, a French team called Synacktiv managed to hack into Tesla systems twice.

Hackers hacked Tesla twice, for which they received 350 thousand dollars and Tesla Model 3

On the first day, Synacktiv successfully performed a TOCTOU (Time-of-check to time-of-use) attack on the Tesla Gateway, and the group was rewarded with a $100,000 cash reward and a Tesla Model 3 car. And the next day hackers broke into the Tesla infotainment system, and received another 250 thousand dollars for this.

The Tesla cybersecurity team is already analyzing the actions of hackers in order to eliminate the vulnerabilities found with a firmware update.

Continue Reading

Security

Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

Published

on

Scissors undercut Windows 11 vulnerability reveals sensitive information from screenshots

A dangerous vulnerability has been discovered in one of the standard Windows 11 applications that could lead to the disclosure of sensitive information to the user. Moreover, at the moment the vulnerability is not closed and attackers can use it.

Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

Generated by the Midjourney neural network

We are talking about the application Snipping Tool (Scissors). The vulnerability, called aCropalypse, allows you to undo changes made by a user when editing a screenshot, including cropped or blurred parts that hide sensitive data.

When you edit a screenshot, you can save it with the same name as the original file by overwriting it. However, as it turns out, the Windows 11 Snipping Tool does not remove the original information from the file, but simply leaves it added at the end, which is usually invisible to users. With some trickery, a potential attacker can extract hidden information from a file and see what information has been edited.

As you can see, edited screenshots are usually much larger due to the inclusion of information from the original image.

Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

This is a pretty serious vulnerability. For example, if you share a screenshot of an order confirmation page on Amazon, it may contain an address, the same goes for credit card numbers and other sensitive data.

Continue Reading

Security

In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

Published

on

In 2018 Google had an AI ready for a ChatGPT style

In recent months, the ChatGPT chatbot has been on the news pages, and this has forced many companies to catch up with OpenAI. Among them are Microsoft, Google and a number of Chinese corporations. However, reportedly, the situation could be different.

In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

Generated by the Midjourney neural network

As early as 2018, Google is said to have had a natural language processing AI similar to ChatGPT. However, company executives closed the project, considering it too dangerous. One of the developers was research engineer Daniel De Freitas, and Noam Shazeer, a software engineer at Google, also contributed to the project.

The project was called Meena and was a chatbot that could talk about different topics. With him you could discuss TV shows, have discussions about philosophy and joke. At the same time, the developers believed that this technology could be added to the search engine, however, in the end, Google stopped development. The company said the bot did not meet its AI security standards.

Note that later, on the basis of these developments, the LaMDA chat bot was created, which flies into the basis of Bard. Thus, the development nevertheless reached the mass user, albeit with a great delay.

Continue Reading

Most Popular