Get a Pentest and security assessment of your IT network.

News

Operation Dream Job by Lazarus – JPCERT/CC Eyes

Torisma downloads and executes modules from external servers, and its infection spreads via malicious Word files. JPCERT/CC analysed Torisma samples are DLL files and executed as an argument of rundll32.exe. The malware’s configuration, communication protocol and modules are described in the following sections. Torisma uses encryption, downloading and executing modules and executing additional modules. They are provided in the code in the format in PEa format in the provided code as not, not PEa.”]

Source: https://blogs.jpcert.or.jp/en/2021/01/Lazarus_malware2.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks