Operation Blacksmith Detection: Lazarus APT Uses a CVE-2021-44228 Exploit to Deploy New DLang-Based Malware Strains

[post-views]
December 12, 2023 · 4 min read
Operation Blacksmith Detection: Lazarus APT Uses a CVE-2021-44228 Exploit to Deploy New DLang-Based Malware Strains

Adversaries set their eyes on a notorious security flaw in Log4j Java Library tracked as CVE-2021-44228, aka Log4Shell, even a couple of years after its disclosure. A new campaign dubbed “Operation Blacksmith” involves the exploitation of the Log4Shell vulnerability to deploy new malicious strains written in DLang, including novel RATs. The North Korean APT Lazarus Group is believed to be behind the newly discovered Operation Blacksmith. 

Detect Operation Blacksmith Activity Linked to Lazarus APT 

North Korean nation-backed APT groups continue to pose threats to global organizations in multiple industry sectors. The nefarious Lazarus Group which has gained recognition as a proficient and well-financed hacking collective, wreaking havoc since 2009, resurfaces in the latest Operation Blacksmith campaign. SOC Prime Platform equips defenders with curated detection algorithms to timely identify Lazarus intrusions in the latest campaign. Follow the link below to obtain Sigma rules mapped to MITRE ATT&CK®, enriched with tailored intel, and tailored for dozens of security analytics platforms.

Sigma rules to detect Operation Blacksmith campaign attributed to Lazarus APT

Also, security engineers can rely on detections to defend against attacks by Onyx Sleet aka Andariel APT, a North Korean state-sponsored sub-group operating under the Lazarus umbrella:

Sigma rules to detect attacks linked to Andariel APT

Sigma rules to detect attacks linked to Onyx Sleet 

Click Explore Detections to reach the entire detection stack for attacks linked to Lazarus and tagged accordingly. Dive into extensive metadata, including ATT&CK and CTI links, for streamlined threat research. Alternatively, drill down to curated detections to proactively defend against Hidden Cobra or APT38 attacks filtered by the custom tags based on the related actor attribution. 

Explore Detections

Operation Blacksmith Analysis: Insights into the Exploitation of CVE-2021-44228 to Deploy New Telegram-Based Malware

The nation-backed hacking collective Lazarus (aka APT38, Dark Seoul, or Hidden Cobra) from North Korea continues to weaponize the 2-year-old CVE-2021-44228 aka Log4Shell vulnerability for spreading three novel malware strains developed in the DLang programming language. These newly identified malware families include two previously unknown RATs called NineRAT and DLRAT, accompanied with a malicious downloader dubbed BottomLoader. The novel campaign discovered by Cisco Talos has come to the spotlight under the name “Operation Blacksmith” with manufacturing, agriculture, and the physical security sectors being the primary targets of attackers.

The attack chain starts with the successful exploitation of CVE-2021-44228 serving as the entry point to targeted servers. After gaining initial access, Lazarus conducts preliminary reconnaissance, which then paves the way for deploying a custom implant onto the compromised system. Afterward, Lazarus deploys HazyLoad, a proxy tool designed to create direct access to the compromised system, eliminating the need for recurrent exploitation of CVE-2021-44228. Hackers also establish an extra user account on the system, endowing it with admin privileges. Following the successful credential dumping, Lazarus proceeds to install NineRAT on the impacted systems. NineRAT is leveraging the Telegram API for C2 communication. The malware includes a dropper designed for creating persistence and initiating the primary binaries. The use of Telegram is highly likely used for detection evasion by leveraging a legitimate service for C2 communication.

The non-Telegram-based malware known as DLRAT enables Lazarus hackers to deploy additional payloads on compromised systems. Upon initial activation on a device, DLRAT performs predefined commands to collect basic system data, which is further sent to the C2 server.

The third malware employed in the Blacksmith Operation called BottomLoader is a DLang-based downloader intended for system reconnaissance that retrieves and runs payloads from a predefined URL through PowerShell. BottomLoader allows Lazarus APT to transfer files from the impacted system to the C2 server, enhancing operational flexibility.

Talos researchers have observed that over the past 18 months, Lazarus leveraged RATs developed via unconventional technologies, including QtFramework, PowerBasic, and, most recently, written in DLang.

Notably, Talos also tracks similarities between the most recent Lazarus campaign based on the observed adversary TTPs that are consistent with the North Korean state-sponsored group Onyx Sleet (aka PLUTIONIUM), also tracked as the Andariel APT group. The latter is commonly acknowledged as an APT sub-unit operating within the Lazarus umbrella.

Operation Blacksmith marks a significant change in the Lazarus Group’s TTPs, displaying the continuous evolution of the adversary toolkit employed by the malicious actors. Log in to SOC Prime Platform to gain access to 6,000+ pieces of content from the Threat Detection Marketplace repository to proactively detect existing and emerging APT attacks of any scale.

Table of Contents

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts