![]() |
Operation SyncHole: Lazarus APT goes back to the well - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: Security (https://www.geeks.fyi/forumdisplay.php?fid=68) +--- Forum: Security Vendors (https://www.geeks.fyi/forumdisplay.php?fid=87) +---- Forum: Kaspersky (https://www.geeks.fyi/forumdisplay.php?fid=90) +----- Forum: Kaspersky Security Blog (https://www.geeks.fyi/forumdisplay.php?fid=142) +----- Thread: Operation SyncHole: Lazarus APT goes back to the well (/showthread.php?tid=20819) |
Operation SyncHole: Lazarus APT goes back to the well - harlan4096 - 24 April 25 Quote:We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a sophisticated combination of a watering hole strategy and vulnerability exploitation within South Korean software. The campaign, dubbed “Operation SyncHole”, has impacted at least six organizations in South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, and we are confident that many more companies have actually been compromised. We immediately took action by communicating meaningful information to the Korea Internet & Security Agency (KrCERT/CC) for rapid action upon detection, and we have now confirmed that the software exploited in this campaign has all been updated to patched versions. |