Advertisement
AD

Main navigation

Advertisement
AD

Error message

Warning: Undefined array key 0 in amp_entity_view_alter() (line 156 of modules/contrib/amp/amp.module).
amp_entity_view_alter(Array, Object, Object) (Line: 545)
Drupal\Core\Extension\ModuleHandler->alter('node_view', Array, Object, Object) (Line: 304)
Drupal\Core\Entity\EntityViewBuilder->buildMultiple(Array) (Line: 238)
Drupal\Core\Entity\EntityViewBuilder->build(Array)
call_user_func_array(Array, Array) (Line: 111)
Drupal\Core\Render\Renderer->doTrustedCallback(Array, Array, 'Render #pre_render callbacks must be methods of a class that implements \Drupal\Core\Security\TrustedCallbackInterface or be an anonymous function. The callback was %s. See https://www.drupal.org/node/2966725', 'exception', 'Drupal\Core\Render\Element\RenderCallbackInterface') (Line: 788)
Drupal\Core\Render\Renderer->doCallback('#pre_render', Array, Array) (Line: 377)
Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
Drupal\Core\DrupalKernel->handle(Object) (Line: 18)

North Korean-Linked Lazarus Hacking Group Eyeing a Full Frontal Bitcoin Attack

Advertisement
Wed, 14/02/2018 - 9:24
North Korean-Linked Lazarus Hacking Group Eyeing a Full Frontal Bitcoin Attack
Cover image via U.Today
Read U.TODAY on
Google News

Lazarus Hacking group, which rose to prominence as the ones behind major cyber attacks involving the WannaCry ransomware outbreak, an $80 mln Bangladesh cyber bank heist and 2014's Sony Pictures hack is said to be resurfacing.

Advertisement

This time, however, after issuing ransoms in Bitcoin, the alleged North Korean-linked group is aiming to steal Bitcoin and also lay pathways for future reconnaissance into major banks.

There have been noticeable phishing campaigns which aim to input malware on the systems of global financial organizations as well as Bitcoin users.

Noted by McAfee

The alert was rung by McAfee Advanced Threat Research (ATR) analysts which dubbed the campaign HaoBao.

This sophisticated malware attack targets victims who, when they open malicious documents attached to the emails, the malware scans for Bitcoin activity and then establishes an implant for long-term data-gathering.

It was spotted in mid-January when researchers discovered a malicious document being distributed via a Dropbox link, which claimed to be a job advert.

When opened, the prompt encourages the user to 'enable content' to see a document they're told was created with an earlier version of Word.

This is a ploy to trick the victim into enabling Visual Basic macros and allow the attackers to begin the process of implanting malware.

Lack of regulation

Ryan Sherstobitoff, senior analyst of major campaigns at McAfee, told ZDNet that Lazarus could be targeting Bitcoin users because of the lack of regulations and the difficulty in enforcing sanctions.

Lazarus has shifted to heavy targeting of cryptocurrency due to the lack of solid regulations. Additionally, sanctions are harder to enforce with cryptocurrency than hard currency, 

said Sherstobitoff.

A
A
A

Related articles

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement
Advertisement

Recommended articles

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD