Skip to main content

2019-01-10: North Korea Lazarus Targeting REDBANC

Medium
Published: Mon Jan 14 2019 (01/14/2019, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: misp-galaxy
Product: mitre-enterprise-attack-attack-pattern

Description

2019-01-10: North Korea Lazarus Targeting REDBANC

AI-Powered Analysis

AILast updated: 07/02/2025, 10:41:39 UTC

Technical Analysis

The threat involves the North Korean state-sponsored threat actor group Lazarus targeting REDBANC, a financial network operator, as of January 2019. Lazarus is known for sophisticated cyber espionage and financially motivated attacks. This campaign employed a social engineering ruse involving job applications to establish a trusted relationship (MITRE ATT&CK T1199) with targets. The attackers leveraged PowerShell scripting (T1064) and Windows Management Instrumentation (WMI) (T1047) to execute malicious code and maintain persistence. They also used scheduled tasks (T1053) and the creation of new Windows services (T1050) to ensure continued access. The malware, identified as PowerRatankba, was designed to collect data from local systems (T1005) and exfiltrate it covertly over command and control (C2) channels (T1041), employing data encoding techniques (T1132) to evade detection. The attack chain indicates a focus on stealthy infiltration, persistence, data collection, and exfiltration, targeting Windows environments. Although no known exploits in the wild were reported at the time, the medium severity rating reflects the potential impact on confidentiality and integrity of sensitive financial data. The campaign's use of trusted relationships and scripting-based techniques highlights the sophistication and adaptability of Lazarus in targeting financial sector entities.

Potential Impact

For European organizations, particularly those involved in financial services or connected to international banking networks, this threat poses a significant risk to the confidentiality and integrity of sensitive financial and personal data. Successful compromise could lead to unauthorized access to transaction data, customer information, and internal communications, potentially resulting in financial fraud, reputational damage, and regulatory penalties under GDPR. The use of trusted relationship exploitation and social engineering increases the likelihood of initial compromise, while the persistence mechanisms complicate detection and remediation. Additionally, data exfiltration over C2 channels could facilitate espionage or preparation for further disruptive activities. The medium severity suggests a moderate but credible threat that requires attention, especially for organizations with exposure to international financial networks or those that handle cross-border transactions involving Latin American financial institutions like REDBANC.

Mitigation Recommendations

To mitigate this threat effectively, European organizations should implement targeted measures beyond generic controls: 1) Enhance email and recruitment process security by validating unsolicited job applications and training HR personnel to recognize social engineering tactics. 2) Monitor and restrict PowerShell and WMI usage through application whitelisting and logging, employing tools like Microsoft’s AMSI (Antimalware Scan Interface) to detect malicious scripts. 3) Audit scheduled tasks and new Windows services regularly to identify unauthorized persistence mechanisms. 4) Deploy network monitoring solutions capable of detecting anomalous outbound traffic patterns indicative of covert data exfiltration, including encrypted C2 channels. 5) Implement endpoint detection and response (EDR) solutions with behavioral analytics to identify suspicious scripting and lateral movement activities. 6) Conduct threat hunting exercises focused on indicators of compromise related to Lazarus TTPs, even in the absence of known IOCs. 7) Maintain up-to-date threat intelligence feeds and share information with financial sector ISACs to stay informed about evolving tactics. 8) Enforce strict access controls and segmentation to limit lateral movement and data access within networks.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
0
Original Timestamp
1547678812

Threat ID: 682acdbdbbaf20d303f0bf3e

Added to database: 5/19/2025, 6:20:45 AM

Last enriched: 7/2/2025, 10:41:39 AM

Last updated: 8/5/2025, 3:14:26 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats