Operation Dream Job is a sophisticated cyber espionage campaign orchestrated by the Lazarus group, a North Korean threat actor known for its association with various high-profile attacks. This ongoing operation employs advanced tactics to compromise targets, primarily focusing on individuals working in software or decentralized finance (DeFi) platforms.
The attack methodology used by this campaign can be outlined as follows:
MITRE TACTICS |
STEPS INVOLVED |
Initial Access | The operation begins with the threat actors posing as job recruiters on professional networking platforms, establishing initial connections with potential targets. |
Execution | Malicious payloads, including C++ malware like "PlankWalk" and Linux backdoors such as "SimplexTea," are executed to establish a foothold within the corporate environment. |
Persistence | Attackers establish persistence by modifying user profiles, employing reflective DLL injection, and manipulating system settings to ensure prolonged access. |
Privilege Escalation | Vulnerability exploitation and techniques like reflective DLL injection allow threat actors to escalate privileges, gaining deeper access within the compromised environment. |
Defense Evasion | The deployed malware employs evasion techniques, such as masquerading as legitimate Windows binaries and using stealthy loaders like LidShift, to avoid detection. |
Discovery | Extensive reconnaissance is performed to enumerate compromised systems, identify valuable targets, and understand the network's structure and defenses. |
Collection | Information-stealing trojans are used to collect sensitive data, including intellectual property and proprietary information, relevant to the attackers' objectives. |
Exfiltration | Stolen data is exfiltrated from compromised systems to external servers controlled by the threat actors, potentially causing severe consequences for targeted organizations. |
DARC team recommends the following guidance/best practices:
To detect the activities associated with the context of Operation Dream Job, we can create several DQL queries targeting different aspects of the network and system security. Here are some DQL queries that align with the security measures mentioned:
stream=email-gateway where subject like '%job offer%' or subject like '%career opportunity%' | select subject, sender, recipient
stream=web-filter where action='ALLOWED' and category='Job Recruitment' | select user, domain
stream=ep-process where (image like '%destextapi.dll' or image like '%manextapi.dll' or image like '%pathextapi.dll' or image like '%preextapi.dll' or image like '%Wbemcomn.dll') and commandline like '*Vault\\cache*.db'
stream=firewall where action='PACKET_ALLOWED' and dstip in ['malicious_ip1', 'malicious_ip2'] | select srcip, dstip, action
Note: For placeholders namely, ['malicious_ip1',malicious_ip2'] to work, kindly ensure you have a Threat Intelligence feeds integrated within your HYPERCLOUD deployment.
stream=dns where querytype='A' and answer in ['malicious_domain1', 'malicious_domain2'] | select query, answer
Note: For placeholders namely, ['malicious_domain1',malicious_domain2'] to work, kindly ensure you have a Threat Intelligence feeds integrated within your HYPERCLOUD deployment.
stream=authentication where action='LOGIN' and authproto!='MFA' | select user, srcip, status
stream=threat where threat in ['TOUCHMOVE', 'SIDESHOW', 'TOUCHSHIFT'] | select user, dstip, file, threat
stream=ep-process where eid = '4104' and action='PROCESS_ADDED' | select user, commandline, image
stream=iam where action='PRIVILEGE_CHANGED' | select user, role, status
These queries are only indicative in nature with an assumption that the HYPERCLOUD platform is configured to capture and log the relevant data that corresponds to the security measures mentioned. Adjustments may be needed based on the actual data fields and log formats used in the organization's HYPERCLOUD deployment.
Operation Dream Job represents a significant escalation in the Lazarus group's cyber capabilities, targeting individuals across major operating systems and industries. Organizations must remain vigilant, enhance their cybersecurity posture, and collaborate on threat intelligence sharing to effectively counter this evolving threat landscape. By understanding the attack methodology and implementing robust security measures, businesses and individuals can mitigate the risks associated with Operation Dream Job.
References: