IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

McAfee uncovers 'aggressive' Bitcoin-stealing phishing campaign by the Lazarus cyber crooks

Dubbed HaoBao, is said to be a 'sophisticated malware with long-term impact'

Bitcoin mining

McAfee's Advanced Threat Research (ATR) analysts have uncovered an "aggressive" Bitcoin-stealing phishing campaign that it believes to be by the notorious Lazarus cyber crooks.

This new campaign, dubbed HaoBao, is said to be a "sophisticated malware with long-term impact", resuming Lazarus' work of phishing emails, posed as employee recruitment.

However, the new malware variant now targets Bitcoin users and global financial organisations, McAfee said, so when victims open malicious documents attached to the emails, the malware scans for Bitcoin activity and then establishes a "dropped implant" for long-term data-gathering.

"HaoBao targets and never-before-seen implants signal to McAfee ATR an ambitious campaign by Lazarus to establish cryptocurrency cybercrime at a sophisticated level," McAfee said.

The Lazarus group targeted individuals in early 2017 with a campaign of spear phishing emails impersonating job recruiters which contained malicious documents. It lasted from April to October and used job descriptions relevant to target organisations, in both English and Korean language, with the ultimate goal of gaining access to the target's environment and obtain key military program insight or steal money.

Security researchers thought that was the end of the Lazarus campaign, and it was. Until 15 January this year, when McAfee ATR discovered a malicious document distributed via a Dropbox account and masquerading as a job recruitment for a Business Development Executive located in Hong Kong for a big multi-national bank.

McAfee said the discovery was the mark of a new Lazarus campaign, as it utilises techniques, tactics and procedures observed in 2017.

"This document had the last author Windows User' and was created 16 January, 2018 with Korean language resources," the security research team said. "Several additional malicious documents with the same author appeared between January 16 through January 24, 2018."

McAfee ATR analysis also noted that these dropped implants have never been seen before in the wild and have not been used in previous Lazarus campaigns from 2017. The campaign also deploys a one-time data gathering implant that relies upon downloading a second stage to gain persistence, the security experts said.

"The implants contain a hardcoded word "haobao" that is used as a switch when executing from the Visual Basic macro," McAfee added. "This campaign is tailored to identifying those who are running Bitcoin-related software through specific system scans."

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Microsoft successfully tests emission-free hydrogen fuel cell system for data centres
data centres

Microsoft successfully tests emission-free hydrogen fuel cell system for data centres

29 Jul 2022