{"id":14068,"date":"2018-08-27T11:34:24","date_gmt":"2018-08-27T15:34:24","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/lazarus-crypto-exchange-attack\/14068\/"},"modified":"2020-04-02T16:07:38","modified_gmt":"2020-04-02T10:37:38","slug":"lazarus-crypto-exchange-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/lazarus-crypto-exchange-attack\/14068\/","title":{"rendered":"A cryptocurrency exchange hack with a North Korean accent"},"content":{"rendered":"<p>The attack methods serious cybercriminals use are often so sophisticated that even cybersecurity pros have a real hard time uncovering them. A while ago, our experts <a target=\"_blank\" href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" rel=\"noopener noreferrer\">detected<\/a> a new campaign <a target=\"_blank\" href=\"https:\/\/securelist.com\/lazarus-under-the-hood\/77908\/\" rel=\"noopener noreferrer\">by a North Korean group called Lazarus<\/a>, notorious for its attacks on <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/operation-blockbuster\/11407\/\" rel=\"noopener noreferrer nofollow\">Sony Pictures<\/a> and a number of financial institutions \u2014 for example, a $81 million theft from <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-modus-operandi-and-countermeasures\/6716\/\" rel=\"noopener noreferrer nofollow\">the Central Bank of the People\u2019s Republic of Bangladesh<\/a>.<\/p>\n<p>In this particular case, the intruders decided to line their pockets with some <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cryptocurrency\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">cryptocurrency<\/a>. To get to their victims\u2019 wallets, they dropped a piece of malware into the corporate networks of a number of crypto-exchanges. The criminals relied on the human factor, and it paid off.<\/p>\n<h2>Trading application with a malicious update<\/h2>\n<p>Network penetration began with an e-mail message. At least one of the crypto-exchange employees got an e-mail offer to install a trading app called Celas Trade Pro by Celas Limited. A program like that might potentially be of use to the company, considering its corporate profile.<\/p>\n<p>The letter included a link to the developer\u2019s official website, which looked fine \u2014 it even had a valid <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.ru\/glossary\/digital-certificates\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">SSL certificate<\/a> issued by Comodo CA, a leading certification center.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210510\/lazarus-crypto-exchange-attack-screen-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210510\/lazarus-crypto-exchange-attack-screen-1.png\" alt=\"\" width=\"944\" height=\"915\" class=\"aligncenter size-full wp-image-14071\"><\/a><\/p>\n<p>Celas Trade Pro was available for download in two versions: for Windows and Mac, with version for Linux coming soon.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210520\/lazarus-crypto-exchange-attack-screen-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210520\/lazarus-crypto-exchange-attack-screen-2.png\" alt=\"\" width=\"823\" height=\"350\" class=\"aligncenter size-full wp-image-14073\"><\/a><\/p>\n<p>The trading app also had a valid <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/digital-certificate\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">digital certificate<\/a> \u2014 yet another legitimate product attribute \u2014 and its code contained no harmful components.<\/p>\n<p>As soon as it was successfully installed on the employee\u2019s computer, Celas Trade Pro initiated an update. For that it contacted the vendor\u2019s own server \u2014 nothing suspicious there, either. Yet instead of an update, the device downloaded a <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/backdoor\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">backdoor Trojan<\/a>.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210536\/lazarus-crypto-exchange-attack-screen-3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210536\/lazarus-crypto-exchange-attack-screen-3-1024x662.png\" alt=\"\" width=\"1024\" height=\"662\" class=\"aligncenter size-large wp-image-14075\"><\/a><\/p>\n<h3>Fallchill: Very dangerous malware<\/h3>\n<p>A backdoor is a virtual \u201cservice entrance\u201d criminals can use to penetrate a system. Most of the previous attacks on exchanges were accomplished using Fallchill. Along with some other signs, Fallchill was the key piece of evidence pointing at the attackers; the Lazarus group had used this backdoor more than once before. It allows almost unlimited control of the infected device. These are just a few of its features:<\/p>\n<ul>\n<li>Searching for, reading, and uploading files to the command server (the same one the trading software used to download its update);<\/li>\n<li>Recording data to a particular file (e.g., any.exe file or a payment order);<\/li>\n<li>Wiping files;<\/li>\n<li>Downloading and executing additional tools.<\/li>\n<\/ul>\n<h3>A closer look at the infected program and its makers<\/h3>\n<p>As we already explained, both the trading software and its vendor maintained quite a respectable appearance almost all the way through the attack \u2014 at least, until the backdoor was installed. However, upon closer scrutiny, suspicious details emerge.<\/p>\n<p>For starters, the update loader was sending the machine info to the server in a file disguised as a GIF image and was receiving commands the same way. It\u2019s not at all typical for serious software to exchange pictures in the course of updates.<\/p>\n<p>As to the website, on closer examination, the domain certificate turned out to be a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/certificates-are-different\/22147\/\" rel=\"noopener noreferrer nofollow\">low-level one<\/a>, confirming nothing but the fact that the domain was owned by an entity called Celas Limited. It contained no information about the company or its owner (more advanced certificates imply these verifications). The analysts used Google Maps to check the address used for the domain registration only to find that it belonged to a single-story building housing a ramen outlet.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210556\/lazarus-crypto-exchange-attack-screen-4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210556\/lazarus-crypto-exchange-attack-screen-4-1024x368.png\" alt=\"\" width=\"1024\" height=\"368\" class=\"aligncenter size-large wp-image-14077\"><\/a><\/p>\n<p>It being unlikely that the little restaurant owners used their spare time for programming, the logical conclusion was that the address was a fake one. Nevertheless, the analysts checked the other address specified for Celas Trading Pro\u2019s digital certificate, and found it was an empty field.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210606\/lazarus-crypto-exchange-attack-screen-5.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/08\/27210606\/lazarus-crypto-exchange-attack-screen-5.png\" alt=\"\" width=\"936\" height=\"297\" class=\"aligncenter size-full wp-image-14079\"><\/a><\/p>\n<p>In addition to that, the company had apparently paid for its domain with bitcoins. Cryptocurrency transactions are favored when anonymity is required.<\/p>\n<p>And yet, we cannot be certain whether this company is a purpose-built fake or a victim of cybercriminals. The North Korean hackers have a history of compromising legitimate organizations for the sake of attacking their partners or customers.<\/p>\n<p>You can read more about the APT Lazarus campaign in the <a target=\"_blank\" href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" rel=\"noopener noreferrer\">full report by our experts on Securelist<\/a>.<\/p>\n<h3>Lessons learned from the Lazarus case<\/h3>\n<p>As the story suggests, it may be very hard to figure out the source of a threat when big money is at stake. The cryptocurrency market is particularly popular of late, attracting scammers of all sorts: from developers of all manner of <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/cryptominers-almost-double\/22898\/\" rel=\"noopener noreferrer nofollow\">miners<\/a> to serious criminal groups that are at work all over the world.<\/p>\n<p>The campaign\u2019s broad target is of particular interest: It has targeted not only Windows users, but also macOS computers. It\u2019s another reminder that macOS is no guarantee of security \u2014 Apple users, too, have to ensure their own <a href=\"https:\/\/www.kaspersky.co.in\/internet-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener\">protection<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>The infamous Lazarus group\u2019s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.<\/p>\n","protected":false},"author":2484,"featured_media":14069,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196],"tags":[2588,483,2589,2172,352,2421,527],"class_list":{"0":"post-14068","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-applejeus","9":"tag-apt","10":"tag-celas-trade-pro","11":"tag-cryptocurrencies","12":"tag-kaspersky-lab","13":"tag-lazarus","14":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/lazarus-crypto-exchange-attack\/14068\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-crypto-exchange-attack\/11776\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/lazarus-crypto-exchange-attack\/16060\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/lazarus-crypto-exchange-attack\/14314\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/lazarus-crypto-exchange-attack\/13350\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/lazarus-crypto-exchange-attack\/16799\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/lazarus-crypto-exchange-attack\/16189\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/lazarus-crypto-exchange-attack\/21134\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/lazarus-crypto-exchange-attack\/23610\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/lazarus-crypto-exchange-attack\/10866\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/lazarus-crypto-exchange-attack\/10793\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/lazarus-crypto-exchange-attack\/17548\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/lazarus-crypto-exchange-attack\/21369\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/lazarus-crypto-exchange-attack\/17186\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/lazarus-crypto-exchange-attack\/20932\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/lazarus-crypto-exchange-attack\/20942\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=14068"}],"version-history":[{"count":25,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14068\/revisions"}],"predecessor-version":[{"id":20130,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14068\/revisions\/20130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/14069"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=14068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=14068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=14068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}