Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

6/10/2021
06:05 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign

The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.

A cybercriminal group with a rotating list of names has resurfaced with a new email attack campaign threatening to launch a distributed denial-of-service (DDoS) attack against target organizations that refuse to pay a ransom.

Proofpoint first began watching the group, which now calls itself Fancy Lazarus, in August 2020. Its attackers have also identified themselves as "Fancy Bear," "Lazarus," "Lazarus Group," and "Armada Collective." Researchers say there is no known connection between this group and advanced persistent threat (APT) actors of the same name, such as Lazarus Group, linked to North Korea, and Fancy Bear of Russia.

Related Content:

The True Cost of a Ransomware Attack

Special Report: Assessing Cybersecurity Risk in Today's Enterprises

New From The Edge: 11 Cybersecurity Vendors to Watch in 2021

"The use of recognizable or familiar names could be to lend credibility to their emails and threats," says Sherrod DeGrippo, senior director of threat research and detection at Proofpoint, noting the social engineering emails instruct recipients to search for their names and find other instances of their work.

In August 2020, security firm Akamai and the FBI alerted businesses to a wave of these email attack campaigns in which criminals claiming to be Fancy Bear demanded a bitcoin ransom and threatened to launch a DDoS attack. To prove they could conduct a larger attack, the adversaries mentioned a "small attack" will be launched against an identified IP address. A more substantial attack, they threatened, would follow within six days if a payment of 20 bitcoins wasn't received.

This "demo" attack varied across victim organizations. Some targeted a single IP address and others targeted multiple IP addresses, with additional variations in peak volumes and lengths of attack.

The group's most recent campaign follows a similar pattern, Proofpoint reports. An initial email announces the group's current name and acknowledges it's targeting a specific company. They threaten an attack in seven days and mention the smaller attack will target a specific IP address, subnet, or autonomous system. The maximum attack speed will be "2 Tbps," the email states.

"This means that your websites and other connected services will be unavailable for everyone," Fancy Lazarus states. "Please also note that this will severely damage your reputation among your customers who use online services."

Emails are usually sent to well-researched recipients, such as people listed as contacts in Border Gateway Protocol (BGP) or Whois information for corporate networks, Proofpoint found. They work in areas such as communications, external relations, and investor relations; some emails are set to emailed aliases for help desk, abuse, administrative contacts, or customer service.

It seems attackers have broadened their target industries. The latest campaign targets energy, financial, insurance, manufacturing, public utilities, and retail, researchers report, and most of the attacks target US companies or those with a global presence.

There are more differences between the group's earlier attacks and the ones Proofpoint most recently detected. Its new Fancy Lazarus moniker is the main change, DeGrippo says, and its emails are similar to those sent in December 2020. The ransom demand has dropped to two bitcoins, a change researchers attribute to the fluctuations in cryptocurrency value – a factor present in ransomware campaigns since 2016 or earlier, she notes.

"Threat actors send their campaigns when the prices are most advantageous, attempting to make more money when the various currencies are at a high valuation," she explains. "Other actors use other cryptocurrencies like Ethereum, but bitcoin continues to be the massively popular coin of choice for malicious threat actors."

Follow the Money
At a time when more and more major ransomware campaigns are making headlines, it's interesting to see adversaries demand ransom before launching an attack. DeGrippo says this attack demonstrates how they're consistently seeking more means of achieving their goals.

"DDoS attacks have become increasingly easier to launch and have a potentially substantial payoff for considerably less work than something like a ransomware attack would require," she says. "Additionally, by conducting this type of attack, the threat actor bypasses automated security protections that would flag and block on ransomware."

While ransomware often uses less technical sophistication, those attacks require a focus and coordination to perpetrate, DeGrippo adds.

Organizations can prepare for this threat by ensuring the appropriate mitigations are in place and having a disaster recovery plan ready. The proper partnerships and technology to help filter DDoS traffic can aid response, and it's key to have a plan for when these attacks happen, she says.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.