News Cybersecurity researchers link new payload to North Korea’s Lazarus GroupAnalysis finds overlap in code and behavior between newly uncovered payload and DPRK’s past operations North Korea’s most notorious hacking syndicate may be abusing a new security backdoor as it bolsters its “vast arsenal” of malware, according to security researchers, as the Lazarus Group targets victims in South Korea and other countries. The payload, dubbed WinorDLL64, enables the hackers to acquire extensive system information, manipulate and delete files and execute additional commands, Slovak security firm ESET said in a report released Thursday. The payload is just one part of Wslink, a malicious loader for Windows binaries, that ESET previously uncovered in 2021. A loader serves to deploy the actual malware © Korea Risk Group. All rights reserved. |