Dec. 12, 2023, 4:20 p.m. | Jeffrey Burt

Security Boulevard securityboulevard.com


The notorious North Korea-backed Lazarus Group continues to change up its tactics to evade detection, with a new campaign featuring the exploitation of the Log4j critical vulnerability and three new malware families written in the D – or DLang – programming language. The campaign is being run by the advanced persistent threat (APT) group Andariel..


The post Lazarus Group Exploits Log4j Flaw in New Malware Campaign appeared first on Security Boulevard.

advanced andariel campaign change cisco talos critical critical vulnerability cybersecurity data security detection dlang endpoint evade exploitation exploits families featured flaw korea language lazarus lazarus group log4j malware malware campaign network security north north korea persistent programming programming language run security boulevard (original) social - facebook social - linkedin social - x spotlight tactics threat intelligence vulnerabilities vulnerability written

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States