The infamous Lazarus Group, a state-sponsored cybercrime syndicate linked to North Korea, has launched a new campaign aimed at targeting software developers in a bid to steal sensitive data. The campaign, known as Operation 99, focuses on infiltrating the developer ecosystem to acquire source code, secrets, configuration files, and cryptocurrency wallet keys. The operation marks a significant shift in the Lazarus Group’s tactics, now focusing on high-value targets in the tech supply chain. In this article, we’ll explore the details of this sophisticated attack, the group’s evolving methods, and how developers can protect themselves from these growing threats.
What is Operation 99? The Lazarus Group’s Latest Cyberattack on Developers
On January 9, researchers from SecurityScorecard uncovered Operation 99, a new cyberattack targeting developers. Unlike previous campaigns by the Lazarus Group that used broad phishing tactics, Operation 99 is much more targeted, focusing specifically on freelance developers working in the cryptocurrency sector. This strategic shift demonstrates the group’s increased focus on the tech supply chain and its goal to infiltrate systems that could lead to financial or technological gain for the North Korean regime.
Key Features of the Lazarus Group’s New Approach:
- Targeted Attacks: Instead of broad-based phishing schemes, Lazarus now focuses on developers in the cryptocurrency space.
- Advanced Malware: The group has upgraded its tools with enhanced obfuscation techniques, making detection and removal significantly harder.
- Global Reach: The attack is not confined to one region. Researchers have identified victims worldwide, highlighting the expansive nature of the campaign.
How the Attack Works: A Closer Look at the Malware and Tactics
The malware used in Operation 99 includes several advanced features designed to remain undetected while stealing valuable information. Here’s how the attack typically unfolds:
-
Malicious GitHub Repository: The attackers first pose as recruiters and reach out to developers on platforms like LinkedIn with fake job offers. These recruiters send links to a malicious GitHub repository named “coin promoting Webapp”, where the victim is asked to clone the repository.
-
Command and Control (C2) Servers: Once the victim executes the code, the malware connects to the C2 servers controlled by the attackers. These servers are carefully hidden behind an Apache server and hosted by the provider Stark Industries Solutions Ltd.
-
Multi-Stage Malware: The malware used in this operation is modular, meaning it can be tailored to different environments. Once on the victim’s system, it executes various payloads, depending on the operating system and the data it seeks to steal.
The Malware Components:
- Main99: A downloader that retrieves additional payloads from the C2 servers.
- Payload99/73: Implants capable of keylogging, clipboard monitoring, and file exfiltration.
- Brow99/73: Specifically designed to steal browser credentials, including passwords stored in the keychain.
- MCLIP: A targeted implant for monitoring keystrokes and clipboard activity.
This malware is crafted to function seamlessly across different platforms like Windows, macOS, and Linux, ensuring no developer is safe regardless of their environment.
Why Developers Are the New Target
Software developers, particularly those in the cryptocurrency industry, have access to sensitive data, intellectual property, and valuable assets. As digital assets become more lucrative, they present an appealing target for groups like Lazarus.
By compromising freelance developers, the group indirectly undermines entire projects, systems, and organizations. The supply chain attack nature of this operation means that once the attackers infiltrate a developer’s machine, they can potentially compromise the broader technology ecosystem that developer is part of.
How to Protect Against Lazarus Group Attacks
In response to this growing threat, SecurityScorecard has urged developers and organisations to implement robust security measures to defend against these targeted cyberattacks. Here are some proactive steps to stay protected:
-
Verify Repositories and GitHub Links: Always scrutinise GitHub repositories before cloning them. Avoid trusting links from unfamiliar or unsolicited sources.
-
Enhanced Endpoint Security: Ensure your endpoint security solutions are up-to-date. These tools can detect unusual activity on your device, such as unexpected connections to C2 servers.
-
Validate Job Offers and Recruiters: Before engaging with potential recruiters or applying for freelance positions, verify the legitimacy of the job offer, especially when using platforms like LinkedIn.
-
Be Wary of Red Flags: Developers should be educated about common phishing tactics, such as suspicious emails, fake repositories, or even odd interactions on professional platforms like LinkedIn.
-
Code Repository Verification: Scrutinise GitHub repositories before cloning, and consider verifying the legitimacy of the code you are working with, especially when it pertains to sensitive projects like cryptocurrency development.
The Bigger Picture: How Lazarus Group Funds North Korea’s Regime
This attack is not just about stealing data—it’s about funding the North Korean regime. Lazarus Group has been linked to several cyberattacks aimed at generating revenue for the Democratic People’s Republic of Korea (DPRK). The stolen data could be used to advance North Korea’s geopolitical goals, potentially funding their ongoing military operations or expanding their influence in the cyber warfare domain.
As the Lazarus Group continues to evolve its methods, it’s clear that the cybersecurity community must adapt quickly to these changing tactics. Whether targeting individual developers or broader supply chains, the threat is real and widespread.
Conclusion: A Call to Action for Developers
With the increasing sophistication of Lazarus Group’s campaigns, software developers must be more vigilant than ever. By adhering to proactive security practices, verifying recruiters, and staying up-to-date with the latest threats, developers can help safeguard not only their personal data but also the broader digital ecosystem they contribute to.
Operation 99 serves as a stark reminder of the growing threat posed by state-sponsored cybercriminal groups, and it’s crucial that developers take steps to protect themselves and their projects from these advanced persistent threats.
Relevant Links for Further Reading:
- Lazarus Group and North Korea’s Cyber Tactics
- Securing Developer Environments: Best Practices
- Understanding Supply Chain Attacks
Photo credit: The Hacker News


