Cybercrime , DDoS Protection , Fraud Management & Cybercrime

Fake Lazarus DDoS Gang Launches New 'Attacks'

Proofpoint Reports Group Rebrands as Fancy Lazarus, Lowers Ransom Amount
Fake Lazarus DDoS Gang Launches New 'Attacks'

Traditional ransomware attacks may have taken over the news cycle, but Proofpoint researchers say the malicious actors who presents themselves as the North Korean-backed Lazarus advanced persistent threat group have revamped their distributed denial-of-service ransom extortion strategy and rebranded the group with a new moniker.

See Also: ManageEngine’s Guide to Implementing the Essential Eight Maturity Model

"These names reference real APT groups that are nation-aligned or nation-sponsored, but there is no evidence that the extortion DDoS actor tracked in this blog has any association with those APT groups. They are simply leveraging the well-known names to scare their targets," says Sherrod DeGrippo, senior director of threat research and detection at Proofpoint.

The gang may be all talk and no action, as few DDoS attacks apparently take place and are simply attempting to take advantage of the fear ransomware has struck in companies to make a quick buck.

"While Proofpoint does not have visibility into the actual 'Fancy Lazarus' DDoS attacks and whether they are carried out, FBI reporting indicates that many affected companies that pass the threatened deadline either do not see any additional activity or the activity is successfully mitigated," the company says.

The group went quiet during April, but recently reemerged, adding the name "Fancy Lazarus" to the list of names under which it operates which includes Lazarus, Lazarus Group, Fancy Bear and Armada Collective.

Additionally, Proofpoint notes that the gang has altered its ransom price structure and phishing email content in recent attacks while continuing to primarily target U.S. and global organizations.

It is also unknown if the gang's tactic has resulted in any victims paying a ransom, says DeGrippo.

Back in Action

The gang first came to light in August 2020. As of May 12, 2021, Proofpoint researchers are tracking renewed DDoS extortion activity targeting an increasing number of industries, including the energy, financial, insurance, manufacturing, public utilities and retail, the report says. At that time Akamai detailed the group's operational techniques (see: Copycat Hacking Groups Launch DDoS Attacks).

The gang made changes in addition to its name. In the latest round of attacks, the group has returned to the original ransom notes it used in December and August 2020, when it told the victim to Google its name, which would likely bring up a story based on the real Lazarus threat group. The note then went on to say that if the victim declined to pay the ransom, Fancy Lazarus would launch a DDoS attack.

An example of the current emails being sent by Fancy Lazarus (Source: Proofpoint)

The gang first threatened a small DDoS attack to show the capability exists. Then if no payment was received within seven days, it threatened a larger "2TB per second" attack that would shut down the victim's operation, Proofpoint says.

"The email content in the recent campaigns is similar to emails they sent in December 2020, indicating that version's potential effectiveness," says DeGrippo.

The security firm did not give an example of any other email content the gang utilized.

New Low Price!

The group also dropped the amount of ransom it demands. Its original price of 10 bitcoins has been reduced to 2 bitcoins.

"As bitcoin prices fluctuate, we see some change in their demand amounts, proving that cryptocurrency markets and malicious actor activity are absolutely correlated," DeGrippo says. "Threat actors send their campaigns when the prices are most advantageous, attempting to make more money when the various currencies are at a high valuation."


About the Author

Doug Olenick

Doug Olenick

Former News Editor, ISMG

Olenick has covered the cybersecurity and computer technology sectors for more than 25 years. Prior to his stint as ISMG as news editor, Olenick was online editor for SC Media, where he covered every aspect of the cybersecurity industry and managed the brand's online presence. Earlier, he worked at TWICE - This Week in Consumer Electronics - for 15 years. He also has contributed to Forbes.com, TheStreet and Mainstreet.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.