Rising Sun Trojan
First observed in 2018, Rising Sun is an information stealing trojan created by the Lazarus advanced persistent threat group for use in their global Operation Sharpshooter campaign targeting critical infrastructure.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
First observed in 2018, Rising Sun is an information stealing trojan created by the Lazarus advanced persistent threat group for use in their global Operation Sharpshooter campaign targeting critical infrastructure.
Affected platforms
The following platforms are known to be affected:
Threat details
The threat actors behind Operation Sharpshooter masquerade as recruiters to collect information about targeted individuals or organisations for potential exploitation. Initial infection is achieved via a document infected with malicious macros. These macros open a decoy document while downloading and installing Rising Sun. Rising Sun then gathers data from the affected device and sends it to a command and control (C2) server.
Since October 2018 the Rising Sun malware has appeared in dozens of English-speaking organisations, mainly within the defence and public sectors. Operation Sharpshooter has technical similarities to previous attacks conducted by the North Korean HIDDEN COBRA Advanced Persistent Threat group, but at the time of publication it remains uncertain whether HIDDEN COBRA is responsible for distributing Rising Sun.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect a trojan infection, ensure that:
|
Last edited: 17 February 2020 1:01 pm