Thought It Was a Work Appointment, Turns Out It Was a Gateway for North Korean Hackers

Recently, researchers discovered a sophisticated campaign using Telegram to impersonate real employees in target companies and create fake websites resembling Calendly and Picktime to schedule meetings with victims.

This campaign has been attributed to the North Korean cybercrime group Lazarus Group, known for cyberattacks targeting finance, espionage, and stealing cryptocurrency.

Lazarus Malware 1759394551

Lazarus Group is a notorious hacker group (APT – Advanced Persistent Threat) believed to be closely linked to the North Korean government. This group has been active since the early 2000s and is known for its cyber espionage, sabotage, financial theft, and large-scale cyberattacks worldwide.

Some Notable Campaigns:

  • Sony Pictures Hack (2014): Caused leaks of internal data, emails, and unreleased films. It also marked the beginning of Lazarus’s public sabotage attacks.
  • Bangladesh Bank Heist (2016): Attacked the central bank of Bangladesh, attempting to transfer nearly 1 billion USD through the SWIFT system. Before being discovered, they successfully stole 81 million USD.
  • WannaCry Ransomware Attack (2017): A global ransomware attack that encrypted data and demanded Bitcoin ransom. The campaign caused damage to hundreds of thousands of computers in 150 countries.
  • Attacks on Cryptocurrency Exchanges (2017–present): Lazarus increasingly focuses on cryptocurrency to evade international sanctions. The total estimated damage amounts to billions of USD.
  • Theft of cryptocurrency wallet keys and login credentials.
  • Leak of digital assets worth tens of millions of USD.
  • Installation of remote access tools (RAT), leading to loss of system control.

Attack Overview 1759394633

The hacker group Lazarus Group will carry out four main stages in this campaign. Initially, the attackers will conduct phishing through Telegram, where they impersonate employees of a trading company to approach victims. Here, the attacker sets up appointments by leading to fake websites mimicking scheduling services like Calendly or Picktime.

Image 1 1759394663

After tricking the victim into visiting the fake websites, the attacker will deploy perfhloader using the phantom DLL loading technique. Notably, it will automatically start when the user restarts their computer by setting the command: “sc config sessionenv start=auto“.

Sessionenv Perfhloader Overview 1759394685

These loaders are responsible for reading an encrypted file (perfh011.dat), decrypting it, and loading the malware into memory. To avoid detection or complicate static analysis, the attacker used an XOR code.

A0433bc5 67ea 4132 8bd2 2371a6bc1c92 1759394705

After infiltrating and setting up the loader, the hacker group begins deploying PondRAT along with additional tools for the campaign. PondRAT can be understood as a simple variant of POOLRAT (aka SIMPLESEA) – deployed as a basic RAT to read and write files, launch processes, and execute shellcode.

Supplementary tools are also installed at this stage, such as a keylogger, screenshot utility, cookie or Chrome credential stealer, Mimikatz, and proxies like FRPCMidProxyProxy Mini to support attacks through hidden networks.

Next, ThemeForestRAT will be deployed and run entirely in memory (fileless), through the previously established PondRAT. It can execute up to about 20 commands: manage files, list processes, inject shellcode, timestomp, execute commands, check TCP, download files, spawn processes, hibernate… Additionally, it will continuously communicate with C2 servers.

Comparison Status Codes C2 1759394727

4b25f91d Df8b 4e2b 8162 C0ed6da4257d 1759394747

In the final stage, after operating with PondRAT and ThemeForestRAT, Lazarus will clean up traces of the previous RATs and deploy RemotePERemotePE is downloaded from the C2 through RemotePELoader, which is encrypted using Windows DPAPI (Data Protection API) and loaded by DPAPILoader. This enhances security and reduces the likelihood of analysis by security experts.

Remotepe Checkin Request 1759394800

RemotePE is written in C++ by the attackers, indicating that it is the most sophisticated RAT, used only for high-value targets, with the ability for long-term control and high stealth.

The Lazarus Group’s attack campaign, observed in 2024 and published on September 2, 2025, demonstrated a multi-layered approach—from social engineering, through loaders, to advanced-stage RATs—to deeply infiltrate DeFi financial organizations. The attackers showed the ability to adapt their tactics flexibly depending on the situation and target.

This serves as a continued warning about the sophistication that APT groups like Lazarus can deploy in the high-tech and crypto-financial space.

  1. Enhance Input Security
  • Train employees to recognize phishing techniques on Telegram, LinkedIn, and fake meeting schedules (fake Calendly/Picktime).
  • Limit sharing of email addresses or personal contact information publicly.
  • Implement an email gateway with sandbox to check attachments and links.
  • Alert when employees click on external links.
  1. Access Management and Monitoring
  • Enable mandatory MFA (2FA).
  • Remove admin rights from regular users.
  • Apply the principle of Least Privilege Access.
  1. Malicious Domain
  • calendly[.]live
  • picktime[.]live
  • oncehub[.]co
  • go.oncehub[.]co
  • dpkgrepo[.]com
  • pypilibrary[.]com
  • pypistorage[.]com
  • keondigital[.]com
  • arcashop[.]org
  • jdkgradle[.]com
  • latamics[.]org
  • lmaxtrd[.]com
  • paxosfuture[.]com
  • www[.]plexisco[.]com
  • ftxstock[.]com
  • www[.]natefi[.]org
  • nansenpro[.]org
  • aes-secure[.]net
  • azureglobalaccelerator[.]com
  • azuredeploypackages[.]net
  1. IP Addresss
  • 144.172.74[.]120
  • 192.52.166[.]253
  1. Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE
  2. Lazarus Hackers Deploying Three RATs on Compromised Systems Possibly Using 0-Day Vulnerability
  3. Lazarus Hackers Exploit 0-Day to Deploy Three Remote Access Trojans
Exclusive article by FPT IS Technology Experts

Luu Tuan Anh – FPT IS Cyber Security Center

Share:
Img Contact

Sign up to receive the latest news from FPT IS

    Bot Avatar