Warning: North Korean Lazarus Group Exploiting ManageEngine Vulnerability, Targeting Healthcare Sector

Federal authorities have issued a warning about the “significant risk” of potential attacks on healthcare and public health sector entities by the North Korean state-sponsored Lazarus Group. These cybercriminals have been targeting the healthcare industry by exploiting a critical vulnerability in 24 ManageEngine IT management tools from Zoho.

Alert details

The U.S. Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HHS HC3) has recently released an alert regarding the activities of the Lazarus Group. This cybercriminal group has been focusing its attacks on internet backbone infrastructure and healthcare entities in Europe and the United States.

The vulnerability that is being exploited by the Lazarus Group is referred to as CVE-2022-47966. This critical vulnerability enables the attackers to gain unauthorized access and control over the ManageEngine software.

Vulnerability exploitation

The vulnerability tracked as CVE-2022-47966 can be exploited if the SAML (Security Assertion Markup Language) single sign-on is or has ever been enabled in the ManageEngine setup. This weakness allows attackers to deploy the remote access Trojan QuiteRAT, which gives them remote control over the compromised systems.

Connection to the Lazarus Group

According to HHS HC3, the attackers are using a remote access Trojan called QuiteRAT, which is believed to be connected to the Jupiter/EarlyRAT malware family. This malware family has been previously associated with the Lazarus Group’s subgroup known as Andariel. These connections strengthen the evidence linking these attacks to the Lazarus Group.

Recognition by authorities

The Cybersecurity and Infrastructure Security Agency (CISA) has added the CVE-2022-47966 flaw to its catalog of known exploited vulnerabilities, highlighting the seriousness of the vulnerability. In September, CISA and the Federal Bureau of Investigation (FBI) jointly released a bulletin warning of nation-state-sponsored actors exploiting this specific vulnerability in ManageEngine.

Previous reports on the vulnerability

Security researchers at Cisco Talos have been tracking the evolving threats posed by the Lazarus Group. In an August blog post, they highlighted the impact of the ManageEngine CVE-2022-47966 vulnerability. This vulnerability has gained attention due to its exploitation by the Lazarus Group in their targeted attacks.

Additionally, Caitlin Condon, the head of vulnerability research at security firm Rapid7, points out that various ManageEngine vulnerabilities have been exploited by different threat actors in the past several years. This indicates the ongoing challenges faced by healthcare and public health sector entities regarding their cybersecurity posture.

Overall threat landscape

The healthcare and public health sector entities are facing numerous serious threat actors, as emphasized by Caitlin Condon. These entities have become prime targets for cybercriminals due to the sensitive and valuable data they possess. Moreover, the reliance on interconnected systems and the rise of remote work in the healthcare sector have further increased their vulnerability to cyberattacks.

The warning from federal authorities regarding the Lazarus Group’s exploitation of the ManageEngine vulnerability is a crucial reminder of the need for robust cybersecurity measures in the healthcare and public health sector. Ongoing vigilance, prompt patch management, and the adoption of best practices are essential to protect against evolving cyber threats. It is vital for healthcare organizations and entities to collaborate with cybersecurity experts and government agencies to stay updated and better defend against sophisticated threat actors like the Lazarus Group.

Explore more

How Do You Use Google Gemma 4 AI Locally on Your Phone?

Carrying the computational power of a massive data center within the palm of your hand was once the stuff of science fiction, but today it is a tangible reality for smartphone users everywhere. The transition from cloud-dependent systems to on-device processing marks a new era for smartphone utility, fundamentally changing how we interact with our digital assistants. By using the

Six Micro-Responses to Boost Professional Visibility and Impact

Achieving excellence in silence often feels like a noble pursuit, yet many dedicated professionals discover that their quiet diligence acts as a cloak rather than a ladder in today’s hyper-connected, digital-first corporate ecosystem. There is a persistent belief that the quality of one’s output will inevitably draw the necessary attention for career advancement. However, as the boundaries between physical offices

How Do You Lead an Untethered and Fluid Workforce?

High-performing professionals are no longer choosing between a corner office and a home study; they are instead selecting their next zip code based on the projects they lead and the lifestyles they desire. This kinetic energy defines the current labor market, where the era of the office versus remote debate is officially over, replaced by a reality that is far

Why Does High Performance No Longer Guarantee Job Security?

The unsettling silence that follows a mass layoff notification often leaves the most productive workers staring at their screens in disbelief, wondering how their record-breaking metrics failed to shield them from the corporate scythe. This scenario, once considered a rare anomaly reserved for the underperformers, has transformed into a standard feature of a global labor market where technical excellence is

How Do You Navigate the Shifting Realities of Work?

The traditional guarantee that a prestigious university degree would eventually lead to a corner office has evaporated into a landscape defined by algorithmic gatekeepers and decentralized career paths. This breakdown of the “degree-to-desk” pipeline marks a significant turning point where the old rules of professional advancement no longer seem to apply to the current reality. Modern professionals frequently encounter the