Warning: North Korean Lazarus Group Exploiting ManageEngine Vulnerability, Targeting Healthcare Sector

Federal authorities have issued a warning about the “significant risk” of potential attacks on healthcare and public health sector entities by the North Korean state-sponsored Lazarus Group. These cybercriminals have been targeting the healthcare industry by exploiting a critical vulnerability in 24 ManageEngine IT management tools from Zoho.

Alert details

The U.S. Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HHS HC3) has recently released an alert regarding the activities of the Lazarus Group. This cybercriminal group has been focusing its attacks on internet backbone infrastructure and healthcare entities in Europe and the United States.

The vulnerability that is being exploited by the Lazarus Group is referred to as CVE-2022-47966. This critical vulnerability enables the attackers to gain unauthorized access and control over the ManageEngine software.

Vulnerability exploitation

The vulnerability tracked as CVE-2022-47966 can be exploited if the SAML (Security Assertion Markup Language) single sign-on is or has ever been enabled in the ManageEngine setup. This weakness allows attackers to deploy the remote access Trojan QuiteRAT, which gives them remote control over the compromised systems.

Connection to the Lazarus Group

According to HHS HC3, the attackers are using a remote access Trojan called QuiteRAT, which is believed to be connected to the Jupiter/EarlyRAT malware family. This malware family has been previously associated with the Lazarus Group’s subgroup known as Andariel. These connections strengthen the evidence linking these attacks to the Lazarus Group.

Recognition by authorities

The Cybersecurity and Infrastructure Security Agency (CISA) has added the CVE-2022-47966 flaw to its catalog of known exploited vulnerabilities, highlighting the seriousness of the vulnerability. In September, CISA and the Federal Bureau of Investigation (FBI) jointly released a bulletin warning of nation-state-sponsored actors exploiting this specific vulnerability in ManageEngine.

Previous reports on the vulnerability

Security researchers at Cisco Talos have been tracking the evolving threats posed by the Lazarus Group. In an August blog post, they highlighted the impact of the ManageEngine CVE-2022-47966 vulnerability. This vulnerability has gained attention due to its exploitation by the Lazarus Group in their targeted attacks.

Additionally, Caitlin Condon, the head of vulnerability research at security firm Rapid7, points out that various ManageEngine vulnerabilities have been exploited by different threat actors in the past several years. This indicates the ongoing challenges faced by healthcare and public health sector entities regarding their cybersecurity posture.

Overall threat landscape

The healthcare and public health sector entities are facing numerous serious threat actors, as emphasized by Caitlin Condon. These entities have become prime targets for cybercriminals due to the sensitive and valuable data they possess. Moreover, the reliance on interconnected systems and the rise of remote work in the healthcare sector have further increased their vulnerability to cyberattacks.

The warning from federal authorities regarding the Lazarus Group’s exploitation of the ManageEngine vulnerability is a crucial reminder of the need for robust cybersecurity measures in the healthcare and public health sector. Ongoing vigilance, prompt patch management, and the adoption of best practices are essential to protect against evolving cyber threats. It is vital for healthcare organizations and entities to collaborate with cybersecurity experts and government agencies to stay updated and better defend against sophisticated threat actors like the Lazarus Group.

Explore more

Transforming APAC Payroll Into a Strategic Workforce Asset

Global organizations operating across the Asia-Pacific region are currently witnessing a profound metamorphosis where payroll functions are shedding their reputation as stagnant cost centers to emerge as dynamic engines of corporate strategy. This evolution represents a departure from the historical reliance on manual spreadsheets and fragmented legacy systems that long characterized regional operations. In a landscape defined by rapid economic

Nordic Financial Technology – Review

The silent gears of the Scandinavian economy have shifted from the rhythmic hum of legacy mainframe servers to the rapid, near-invisible processing of autonomous neural networks. For decades, the Nordic banking sector was a paragon of stability, defined by a handful of conservative “high street” titans that commanded unwavering consumer loyalty. However, a fundamental restructuring of the regional financial architecture

Governing AI for Reliable Finance and ERP Systems

A single undetected algorithm error can ripple through a complex global supply chain in milliseconds, transforming a potentially profitable quarter into a severe regulatory nightmare before a human operator even has the chance to blink. This reality underscores the pivotal shift currently occurring as organizations integrate Artificial Intelligence (AI) into their core Enterprise Resource Planning (ERP) and financial systems. In

AWS Autonomous AI Agents – Review

The landscape of cloud infrastructure is currently undergoing a radical metamorphosis as Amazon Web Services pivots from static automation toward truly independent, decision-making entities. While previous iterations of cloud assistants functioned essentially as advanced search engines for documentation, the new frontier agents operate with a level of agency that allows them to own entire technical outcomes without constant human oversight.

Can Autonomous AI Agents Solve the DevOps Bottleneck?

The sheer velocity of AI-assisted code generation has created a paradoxical bottleneck where human engineers can no longer audit the volume of software being produced in real-time. AWS has addressed this critical friction point by deploying specialized autonomous agents that transition from simple script execution toward persistent, context-aware assistance. These tools emerged as a necessary counterbalance to a landscape where