![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-eOMH0yikc2ziP8w_7miQp1DwkrTONPaXzgc73RsZ-4RZsBi7Yjespp6W3_drwPUPRBDrIgHmhWCbzSndSnIw2nDMWT7TqFNUVZF-p2EW8RkOwsSemxY_mi8CNQNtgf2K03pD5yrDg1oOc38p_5P22w0q0ofhVAl3jlKZ9qX15PnEISMwYvyIq-Sniaf4/s1600/hackers.png)
The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT.
The malware could, “aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from [command-and-control] server,” Avast security researcher Luigino
Source:: The Hackers News