BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
Threat Actors/Lazarus Group
🇰🇵

Lazarus Group

Also known as: Hidden Cobra · Zinc · Diamond Sleet · Labyrinth Chollima · APT38 · BlueNoroff · Stardust Chollima

nation-state
Nation
🇰🇵 North Korea
Active Since
2009
Targets
Financial ServicesCryptocurrencyDefenseEntertainmentCritical InfrastructureTechnology
Known Tools
ManuscryptDestoverBrambulFallchillHoplightElectricFishAppleJeusTraderTraitorBLINDINGCANDTrack
MITRE ATT&CK
T1566T1059T1071T1486T1560T1027T1105T1036T1055T1497T1562T1070
References
MITRE ATT&CKCISA Advisory - Hidden CobraMandiant - APT38FBI - TraderTraitor

Background

Lazarus Group is the most prominent and prolific cyber threat actor attributed to North Korea's Reconnaissance General Bureau (RGB), the country's primary intelligence agency. Active since at least 2009, Lazarus operates as an umbrella organization encompassing multiple subgroups including BlueNoroff (financially motivated operations) and Andariel (espionage-focused operations targeting South Korea). The group is believed to operate under the direction of the RGB's 3rd Bureau (Technical Reconnaissance) and Bureau 121, North Korea's primary cyber warfare unit.

The group's operations serve dual purposes: generating revenue for the North Korean regime to circumvent international sanctions, and conducting espionage and destructive attacks against perceived adversaries. Lazarus has been linked to some of the most high-profile cyberattacks in history, including the 2014 Sony Pictures hack, the 2016 Bangladesh Bank heist, and the 2017 WannaCry ransomware outbreak. The United States Department of Justice has issued multiple indictments against North Korean nationals believed to be Lazarus operators.

Lazarus is notable for its operational sophistication and willingness to conduct destructive attacks, setting it apart from many state-sponsored groups that focus purely on espionage. The group has demonstrated the ability to rapidly adapt its tooling and tactics, shifting from destructive wiper attacks to massive financial theft operations and, more recently, targeting cryptocurrency exchanges and DeFi protocols. The UN Panel of Experts estimated that North Korean cyber operations have stolen over $3 billion in cryptocurrency between 2017 and 2023, with the majority attributed to Lazarus-affiliated clusters.

Notable Campaigns

Sony Pictures Entertainment (November 2014)

Lazarus conducted a devastating destructive attack against Sony Pictures in retaliation for the planned release of "The Interview," a comedy depicting the assassination of North Korean leader Kim Jong-un. The attackers deployed wiper malware (Destover) that destroyed data across Sony's network, exfiltrated terabytes of confidential data including unreleased films, employee records, and executive emails, and posted threatening messages. The FBI formally attributed the attack to North Korea, marking one of the first public attributions of a destructive cyberattack to a nation-state.

Bangladesh Bank Heist (February 2016)

In one of the largest cyber heists in history, Lazarus compromised Bangladesh Bank's systems and used fraudulent SWIFT messages to attempt the transfer of nearly $1 billion from the bank's account at the Federal Reserve Bank of New York. While most transactions were blocked, the attackers successfully stole $81 million, which was laundered through casinos in the Philippines. This operation demonstrated the BlueNoroff subgroup's deep understanding of the SWIFT interbank messaging system and financial sector infrastructure.

WannaCry Ransomware (May 2017)

The WannaCry ransomware attack infected over 200,000 systems across 150 countries, causing billions of dollars in damage. The ransomware leveraged the EternalBlue exploit (leaked from the NSA) to spread via SMB. Major victims included the UK's National Health Service, which was forced to cancel thousands of appointments. The attack was attributed to Lazarus by the US, UK, and other Five Eyes nations. While financially devastating globally, the relatively small ransom payments suggested the operation may have been partially motivated by disruption.

Cryptocurrency Exchange Attacks (2018-2025)

Lazarus and its BlueNoroff subgroup have conducted an escalating campaign of cryptocurrency theft. Major incidents include the $620 million Ronin Network hack (March 2022), the $100 million Harmony Horizon Bridge theft (June 2022), and the $1.5 billion Bybit exchange compromise (February 2025). These operations frequently use social engineering against exchange employees, trojanized cryptocurrency applications (AppleJeus), and exploitation of smart contract vulnerabilities.

Operation Dream Job / Operation Interception (2020-Present)

A sustained social engineering campaign where Lazarus operators pose as recruiters from major aerospace and defense companies on LinkedIn and other platforms. Targets receive fake job offers containing malicious documents or links that deploy backdoors. This campaign has targeted defense contractors, aerospace engineers, and technology companies across North America, Europe, and Asia, serving both espionage and financial objectives.

Tactics, Techniques & Procedures

Initial Access: Lazarus heavily relies on spear-phishing (T1566) with weaponized documents, often using job recruitment lures or industry-relevant content. The group also conducts watering hole attacks against industry-specific websites and has demonstrated supply chain compromise capabilities, including trojanizing legitimate software installers. For cryptocurrency targets, they frequently use social engineering via LinkedIn and Telegram, building rapport with targets before delivering malicious payloads.

Execution and Persistence: The group uses a combination of custom loaders, DLL side-loading (T1574.002), and living-off-the-land techniques. Persistence is typically achieved through scheduled tasks, registry run keys, and malicious services. Lazarus has shown proficiency with multiple programming languages, deploying tools written in C++, Python, PowerShell, and JavaScript depending on the target environment.

Defense Evasion: Lazarus employs extensive obfuscation (T1027) including multi-layer packing, string encryption, and control flow flattening. The group frequently uses code signing certificates—both stolen and fraudulently obtained—to bypass security controls. They also disable security tools (T1562), clear event logs (T1070), and use timestomping to complicate forensic analysis.

Exfiltration and Impact: Data exfiltration typically occurs over encrypted channels using custom protocols or repurposed legitimate services. For financially motivated operations, the group uses sophisticated cryptocurrency laundering chains involving mixing services, chain-hopping across multiple blockchains, and networks of money mules. In destructive operations, they deploy custom wiper malware designed to overwrite MBR and file systems.

Tools & Malware

  • Manuscrypt (NukeSped): A versatile backdoor family used across multiple campaigns, supporting command execution, file manipulation, and process management. Continuously updated with new variants.
  • Destover: Wiper malware used in the Sony Pictures attack, capable of overwriting the MBR and deleting files using direct disk access.
  • AppleJeus: Trojanized cryptocurrency trading applications distributed through fake company websites, targeting both Windows and macOS users.
  • TraderTraitor: Malicious cryptocurrency applications targeting blockchain developers and DeFi personnel, deployed via social engineering.
  • BLINDINGCAN (DRATzarus): A full-featured remote access trojan with capabilities including file operations, process management, and command execution, reported by CISA in 2020.
  • Fallchill: A RAT used in operations against aerospace and telecommunications sectors, communicating over HTTP with RC4 encryption.
  • ElectricFish: A command-line tunneling utility used to funnel traffic between compromised systems and attacker-controlled infrastructure.
  • DTrack: A sophisticated spyware tool used for reconnaissance and data theft, observed targeting financial institutions and research centers.
  • MATA (Dacls): A cross-platform malware framework supporting Windows, Linux, and macOS, with a modular plugin architecture.

Indicators & Detection

Network-Based Detection:

  • Monitor for unusual outbound connections to known Lazarus C2 infrastructure, particularly traffic on non-standard ports using HTTP/HTTPS with custom headers or unusual User-Agent strings.
  • Watch for connections to newly registered domains that mimic cryptocurrency exchanges, job recruitment platforms, or defense industry companies.
  • Detect tunneling tools like ElectricFish by monitoring for persistent TCP connections with uniform packet sizes.

Host-Based Detection:

  • Look for DLL side-loading in unexpected directories, particularly in user-writable locations with legitimate signed executables.
  • Monitor for scheduled tasks and services created by unusual parent processes or with base64-encoded command lines.
  • Detect Lazarus loaders by monitoring for processes that perform memory injection, particularly those that hollow legitimate Windows processes.
  • Watch for access to cryptocurrency wallet files and browser credential stores, particularly by non-browser processes.

Behavioral Indicators:

  • Unsolicited job offers from recruiters on LinkedIn or Telegram, particularly those insisting on opening documents or running applications as part of a skills assessment.
  • Cryptocurrency trading applications from unknown companies with minimal online presence.
  • Organizations in finance, crypto, defense, and aerospace sectors should treat targeted phishing with job-themed lures as a high-priority alert.
All Threat Actors