Table of Contents
April 3, 2025
|
13m

APT-C-26 or Lazarus Group


A mysterious figure in a dark hoodie is silhouetted against glowing binary code, symbolizing a stealthy hacker or cyber threat actor.

The Lazarus Group, also identified by aliases such as APT-C-26, Hidden Cobra, Zinc, Diamond Sleet, and Group 77, stands as one of the most prolific and persistent state-sponsored cyber threat actors globally. Widely attributed to the Democratic People's Republic of Korea (DPRK), specifically its primary intelligence agency, the Reconnaissance General Bureau (RGB), Lazarus has been operational since at least 2009, possibly earlier. Initially perceived as involved in disruptive attacks and espionage, the group has significantly evolved, adding large-scale financial cybercrime to its repertoire, largely driven by the need to generate revenue for the heavily sanctioned North Korean regime. This profile aims to provide security professionals with a comprehensive understanding of the Lazarus Group, covering its origins, operational tactics, targets, notable campaigns, and effective defense strategies to mitigate the substantial threat it poses. For understanding threat intelligence, it is important to be updated.

Origins & Evolution

The Lazarus Group's activities were first brought into the global spotlight following the destructive cyberattack against Sony Pictures Entertainment (SPE) in 2014, an incident dubbed "Operation Blockbuster." However, cybersecurity researchers trace their origins further back, potentially to 2007 or 2009, coinciding with early DDoS attacks against South Korean targets ("Operation Troy," "Ten Days of Rain," "DarkSeoul"). The U.S. government formally attributed the SPE attack to North Korea and subsequently designated the group as "Hidden Cobra" (Alert TA17-164A), confirming its state-sponsored nature.

Defining the precise boundaries of Lazarus Group is challenging due to the complex and sometimes overlapping nature of North Korean cyber operations. Different security organizations use varying nomenclature, and Lazarus is often used as an umbrella term encompassing several distinct, yet interconnected, clusters or subgroups. Notable subgroups believed to operate under or alongside Lazarus include:

  • Bluenoroff (APT38, Stardust Chollima, NICKEL GLADSTONE): Primarily focused on financially motivated cybercrime, targeting banks, financial institutions, and cryptocurrency exchanges through sophisticated heists (e.g., Bangladesh Bank Heist).

  • Andariel (Silent Chollima, Dark Seoul, Wassonite, Onyx Sleet): Primarily targets South Korean entities, including government, defense, and critical infrastructure, often employing ransomware and espionage tactics.

Despite these subdivisions, shared infrastructure, malware code (evidenced by code reuse like the Caracachs cipher), TTPs, and overarching objectives strongly link these activities back to a central North Korean command structure. The U.S. Department of Justice has indicted individuals like Park Jin Hyok, Jon Chang Hyok, and Kim Il Park, linking them directly to Lazarus activities and confirming the group's role in North Korea's strategy to undermine global cybersecurity and generate illicit revenue to bypass international sanctions. The group's evolution showcases a shift from primarily espionage and disruption to incorporating sophisticated financial theft, particularly targeting the SWIFT network and the burgeoning cryptocurrency ecosystem, demonstrating adaptability and resourcefulness in achieving state objectives. Intelligence also suggests North Korean hackers receive specialized training vocationally in Shenyang, China, and domestically at elite institutions like Kim Chaek University of Technology, Kim Il Sung University, and Moranbong University.

Tactics & Techniques

Lazarus Group employs a wide and evolving array of Tactics, Techniques, and Procedures (TTPs) spanning the entire attack lifecycle. Their operations are characterized by patience, persistence, and the use of both custom and readily available tools. The group uses both zero-day exploits and vulnerable components.

Initial Access:

  • Spear Phishing (T1566): Highly targeted emails, often masquerading as job offers ("Dream Job" campaigns) or using tailored lures relevant to the target organization or sector (e.g., COVID-19 research for pharmaceutical companies).

  • Watering Hole Attacks (T1189): Compromising legitimate websites frequented by potential victims to deliver malware.

  • Supply Chain Attacks: Compromising software vendors or updates to gain access to downstream targets.

  • Exploitation of Vulnerabilities: Leveraging both zero-day exploits (purchased or discovered) and known vulnerabilities (N-days) in software like Adobe Flash, Microsoft Office, Hancom Hangul (popular South Korean word processor), and network infrastructure (e.g., Log4Shell - CVE-2021-44228 in "Operation Blacksmith").

Execution:

  • Command and Scripting Interpreters: Extensive use of Windows Command Shell (T1059.003), PowerShell (T1059.001), and JavaScript (T1059.007).

  • User Execution (T1204.002): Relies on users opening malicious attachments or clicking malicious links.

  • Mshta (T1218.005): Executing malicious HTA files.

Persistence:

  • Boot or Logon Autostart Execution (T1547.001): Using Registry Run Keys or Startup Folders.

  • Scheduled Task/Job (T1053.005): Creating scheduled tasks for malware execution.

  • Pre-OS Boot: Bootkit (T1542.003): Modifying the Master Boot Record (MBR) for persistence (e.g., WhiskeyAlfa-Three bootkit).

Privilege Escalation & Lateral Movement:

  • Valid Accounts (T1078): Using stolen credentials, often administrator accounts.

  • Brute Force: Password Spraying (T1110.003): Targeting common accounts like "Administrator" with weak passwords across network shares. Understanding what is brute force will help.

  • Exploitation for Privilege Escalation: Using exploits to gain higher privileges.

  • Remote Services (T1021): Utilizing SSH, RDP, or other remote services for movement, sometimes leveraging tools like PuTTY PSCP (T1021.004).

  • Internal Proxy (T1090.001): Using compromised routers or devices as proxies to pivot within networks.

  • Network Share Discovery (T1135): Mapping network drives and shares.

Defense Evasion:

  • Masquerading (T1036): Disguising malicious files or processes as legitimate ones (T1036.004 - Masquerade Task or Service).

  • Indicator Removal (T1070): Clearing logs (T1070.001 - Clear Windows Event Logs), deleting files securely (T1485 - Data Destruction by overwriting), clearing command history (especially on network devices), restoring modified code.

  • Timestomping (T1070.006): Modifying file timestamps to match legitimate system files.

  • Reflective Code Loading (T1620): Injecting shellcode directly into memory.

  • Process Injection (T1055.001): Injecting malicious code into legitimate processes (DLL Injection).

  • Non-Standard Port (T1571): Using unusual ports for C2 communication to bypass firewall rules.

Discovery:

  • System Information Discovery (T1082): Gathering OS, hardware, and configuration details.

  • System Network Configuration Discovery (T1016): Retrieving IP address, gateway, DNS, etc.

  • System Network Connections Discovery (T1049): Identifying active network connections (e.g., using net use).

  • Network Service Discovery (T1046): Scanning for open ports and services (e.g., using nmap).

  • Query Registry (T1012): Checking for security software, VNC/RDP presence, and cryptocurrency wallet information.

  • Application Window Discovery (T1010): Identifying active application windows.

  • System Time Discovery (T1124): Obtaining system time, potentially for synchronization or evasion.

Collection & Exfiltration:

  • Archive Collected Data (T1560): Compressing stolen data using tools like RAR or custom malware (T1560.001 - Archive via Utility; T1560.002 - Archive via Library, e.g., Zlib).

  • Exfiltration Over C2 Channel (T1041): Sending stolen data back through the established command and control channel.

Command and Control (C2):

  • Application Layer Protocol: Using standard protocols like HTTP/HTTPS, often mimicking legitimate traffic. Mail Protocols (T1071.003) are sometimes used.

  • Web Service (T1102.002): Abusing legitimate services like GitHub for C2 communication.

  • Fallback Channels (T1008): Using multiple hardcoded C2 servers or domains.

  • Multi-Stage Channels (T1104): Employing staged payloads where initial implants download further components.

Impact:

  • Data Destruction (T1485): Using wiper malware (e.g., KillDisk, Destroyer, Whiskey series) to destroy data (T1561.001 - Disk Content Wipe).

  • Service Stop (T1489): Stopping critical services (e.g., MSExchangeIS).

  • System Shutdown/Reboot (T1529): Rebooting systems after destruction.

  • Ransomware: Deploying ransomware like WannaCry for widespread disruption and financial gain.

Targets or Victimology

Lazarus Group exhibits a broad target scope driven by the dual objectives of espionage and financial gain, mandated by the North Korean state. Their victimology reflects these strategic priorities:

  • Financial Sector: Banks, financial institutions, and SWIFT system users globally have been primary targets for large-scale theft (e.g., Bangladesh Bank, Banco del Austro, Polish and Mexican banks). This directly supports the regime by generating hard currency.

  • Cryptocurrency Ecosystem: Cryptocurrency exchanges, wallet providers, DeFi platforms (e.g., Axie Infinity's Ronin Bridge, Harmony's Horizon Bridge, Atomic Wallet, Stake.com), and individual users (especially in South Korea) are heavily targeted. Stolen cryptocurrency is laundered (sometimes using mixers like the sanctioned Blender.io) to bypass financial sanctions.

  • Government & Defense: Espionage operations frequently target government agencies, defense contractors, aerospace companies, and military organizations, primarily in South Korea, the United States, and increasingly other nations perceived as adversaries or possessing valuable technology (e.g., NPO Mashinostroyeniya in Russia).

  • Critical Infrastructure & Energy: Sectors vital to national security and economy are targeted for espionage and potential disruption.

  • Technology & IT Providers: Targeting IT service providers allows for supply chain attacks, granting access to a wider range of downstream victims.

  • Pharmaceutical & Research: Attacks intensified during the COVID-19 pandemic, targeting vaccine research and pharmaceutical companies (e.g., AstraZeneca).

  • Media & Entertainment: The Sony Pictures Entertainment attack remains a prominent example, motivated by opposition to a film critical of the DPRK regime.

  • NGOs, Human Rights Organizations, Defectors, and Journalists: Individuals and groups critical of the North Korean regime are targeted for espionage and intimidation.

Geographic Focus: While South Korea and the United States remain primary targets due to geopolitical tensions, Lazarus operates globally, with victims identified across Asia, Europe, North America, South America, and Africa.

Motivations:

  • Financial Gain: A critical driver, aimed at funding the regime and circumventing international economic sanctions.

  • Espionage: Gathering political, military, economic, and technological intelligence.

  • Sabotage & Disruption: Destructive attacks aimed at causing operational damage or sending political messages.

Potential Impact: Attacks can result in massive financial losses, theft of sensitive intellectual property and state secrets, operational disruption, reputational damage, and systemic risk, particularly within the financial and cryptocurrency sectors. Understanding the OWASP Top 10 helps to prevent attacks.

Attack Campaigns

Lazarus Group has been responsible for numerous high-profile and impactful cyber campaigns over the years. Some of the most notable include:

  • Operation Troy (2009-2012): Early DDoS attacks targeting South Korean government and financial websites.

  • Operation DarkSeoul / 1Million (2013): Large-scale attacks involving DDoS and data wiping against South Korean broadcasters and banks.

  • Sony Pictures Entertainment Hack (Operation Blockbuster) (2014): Destructive wiper attack, data theft, and leaks motivated by the movie "The Interview."

  • Bank Heists (2015-Present): A series of sophisticated attacks targeting the SWIFT network, including the attempted $1 billion theft ($81 million successfully stolen) from Bangladesh Bank (2016), and attacks on banks in Ecuador, Vietnam, Poland, Mexico, India, and Chile (FastCash ATM attacks).

  • WannaCry Ransomware Attack (2017): Global ransomware outbreak leveraging the EternalBlue SMB exploit (attributed to the NSA). While debated, attribution points strongly to Lazarus, whether intended for pure financial gain or disruption.

  • Cryptocurrency Heists (Ongoing): Numerous attacks targeting exchanges (Youbit bankruptcy, Bithumb, Nicehash, CoinEx), DeFi protocols (Axie Infinity/Ronin Bridge - $625M, Harmony Horizon Bridge - $100M, Atomic Wallet - $100M+, Stake.com - $41M), and users (Operation AppleJeus). OFAC has sanctioned specific cryptocurrency addresses linked to Lazarus. Reports suggest hundreds of millions stolen annually.

  • Attacks on Pharmaceutical Companies (2020): Targeting COVID-19 vaccine research and development efforts globally.

  • "Dream Job" Campaigns (Ongoing): Social engineering campaigns using fake job offers to target individuals in aerospace, defense, and IT sectors, including security researchers.

  • NPO Mashinostroyeniya Breach (2021-2022): Espionage campaign targeting a major Russian missile engineering company, potentially seeking missile technology secrets.

  • VMConnect Campaign (2023): Use of malicious Python packages on PyPI targeting developers.

  • Operation Blacksmith (2023-Ongoing): Exploitation of the Log4Shell vulnerability using Dlang-based malware (NineRAT, DLRAT) against manufacturing, agricultural, and security companies globally. Linked to the Andariel subgroup (Onyx Sleet).

  • Bybit Hack (Reported Feb 2025 - Note: This date is futuristic and likely speculative or erroneous in source material; adjust if needed based on real events): Potential large-scale cryptocurrency exchange hack (Details should be verified against actual events). One of the recent news is North Korean Hackers Steal from Bybit.

These campaigns demonstrate the group's evolving capabilities, diverse motivations, and persistent threat to a wide range of global targets.

Defenses

Defending against a sophisticated and persistent actor like Lazarus Group requires a multi-layered, proactive security posture. No single solution is sufficient; a combination of technical controls, user awareness, and robust processes is essential. The most important thing is patch management.

  • Strong Authentication & Access Control: Implement Multi-Factor Authentication (MFA) universally, enforce the principle of least privilege, and regularly review access rights.

  • Patch Management: Aggressively patch vulnerabilities, particularly those known to be exploited by Lazarus (e.g., Log4Shell, Microsoft Office, Adobe products, relevant web frameworks). Prioritize patching internet-facing systems and critical infrastructure.

  • Email & Web Security: Deploy advanced email filtering solutions to detect spear phishing and malicious attachments. Use web security gateways to block access to known malicious domains and filter malicious content.

  • Network Security: Implement network segmentation to limit lateral movement. Monitor network traffic for anomalies, C2 communication (including non-standard ports and suspicious DNS requests), and data exfiltration. Employ Intrusion Detection/Prevention Systems (IDPS).

  • Endpoint Security: Utilize robust Endpoint Detection and Response (EDR) solutions capable of detecting advanced malware, fileless attacks, process injection, and suspicious system behavior (e.g., suspicious mshta.exe or cmd.exe usage, nmap scans). Keep antivirus signatures and behavioral detection engines updated.

  • User Awareness Training: Educate users about phishing, social engineering tactics (like fake job offers), and safe browsing habits. Emphasize skepticism towards unsolicited communications and attachments.

  • Threat Intelligence: Leverage threat intelligence feeds to stay informed about Lazarus TTPs, Indicators of Compromise (IoCs - domains, IPs, hashes, crypto addresses), and ongoing campaigns. Integrate this intelligence into security tools (SIEM, EDR, Firewalls). Understanding indicator of compromise is very helpful.

  • Vulnerability Management: Conduct regular vulnerability scanning and penetration testing to identify and remediate weaknesses proactively.

  • Incident Response Plan: Develop and regularly test a comprehensive incident response plan specifically considering destructive wiper attacks and large-scale financial theft scenarios. Ensure backups are offline and immutable.

  • Cryptocurrency Security: For organizations dealing with digital assets, implement stringent wallet security, monitor transactions for known sanctioned addresses (using tools and OFAC SDN list data), and be wary of fake wallet applications or investment schemes.

  • Supply Chain Risk Management: Vet third-party software and service providers for security practices. Monitor for signs of compromise originating from trusted partners.

  • Sanctions Compliance: Implement screening processes using OFAC's SDN list and other relevant sanctions lists, particularly for financial transactions and cryptocurrency dealings, understanding the limitations and need for due diligence.

By implementing these defense strategies, organizations can significantly reduce their attack surface and improve their ability to detect, respond to, and recover from attacks orchestrated by Lazarus Group. Also, knowing what is SIEM is very helpful.

Conclusion (approx. 100 words)

The Lazarus Group (APT-C-26) represents a formidable and enduring cyber threat, unequivocally linked to North Korea. Operating with dual motivations of state-sponsored espionage and large-scale financial crime aimed at circumventing sanctions, Lazarus demonstrates remarkable adaptability and technical sophistication. Their extensive history includes disruptive attacks, major bank heists, widespread ransomware campaigns like WannaCry, and persistent targeting of the cryptocurrency sector. Characterized by evolving TTPs, custom malware, and global reach, defending against Lazarus requires a robust, intelligence-driven security posture encompassing technical controls, vigilant monitoring, user education, and proactive threat hunting to mitigate the significant risks they pose worldwide.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

• North Korean Lazarus Group Hacks Bybit Crypto Exchange for $1.5 Billion

• North Korean Hackers Deploy New OtterCookie Malware Targeting Software Developers

• Lazarus Hacking Group

• North Korean Hackers Steal $308 Million from DMM Bitcoin Exchange

• North Korean Hackers Deploy New Android Spyware Targeting Former Soviet States

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe