Search Again

Lazarus Group

Rank: 1
Get Free Access to Insights

Summary of Actor: Lazarus Group, also known as APT38, is a highly sophisticated, state-sponsored threat actor attributed to North Korea. The group is known for its cyber espionage, financially motivated attacks, and disruptive cyber operations targeting various industries worldwide. Active since at least 2009, Lazarus has been responsible for major financial heists, intellectual property theft, and destructive malware campaigns.

General Features:

  • Nation-State Backing: Strongly linked to the North Korean government, likely operating under the Reconnaissance General Bureau (RGB).
  • Advanced Tactics: Utilizes custom malware, zero-day exploits, supply chain attacks, and sophisticated social engineering techniques.
  • Diverse Targeting: Initially focused on government and military espionage, but now predominantly targeting financial institutions, cryptocurrency exchanges, blockchain-related firms, and high-value enterprises.
  • Evasion Capabilities: Employs multi-stage attacks, obfuscation techniques, and legitimate tools to evade detection and persistence.

Related Other Groups:

Reaper,imsuky (APT37),Andariel,BlueNoroff (APT38)

Indicators of Attack (IoA):

  • Spear-Phishing & Social Engineering
  • Custom Malware & Exploits
  • Compromise of Supply Chains & Software Updates
  • Command-and-Control (C2) Infrastructure
  • Cryptocurrency Theft & Laundering

Recent Activities and Trends:

  • Latest Campaigns :
    • ByBit Cryptocurrency Exchange Attack
    • Ransomware & Supply Chain Attacks
    • Advanced Blockchain Attacks
  • Emerging Trends :
    • Increased Focus on Financial Cybercrime
    • Use of AI for Social Engineering & Phishing
    • Use of AI for Social Engineering & Phishing Targeting of Cybersecurity & Threat Intelligence Firms

...

Also Known As:

UNC4736

Appleworm

Hidden Cobra

UNC2970

Guardians of Peace

+24

Target Countries

Germany

Australia

Poland

USA

Worldwide (WannaCry)

+23


Target Sectors

Energy & Utilities

Finance

HealthCare & Social Assistance

Public Administration

Electrical&Electronical Manufacturing

+2


Associated Malware/Software

osx.hloader

win.hoplight

comebacker

win.dyepack

Trojan:Win32/SmokeLoader

+208


️Related CVEs

ATT&CK IDs:

T1048 - Exfiltration Over Alternative Protocol

T1060 - Registry Run Keys / Startup Folder

T1497 - Virtualization/Sandbox Evasion

T1195.001

T1090 - Proxy

+420

Tactic Id Technique
Collection T1557 Adversary-in-the-Middle

Sub Techniques

Detections

Mitigations

Collection T1530 Data from Cloud Storage

Sub Techniques

Detections

Mitigations

Collection T1025 Data from Removable Media

Sub Techniques

Detections

Mitigations

Collection T1056 Input Capture

Sub Techniques

Detections

Mitigations

Collection T1074 Data Staged

Sub Techniques

Detections

Mitigations

Collection T1039 Data from Network Shared Drive

Sub Techniques

Detections

Mitigations

Collection T1005 Data from Local System

Sub Techniques

Detections

Mitigations

Collection T1213 Data from Information Repositories

Sub Techniques

Detections

Mitigations

Collection T1119 Automated Collection

Sub Techniques

Detections

Mitigations

Collection T1115 Clipboard Data

Sub Techniques

Detections

Mitigations

Collection T1560 Archive Collected Data

Sub Techniques

Detections

Mitigations

Collection T1125 Video Capture

Sub Techniques

Detections

Mitigations

Collection T1114 Email Collection

Sub Techniques

Detections

Mitigations

Collection T1113 Screen Capture

Sub Techniques

Detections

Mitigations

Command And Control T1104 Multi-Stage Channels

Sub Techniques

Detections

Mitigations

Command And Control T1001 Data Obfuscation

Sub Techniques

Detections

Mitigations

Command And Control T1095 Non-Application Layer Protocol

Sub Techniques

Detections

Mitigations

Command And Control T1568 Dynamic Resolution

Sub Techniques

Detections

Mitigations

Command And Control T1024 Custom Cryptographic Protocol

Sub Techniques

Detections

Mitigations

Command And Control T1105 Ingress Tool Transfer

Sub Techniques

Detections

Mitigations

Command And Control T1071 Application Layer Protocol

Sub Techniques

Detections

Mitigations

Command And Control T1571 Non-Standard Port

Sub Techniques

Detections

Mitigations

Command And Control T1102 Web Service

Sub Techniques

Detections

Mitigations

Command And Control T1132 Data Encoding

Sub Techniques

Detections

Mitigations

Command And Control T1219 Remote Access Software

Sub Techniques

Detections

Mitigations

Command And Control T1008 Fallback Channels

Sub Techniques

Detections

Mitigations

Command And Control T1572 Protocol Tunneling

Sub Techniques

Detections

Mitigations

Command And Control T1573 Encrypted Channel

Sub Techniques

Detections

Mitigations

Command And Control T1090 Proxy

Sub Techniques

Detections

Mitigations

Credential Access T1557 Adversary-in-the-Middle

Sub Techniques

Detections

Mitigations

Credential Access T1056 Input Capture

Sub Techniques

Detections

Mitigations

Credential Access T1556 Modify Authentication Process

Sub Techniques

Detections

Mitigations

Credential Access T1555 Credentials from Password Stores

Sub Techniques

Detections

Mitigations

Credential Access T1040 Network Sniffing

Sub Techniques

Detections

Mitigations

Credential Access T1139 Bash History

Sub Techniques

Detections

Mitigations

Credential Access T1111 Multi-Factor Authentication Interception

Sub Techniques

Detections

Mitigations

Credential Access T1110 Brute Force

Sub Techniques

Detections

Mitigations

Credential Access T1081 Credentials in Files

Sub Techniques

Detections

Mitigations

Credential Access T1187 Forced Authentication

Sub Techniques

Detections

Mitigations

Credential Access T1003 OS Credential Dumping

Sub Techniques

Detections

Mitigations

Credential Access T1552 Unsecured Credentials

Sub Techniques

Detections

Mitigations

Defense Evasion T1548 Abuse Elevation Control Mechanism

Sub Techniques

Detections

Mitigations

Defense Evasion T1574 Hijack Execution Flow

Sub Techniques

Detections

Mitigations

Defense Evasion T1127 Trusted Developer Utilities Proxy Execution

Sub Techniques

Detections

Mitigations

Defense Evasion T1140 Deobfuscate/Decode Files or Information

Sub Techniques

Detections

Mitigations

Defense Evasion T1070 Indicator Removal

Sub Techniques

Detections

Mitigations

Defense Evasion T1556 Modify Authentication Process

Sub Techniques

Detections

Mitigations

Defense Evasion T1220 XSL Script Processing

Sub Techniques

Detections

Mitigations

Defense Evasion T1553 Subvert Trust Controls

Sub Techniques

Detections

Mitigations

Defense Evasion T1542 Pre-OS Boot

Sub Techniques

Detections

Mitigations

Defense Evasion T1562 Impair Defenses

Sub Techniques

Detections

Mitigations

Defense Evasion T1036 Masquerading

Sub Techniques

Detections

Mitigations

Defense Evasion T1497 Virtualization/Sandbox Evasion

Sub Techniques

Detections

Mitigations

Defense Evasion T1045 Software Packing

Sub Techniques

Detections

Mitigations

Defense Evasion T1564 Hide Artifacts

Sub Techniques

Detections

Mitigations

Defense Evasion T1112 Modify Registry

Sub Techniques

Detections

Mitigations

Defense Evasion T1480 Execution Guardrails

Sub Techniques

Detections

Mitigations

Defense Evasion T1221 Template Injection

Sub Techniques

Detections

Mitigations

Defense Evasion T1107 File Deletion

Sub Techniques

Detections

Mitigations

Defense Evasion T1218 System Binary Proxy Execution

Sub Techniques

Detections

Mitigations

Defense Evasion T1134 Access Token Manipulation

Sub Techniques

Detections

Mitigations

Defense Evasion T1064 Scripting

Sub Techniques

Detections

Mitigations

Defense Evasion T1143 Hidden Window

Sub Techniques

Detections

Mitigations

Defense Evasion T1055 Process Injection

Sub Techniques

Detections

Mitigations

Defense Evasion T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Defense Evasion T1202 Indirect Command Execution

Sub Techniques

Detections

Mitigations

Defense Evasion T1550 Use Alternate Authentication Material

Sub Techniques

Detections

Mitigations

Defense Evasion T1620 Reflective Code Loading

Sub Techniques

Detections

Mitigations

Defense Evasion T1027 Obfuscated Files or Information

Sub Techniques

Detections

Mitigations

Defense Evasion T1622 Debugger Evasion

Sub Techniques

Detections

Mitigations

Defense Evasion T1089 Disabling Security Tools

Sub Techniques

Detections

Mitigations

Defense Evasion T1014 Rootkit

Sub Techniques

Detections

Mitigations

Defense Evasion T1656 Impersonation

Sub Techniques

Detections

Mitigations

Discovery T1046 Network Service Discovery

Sub Techniques

Detections

Mitigations

Discovery T1007 System Service Discovery

Sub Techniques

Detections

Mitigations

Discovery T1082 System Information Discovery

Sub Techniques

Detections

Mitigations

Discovery T1124 System Time Discovery

Sub Techniques

Detections

Mitigations

Discovery T1135 Network Share Discovery

Sub Techniques

Detections

Mitigations

Discovery T1217 Browser Information Discovery

Sub Techniques

Detections

Mitigations

Discovery T1040 Network Sniffing

Sub Techniques

Detections

Mitigations

Discovery T1010 Application Window Discovery

Sub Techniques

Detections

Mitigations

Discovery T1614 System Location Discovery

Sub Techniques

Detections

Mitigations

Discovery T1057 Process Discovery

Sub Techniques

Detections

Mitigations

Discovery T1012 Query Registry

Sub Techniques

Detections

Mitigations

Discovery T1497 Virtualization/Sandbox Evasion

Sub Techniques

Detections

Mitigations

Discovery T1016 System Network Configuration Discovery

Sub Techniques

Detections

Mitigations

Discovery T1033 System Owner/User Discovery

Sub Techniques

Detections

Mitigations

Discovery T1083 File and Directory Discovery

Sub Techniques

Detections

Mitigations

Discovery T1063 Security Software Discovery

Sub Techniques

Detections

Mitigations

Discovery T1087 Account Discovery

Sub Techniques

Detections

Mitigations

Discovery T1518 Software Discovery

Sub Techniques

Detections

Mitigations

Discovery T1018 Remote System Discovery

Sub Techniques

Detections

Mitigations

Discovery T1622 Debugger Evasion

Sub Techniques

Detections

Mitigations

Discovery T1049 System Network Connections Discovery

Sub Techniques

Detections

Mitigations

Execution T1059 Command and Scripting Interpreter

Sub Techniques

Detections

Mitigations

Execution T1053 Scheduled Task/Job

Sub Techniques

Detections

Mitigations

Execution T1559 Inter-Process Communication

Sub Techniques

Detections

Mitigations

Execution T1203 Exploitation for Client Execution

Sub Techniques

Detections

Mitigations

Execution T1047 Windows Management Instrumentation

Sub Techniques

Detections

Mitigations

Execution T1569 System Services

Sub Techniques

Detections

Mitigations

Execution T1072 Software Deployment Tools

Sub Techniques

Detections

Mitigations

Execution T1204 User Execution

Sub Techniques

Detections

Mitigations

Execution T1155 AppleScript

Sub Techniques

Detections

Mitigations

Execution T1064 Scripting

Sub Techniques

Detections

Mitigations

Execution T1129 Shared Modules

Sub Techniques

Detections

Mitigations

Execution T1106 Native API

Sub Techniques

Detections

Mitigations

Exfiltration T1048 Exfiltration Over Alternative Protocol

Sub Techniques

Detections

Mitigations

Exfiltration T1002 Data Compressed

Sub Techniques

Detections

Mitigations

Exfiltration T1022 Data Encrypted

Sub Techniques

Detections

Mitigations

Exfiltration T1011 Exfiltration Over Other Network Medium

Sub Techniques

Detections

Mitigations

Exfiltration T1567 Exfiltration Over Web Service

Sub Techniques

Detections

Mitigations

Exfiltration T1041 Exfiltration Over C2 Channel

Sub Techniques

Detections

Mitigations

Impact T1486 Data Encrypted for Impact

Sub Techniques

Detections

Mitigations

Impact T1529 System Shutdown/Reboot

Sub Techniques

Detections

Mitigations

Impact T1499 Endpoint Denial of Service

Sub Techniques

Detections

Mitigations

Impact T1561 Disk Wipe

Sub Techniques

Detections

Mitigations

Impact T1491 Defacement

Sub Techniques

Detections

Mitigations

Impact T1498 Network Denial of Service

Sub Techniques

Detections

Mitigations

Impact T1531 Account Access Removal

Sub Techniques

Detections

Mitigations

Impact T1496 Resource Hijacking

Sub Techniques

Detections

Mitigations

Impact T1490 Inhibit System Recovery

Sub Techniques

Detections

Mitigations

Impact T1485 Data Destruction

Sub Techniques

Detections

Mitigations

Impact T1495 Firmware Corruption

Sub Techniques

Detections

Mitigations

Impact T1489 Service Stop

Sub Techniques

Detections

Mitigations

Impact T1565 Data Manipulation

Sub Techniques

Detections

Mitigations

Initial Access T1193 Spearphishing Attachment

Sub Techniques

Detections

Mitigations

Initial Access T1566 Phishing

Sub Techniques

Detections

Mitigations

Initial Access T1190 Exploit Public-Facing Application

Sub Techniques

Detections

Mitigations

Initial Access T1133 External Remote Services

Sub Techniques

Detections

Mitigations

Initial Access T1195 Supply Chain Compromise

Sub Techniques

Detections

Mitigations

Initial Access T1199 Trusted Relationship

Sub Techniques

Detections

Mitigations

Initial Access T1189 Drive-by Compromise

Sub Techniques

Detections

Mitigations

Initial Access T1192 Spearphishing Link

Sub Techniques

Detections

Mitigations

Initial Access T1091 Replication Through Removable Media

Sub Techniques

Detections

Mitigations

Initial Access T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Lateral Movement T1534 Internal Spearphishing

Sub Techniques

Detections

Mitigations

Lateral Movement T1570 Lateral Tool Transfer

Sub Techniques

Detections

Mitigations

Lateral Movement T1017 Application Deployment Software

Sub Techniques

Detections

Mitigations

Lateral Movement T1072 Software Deployment Tools

Sub Techniques

Detections

Mitigations

Lateral Movement T1021 Remote Services

Sub Techniques

Detections

Mitigations

Lateral Movement T1210 Exploitation of Remote Services

Sub Techniques

Detections

Mitigations

Lateral Movement T1091 Replication Through Removable Media

Sub Techniques

Detections

Mitigations

Lateral Movement T1563 Remote Service Session Hijacking

Sub Techniques

Detections

Mitigations

Lateral Movement T1550 Use Alternate Authentication Material

Sub Techniques

Detections

Mitigations

Persistence T1053 Scheduled Task/Job

Sub Techniques

Detections

Mitigations

Persistence T1543 Create or Modify System Process

Sub Techniques

Detections

Mitigations

Persistence T1574 Hijack Execution Flow

Sub Techniques

Detections

Mitigations

Persistence T1505 Server Software Component

Sub Techniques

Detections

Mitigations

Persistence T1136 Create Account

Sub Techniques

Detections

Mitigations

Persistence T1060 Registry Run Keys / Startup Folder

Sub Techniques

Detections

Mitigations

Persistence T1547 Boot or Logon Autostart Execution

Sub Techniques

Detections

Mitigations

Persistence T1556 Modify Authentication Process

Sub Techniques

Detections

Mitigations

Persistence T1176 Browser Extensions

Sub Techniques

Detections

Mitigations

Persistence T1133 External Remote Services

Sub Techniques

Detections

Mitigations

Persistence T1542 Pre-OS Boot

Sub Techniques

Detections

Mitigations

Persistence T1037 Boot or Logon Initialization Scripts

Sub Techniques

Detections

Mitigations

Persistence T1546 Event Triggered Execution

Sub Techniques

Detections

Mitigations

Persistence T1098 Account Manipulation

Sub Techniques

Detections

Mitigations

Persistence T1137 Office Application Startup

Sub Techniques

Detections

Mitigations

Persistence T1023 Shortcut Modification

Sub Techniques

Detections

Mitigations

Persistence T1031 Modify Existing Service

Sub Techniques

Detections

Mitigations

Persistence T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Persistence T1138 Application Shimming

Sub Techniques

Detections

Mitigations

Privilege Escalation T1053 Scheduled Task/Job

Sub Techniques

Detections

Mitigations

Privilege Escalation T1543 Create or Modify System Process

Sub Techniques

Detections

Mitigations

Privilege Escalation T1548 Abuse Elevation Control Mechanism

Sub Techniques

Detections

Mitigations

Privilege Escalation T1574 Hijack Execution Flow

Sub Techniques

Detections

Mitigations

Privilege Escalation T1068 Exploitation for Privilege Escalation

Sub Techniques

Detections

Mitigations

Privilege Escalation T1547 Boot or Logon Autostart Execution

Sub Techniques

Detections

Mitigations

Privilege Escalation T1037 Boot or Logon Initialization Scripts

Sub Techniques

Detections

Mitigations

Privilege Escalation T1546 Event Triggered Execution

Sub Techniques

Detections

Mitigations

Privilege Escalation T1098 Account Manipulation

Sub Techniques

Detections

Mitigations

Privilege Escalation T1134 Access Token Manipulation

Sub Techniques

Detections

Mitigations

Privilege Escalation T1055 Process Injection

Sub Techniques

Detections

Mitigations

Privilege Escalation T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Privilege Escalation T1138 Application Shimming

Sub Techniques

Detections

Mitigations

Reconnaissance T1589 Gather Victim Identity Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1595 Active Scanning

Sub Techniques

Detections

Mitigations

Reconnaissance T1592 Gather Victim Host Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1590 Gather Victim Network Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1591 Gather Victim Org Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1596 Search Open Technical Databases

Sub Techniques

Detections

Mitigations

Reconnaissance T1593 Search Open Websites/Domains

Sub Techniques

Detections

Mitigations

Resource Development T1586 Compromise Accounts

Sub Techniques

Detections

Mitigations

Resource Development T1588 Obtain Capabilities

Sub Techniques

Detections

Mitigations

Resource Development T1587 Develop Capabilities

Sub Techniques

Detections

Mitigations

Resource Development T1584 Compromise Infrastructure

Sub Techniques

Detections

Mitigations

Resource Development T1585 Establish Accounts

Sub Techniques

Detections

Mitigations

Resource Development T1583 Acquire Infrastructure

Sub Techniques

Detections

Mitigations

Resource Development T1608 Stage Capabilities

Sub Techniques

Detections

Mitigations

Total Count : 676


https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
https://github.com/hvs-consulting/ioc_signatures/tree/main/Lazarus_APT37
https://www.clearskysec.com/wp-content/uploads/2020/08/Dream-Job-Campaign.pdf
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479
https://www.nttsecurity.com/docs/librariesprovider3/default-document-library/craftypanda-analysis-report
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-232a
https://blog.nviso.eu/2022/02/24/threat-update-ukraine-russia-tensions/
https://securelist.com/apt-trends-report-q2-2019/91897/
https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/webworm-espionage-rats
https://home.treasury.gov/index.php/news/press-releases/sm774
https://slowmist.medium.com/slowmist-our-in-depth-investigation-of-north-korean-apts-large-scale-phishing-attack-on-nft-users-362117600519
https://www.bankinfosecurity.com/south-korea-sanctions-pyongyang-hackers-a-21193
https://usa.kaspersky.com/about/press-releases/2021_apt-actor-lazarus-attacks-defense-industry-develops-supply-chain-attack-capabilities
https://baesystemsai.blogspot.com/2017/02/lazarus-watering-hole-attacks.html
https://www.anquanke.com/post/id/230161
https://mandiant.widen.net/s/pkffwrbjlz/m-trends-2023
https://download.hauri.net/DownSource/down/dwn_detail_down.html?uid=55
http://report.threatbook.cn/LS.pdf
https://www.cfr.org/interactive/cyber-operations/operation-ghostsecret
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/lazarus-recruitment/
https://asec.ahnlab.com/en/54195/
https://securelist.com/lazarus-new-malware/115059/
https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
https://web.archive.org/web/20130607233212/https://www.symantec.com/connect/blogs/south-korean-financial-companies-targeted-castov
https://securelist.com/it-threat-evolution-q2-2023/110355/
https://blog.talosintelligence.com/2019/01/fake-korean-job-posting.html
https://www.proofpoint.com/us/threat-insight/post/north-korea-bitten-bitcoin-bug-financially-motivated-campaigns-reveal-new
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
https://www.zdnet.com/article/north-korean-hackers-infiltrate-chiles-atm-network-after-skype-job-interview/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-north-star-a-job-offer-thats-too-good-to-be-true/
https://www.us-cert.gov/ncas/analysis-reports/ar20-133a
https://securelist.com/apt-trends-report-q3-2020/99204/
https://eromang.zataz.com/tag/agentbase-exe/
https://i.blackhat.com/USA-20/Wednesday/us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-Actors-Use-Public-Standards-For-Financial-Fraud-wp.pdf
https://blogs.jpcert.or.jp/en/2024/02/lazarus_pypi.html
https://www.proofpoint.com/sites/default/files/pfpt-us-wp-north-korea-bitten-by-bitcoin-bug-180129.pdf
https://securelist.com/apt-trends-report-q1-2021/101967/
https://www.us-cert.gov/ncas/alerts/TA17-318B
https://drive.google.com/file/d/1lq0Sjw4FKBxf017Ss7W7uGMvs7CgFzcA/view
https://github.com/Hildaboo/Unidentified081Server
https://st.drweb.com/static/new-www/news/2021/april/drweb_research_attacks_on_russian_research_institutes_en.pdf
https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/
https://www.clearskysec.com/wp-content/uploads/2020/06/CryptoCore_Group.pdf
https://cybersecurity.att.com/blogs/labs-research/lazarus-campaign-ttps-and-evolution
https://securelist.com/lazarus-trojanized-defi-app/106195/
https://www.bleepingcomputer.com/news/security/us-sanctions-crypto-mixer-tornado-cash-used-by-north-korean-hackers/
https://www.youtube.com/watch?v=1NkzTKkEM2k
https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-june-2023/
https://blog.lexfo.fr/ressources/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf
https://www.cyberscoop.com/north-korea-hackers-lazarus-group-israel-defense/
https://businessinsights.bitdefender.com/tech-advisory-manageengine-cve-2022-47966
https://www.symantec.com/connect/blogs/trojankoredos-comes-unwelcomed-surprise
https://attack.mitre.org/groups/G0032
https://attack.mitre.org/groups/G0001/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?1625657388
https://app.box.com/s/xyyord0b806e6or2nh92coxw2areyyx4
https://www.botconf.eu/wp-content/uploads/2022/05/Botconf2022-40-LunghiHorejsi.pdf
https://www.secureworks.com/research/threat-profiles/nickel-academy
https://asec.ahnlab.com/en/53132/
https://exchange.xforce.ibmcloud.com/threat-group/0c0c39d309b5c7f00a0a7edd54bb025e
https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-berberoka.pdf
https://blog.trendmicro.com/trendlabs-security-intelligence/new-killdisk-variant-hits-financial-organizations-in-latin-america/
https://attack.mitre.org/groups/G0034
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a
http://www.documentcloud.org/documents/7038686-US-Army-report-on-North-Korean-military.html
https://web.archive.org/web/20130701021735/https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war
https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/the-hermit-kingdoms-ransomware-play.html
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-north-star-behind-the-scenes/
https://attack.mitre.org/groups/G0011
https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf
https://www.symantec.com/connect/blogs/duuzer-back-door-trojan-targets-south-korea-take-over-computers
https://www.sygnia.co/mata-framework
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/10/18092216/Updated-MATA-attacks-Eastern-Europe_full-report_ENG.pdf
https://securelist.com/bluenoroff-methods-bypass-motw/108383/
https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-north-korea-indictment
https://blogs.jpcert.or.jp/en/2022/07/vsingle.html
https://therecord.media/coinex-cryptocurrency-heist-north-korea
https://cocomelonc.github.io/tutorial/2022/05/09/malware-pers-4.html
https://thehackernews.com/2023/10/north-koreas-lazarus-group-launders-900.html
https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
https://securelist.com/operation-applejeus-sequel/95596/
https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/
https://norfolkinfosec.com/osint-reporting-on-dprk-and-ta505-overlap/
https://logrhythm.com/blog/a-technical-analysis-of-wannacry-ransomware/
https://blogs.jpcert.or.jp/en/2022/07/yamabot.html
https://www.zscaler.com/blogs/security-research/analysis-lilithbot-malware-and-eternity-threat-group
https://www.us-cert.gov/ncas/current-activity/2020/05/12/north-korean-malicious-cyber-activity
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-108a
https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045b
https://dragos.com/resource/covellite/
https://dragos.com/adversaries.html
https://securelist.com/unveiling-lazarus-new-campaign/110888/
http://blog.emsisoft.com/2017/05/12/wcry-ransomware-outbreak/
https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf
https://storage.googleapis.com/pub-tools-public-publication-data/pdf/ce44cbda9fdc061050c1d2a5dec0270874a9dc85.pdf
https://www.intezer.com/blog-chinaz-relations/
https://www.consilium.europa.eu/en/press/press-releases/2020/07/30/eu-imposes-the-first-ever-sanctions-against-cyber-attacks/
https://mega.nz/file/lkh1gY5C#93FUlwTwl0y27cfM0jtm4SYnWbtk06d0qoDg1e4eQ6s
https://www.darkreading.com/attacks-breaches/north-korean-hacking-group-steals-$135-million-from-indian-bank-/d/d-id/1332678
https://apt.etda.or.th/cgi-bin/showcard.cgi?u=41dcfaff-d5f0-484d-8649-ef8c61588eec
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-239b
https://www.cisecurity.org/insights/blog/top-10-malware-march-2022
https://www.elastic.co/security-labs/DPRK-strikes-using-a-new-variant-of-rustbucket
https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
https://research.checkpoint.com/north-korea-turns-against-russian-targets/
https://www.fbi.gov/news/press-releases/fbi-identifies-cryptocurrency-funds-stolen-by-dprk
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-G.PDF
https://cloud.google.com/blog/topics/threat-intelligence/unc2970-backdoor-trojanized-pdf-reader
http://www.intezer.com/lazarus-group-targets-more-cryptocurrency-exchanges-and-fintech-companies/
https://attack.mitre.org/groups/G0096
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical
https://www.symantec.com/connect/blogs/south-korean-financial-companies-targeted-castov
https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity
https://lifars.com/wp-content/uploads/2021/09/Lazarus.pdf
https://labs.f-secure.com/assets/BlogFiles/f-secureLABS-tlp-white-lazarus-threat-intel-report2.pdf
https://cybergeeks.tech/a-detailed-analysis-of-lazarus-malware-disguised-as-notepad-shell-extension/
https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA%3D%3D&mid=2247499462&idx=1&sn=7cc55f3cc2740e8818648efbec21615f
https://securelist.com/lazarus-under-the-hood/77908/
https://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html
https://www.trendmicro.com/en_us/research/22/d/new-apt-group-earth-berberoka-targets-gambling-websites-with-old.html
https://www.us-cert.gov/ncas/alerts/TA18-275A
https://www.bankinfosecurity.com/vietnamese-bank-blocks-1-million-online-heist-a-9105
https://labs.withsecure.com/content/dam/labs/docs/WithSecure-Lazarus-No-Pineapple-Threat-Intelligence-Report-2023.pdf
https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf
https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant/
https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/
https://twitter.com/BitsOfBinary/status/1321488299932983296
https://www.anomali.com/blog/evidence-of-stronger-ties-between-north-korea-and-swift-banking-attacks
https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/
https://asec.ahnlab.com/en/32572/
https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/
https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/
http://blog.nsfocus.net/stumbzarus-apt-lazarus/
https://drive.google.com/file/d/1XoGQFEJQ4nFAUXSGwcnTobviQ_ms35mG/view
https://news.sophos.com/en-us/2021/03/15/dearcry-ransomware-attacks-exploit-exchange-server-vulnerabilities/
http://researchcenter.paloaltonetworks.com/2017/04/unit42-the-blockbuster-sequel/
https://www.clearskysec.com/wp-content/uploads/2021/05/CryptoCore-Lazarus-Clearsky.pdf
https://www.secureworks.com/research/threat-profiles/nickel-gladstone
https://blog.malwarebytes.com/threat-analysis/2012/06/you-dirty-rat-part-1-darkcomet/
https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/pf/apt/rpt-apt38-2018.pdf
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/
https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf
https://technical.nttsecurity.com/post/102fnog/targeted-trickbot-activity-drops-powerbrace-backdoor
https://www.us-cert.gov/ncas/analysis-reports/AR18-149A
https://www.carbonblack.com/2020/04/16/vmware-carbon-black-tau-threat-analysis-the-evolution-of-lazarus/
https://github.com/jeFF0Falltrades/IoCs/blob/master/APT/dtrack_lazarus_group.md
https://symantec-blogs.broadcom.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Tools-Report.pdf
https://blog.macnica.net/blog/2020/11/dtrack.html
https://www.fireeye.com/blog/threat-research/2016/06/apt_group_sends_spea.html
https://blog.talosintelligence.com/lazarus-quiterat/
https://www.rapid7.com/blog/post/2023/03/30/backdoored-3cxdesktopapp-installer-used-in-active-threat-campaign/
https://www.mandiant.com/resources/blog/apt29-evolving-diplomatic-phishing
https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-apt-activity-report-q2-2023-q3-2023.pdf
https://vblocalhost.com/uploads/VB2021-Park.pdf
https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/
https://www.reuters.com/article/us-cyber-heist-swift-specialreport-idUSKCN0YB0DD
https://media.ccc.de/v/froscon2021-2670-der_cyber-bankraub_von_bangladesch
https://securelist.com/apt-trends-report-q2-2020/97937/
https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/
https://www.welivesecurity.com/2021/02/01/operation-nightscout-supply-chain-attack-online-gaming-asia/
https://www.theverge.com/2022/3/29/23001620/sky-mavis-axie-infinity-ronin-blockchain-validation-defi-hack-nft
https://norfolkinfosec.com/dprk-malware-targeting-security-researchers/
https://asec.ahnlab.com/en/33801/
https://raw.githubusercontent.com/eric-erki/APT_CyberCriminal_Campagin_Collections/master/2017/2017.05.30.Lazarus_Arisen/Group-IB_Lazarus.pdf
https://blog.google/threat-analysis-group/update-campaign-targeting-security-researchers/
https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf
https://www.symantec.com/connect/blogs/swift-attackers-malware-linked-more-financial-attacks
https://research.hisolutions.com/2025/04/rolling-in-the-deepweb-lazarus-tsunami/
https://socket.dev/blog/north-korean-apt-lazarus-targets-developers-with-malicious-npm-package
https://www.symantec.com/connect/blogs/wannacry-ransomware-attacks-show-strong-links-lazarus-group
https://norfolkinfosec.com/a-lazarus-keylogger-pslogger/
https://www.youtube.com/watch?v=mrTdSdMMgnk
https://asec.ahnlab.com/wp-content/uploads/2021/11/Lazarus-%EA%B7%B8%EB%A3%B9%EC%9D%98-NukeSped-%EC%95%85%EC%84%B1%EC%BD%94%EB%93%9C-%EB%B6%84%EC%84%9D-%EB%B3%B4%EA%B3%A0%EC%84%9C.pdf
https://www.documentcloud.org/documents/4834259-Park-Jin-Hyok-Complaint.html
https://blog.trendmicro.com/trendlabs-security-intelligence/ratankba-watering-holes-against-enterprises/
https://mp.weixin.qq.com/s/2sV-DrleHiJMSpSCW0kAMg
https://blog.malwarebytes.com/cybercrime/2017/05/how-did-wannacry-ransomworm-spread/
https://www.threatray.com/blog/establishing-the-tigerrat-and-tigerdownloader-malware-families
https://securityintelligence.com/posts/direct-kernel-object-manipulation-attacks-etw-providers/
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180231/LazarusUnderTheHood_PDF_final_for_securelist.pdf
https://twitter.com/kucher1n/status/1642886340105601029?t=3GCn-ZhDjqWEMXya_PKseg
https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-dissecting-operation-troy.pdf
https://www.youtube.com/watch?v=nUjxH1gW53s
https://www.sentinelone.com/blog/four-distinct-families-of-lazarus-malware-target-apples-macos-platform/
https://attack.mitre.org/groups/G0032/
https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/
https://www.cyberbit.com/endpoint-security/dtrack-apt-malware-found-in-nuclear-power-plant/
https://blogs.jpcert.or.jp/ja/2023/05/dangerouspassword.html
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage
https://objective-see.com/blog/blog_0x5F.html
https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
https://www.boho.or.kr/filedownload.do?attach_file_seq=2452&attach_file_id=EpF2452.pdf
https://suspected.tistory.com/269
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048b
https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/
https://github.blog/2023-07-18-security-alert-social-engineering-campaign-targets-technology-industry-employees/
https://www.us-cert.gov/ncas/alerts/aa20-106a
http://baesystemsai.blogspot.de/2016/05/cyber-heist-attribution.html
https://www.datanet.co.kr/news/articleView.html?idxno=133346
https://www.3cx.com/blog/news/mandiant-initial-results/
https://github.com/dodo-sec/Malware-Analysis/blob/main/SmoothOperator/SmoothOperator.md
https://blog.naver.com/checkmal/223416580495
https://www.nytimes.com/2013/03/21/world/asia/south-korea-computer-network-crashes.html
https://blogs.jpcert.or.jp/en/2021/01/Lazarus_malware2.html
https://github.com/xl7dev/WebShell/blob/master/Asp/RedHat%20Hacker.asp
https://vxhive.blogspot.com/2020/11/deep-dive-into-hermes-ransomware.html
https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
https://github.com/fboldewin/FastCashMalwareDissected/
https://www.trendmicro.com/en_us/research/23/c/information-on-attacks-involving-3cx-desktop-app.html
https://blogs.blackberry.com/en/2021/10/drawing-a-dragon-connecting-the-dots-to-find-apt41
https://objective-see.com/blog/blog_0x57.html
https://research.nccgroup.com/2018/04/17/decoding-network-data-from-a-gh0st-rat-variant/
https://www.bleepingcomputer.com/news/security/dprk-hacking-groups-breach-south-korean-defense-contractors/
https://www.sentinelone.com/wp-content/uploads/2022/02/Modified-Elephant-APT-and-a-Decade-of-Fabricating-Evidence-SentinelLabs.pdf
https://unit42.paloaltonetworks.com/operation-diplomatic-specter/
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/covid-19-and-new-year-greetings-the-higaisa-group/
https://blog.comae.io/wannacry-the-largest-ransom-ware-infection-in-history-f37da8e30a58
https://blog.comae.io/wannacry-decrypting-files-with-wanakiwi-demo-86bafb81112d
https://www.trendmicro.com/en_us/research/21/l/collecting-in-the-dark-tropic-trooper-targets-transportation-and-government-organizations.html
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-B_WHITE.PDF
https://www.flashpoint-intel.com/blog/linguistic-analysis-wannacry-ransomware/
http://www.independent.co.uk/news/uk/home-news/wannacry-malware-hack-nhs-report-cybercrime-north-korea-uk-ben-wallace-a8022491.html
https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing
https://www.bleepingcomputer.com/news/security/north-korean-hackers-linked-to-15-billion-bybit-crypto-heist/
https://www.computing.co.uk/ctg/news/3074007/lazarus-rises-warning-over-new-hoplight-malware-linked-with-north-korea
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research
https://www.boho.or.kr/filedownload.do?attach_file_seq=2612&attach_file_id=EpF2612.pdf
https://www.trendmicro.com/en_us/research/21/d/water-pamola-attacked-online-shops-via-malicious-orders.html
https://blog.talosintelligence.com/2020/11/crat-and-plugins.html
https://asec.ahnlab.com/en/34461/
https://therecord.media/coinex-confirms-hack-after-31-million-allegedly-stolen
https://swanleesec.github.io/posts/Malware-Lazarus-group's-Brambul-worm-of-the-former-Wannacry-1
https://objective-see.org/blog/blog_0x73.html
https://i.blackhat.com/USA-20/Wednesday/us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-Actors-Use-Public-Standards-For-Financial-Fraud.pdf
https://blog.netlab.360.com/dacls-the-dual-platform-rat/
https://securityscorecard.com/wp-content/uploads/2025/01/Report_011325_Strike_Operation99.pdf
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536.11.WHITE.pdf
https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
https://www.bitdefender.com/en-us/blog/labs/lazarus-group-targets-organizations-with-sophisticated-linkedin-recruiting-scam
https://twitter.com/BitsOfBinary/status/1337330286787518464
https://web.archive.org/web/20170311192337/http://download01.norman.no:80/documents/ThemanyfacesofGh0stRat.pdf
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/
https://www.zscaler.com/security-research/3CX-supply-chain-attack-analysis-march-2023
https://www.il-pib.pl/czasopisma/JTIT/2019/1/113.pdf
https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-3/
https://securelist.com/blog/sas/77908/lazarus-under-the-hood/
https://blogs.jpcert.or.jp/en/2021/01/Lazarus_tools.html
https://www.welivesecurity.com/2023/02/23/winordll64-backdoor-vast-lazarus-arsenal/
https://www.riskiq.com/blog/labs/lazarus-group-cryptocurrency/
https://www.sentinelone.com/labs/modifiedelephant-apt-and-a-decade-of-fabricating-evidence/
https://marcoramilli.com/2019/11/04/is-lazarus-apt38-targeting-critical-infrastructures/
https://web.archive.org/web/20160527050022/https://www.symantec.com/connect/blogs/swift-attackers-malware-linked-more-financial-attacks
https://socket.dev/blog/lazarus-strikes-npm-again-with-a-new-wave-of-malicious-packages
https://www.telsy.com/lazarus-gate/
https://asec.ahnlab.com/en/60792/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048f
https://www.dropbox.com/s/hpr9fas9xbzo2uz/Whitepaper WannaCry Ransomware.pdf?dl=0
https://www.youtube.com/watch?v=zGvQPtejX9w
https://home.treasury.gov/news/press-releases/sm924
https://www.bleepingcomputer.com/news/cryptocurrency/coinstats-says-north-korean-hackers-breached-1-590-crypto-wallets/
https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers/
https://blog.malwarebytes.com/threat-analysis/2019/03/the-advanced-persistent-threat-files-lazarus-group/
https://securelist.com/my-name-is-dtrack/93338/
http://contagiodump.blogspot.com/2012/06/rat-samples-from-syrian-targeted.html
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/
https://www.prevailion.com/the-gh0st-remains-the-same-2/
https://www.newyorker.com/magazine/2021/04/26/the-incredible-rise-of-north-koreas-hacking-army
https://www.symantec.com/security-center/writeup/2018-021216-4405-99#technicaldescription
https://global.ahnlab.com/global/upload/download/techreport/%5BAhnLab%5DAndariel_a_Subgroup_of_Lazarus%20(3).pdf
https://www.secureworks.com/research/threat-profiles/copper-fieldstone
https://malverse.it/analisi-bankshot-copperhedge
https://www.bleepingcomputer.com/news/security/north-korean-hackers-stole-research-data-in-two-month-long-breach/
https://norfolkinfosec.com/dprk-targeting-researchers-ii-sys-payload-and-registry-hunting/
https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/
https://www.us-cert.gov/ncas/analysis-reports/AR19-100A
https://apt.etda.or.th/cgi-bin/showcard.cgi?u=f04ded49-5b0e-4422-9c6c-4c6e2ed7d3d3
https://www.secureworks.com/research/threat-profiles/bronze-union
https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-Lazarus-targets-defense-industry-with-Threatneedle-En.pdf
https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war
https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/
https://stairwell.com/wp-content/uploads/2022/07/Stairwell-Threat-Report-Maui-Ransomware.pdf
https://blogs.vmware.com/security/2022/11/threat-analysis-active-c2-discovery-using-protocol-emulation-part4-dacls-aka-mata.html
https://www.secureworks.com/research/wcry-ransomware-analysis
https://researchcenter.paloaltonetworks.com/2017/08/unit42-blockbuster-saga-continues/
https://asec.ahnlab.com/wp-content/uploads/2023/10/20231013_Lazarus_OP.Dream_Magic.pdf
https://objective-see.com/blog/blog_0x51.html
https://www.bleepingcomputer.com/news/security/lazarus-group-deploys-its-first-mac-malware-in-cryptocurrency-exchange-hack/
https://asec.ahnlab.com/en/55369/
https://www.cisa.gov/uscert/ncas/alerts/aa20-239a
https://unit42.paloaltonetworks.com/unit42-blockbuster-saga-continues/
https://www.acalvio.com/lateral-movement-technique-employed-by-hidden-cobra/
https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine
https://www.cisa.gov/uscert/sites/default/files/publications/AA22-108A-TraderTraitor-North_Korea_APT_Targets_Blockchain_Companies.pdf
https://blog.malwarebytes.com/threat-intelligence/2022/01/north-koreas-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign/
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/dark-river-you-can-t-see-them-but-they-re-there/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048c
https://threatpost.com/operation-blockbuster-coalition-ties-destructive-attacks-to-lazarus-group/116422/
https://www.welivesecurity.com/2018/04/03/lazarus-killdisk-central-american-casino/
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Analysen-und-Prognosen/Threat-Intelligence/Aktive_APT-Gruppen/aktive-apt-gruppen_node.html
https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
https://asec.ahnlab.com/ko/56256/
https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
https://news.sophos.com/en-us/2019/09/18/the-wannacry-hangover/
https://threatbook.cn/ppt/The%2520Nightmare%2520of%2520Global%2520Cryptocurrency%2520Companies%2520-%2520Demystifying%2520the%2520%25E2%2580%259CDangerousPassword%25E2%2580%259D%2520of%2520the%2520APT%2520Organization.pdf
https://blog.netlab.360.com/dacls-the-dual-platform-rat-en/
https://www.vkremez.com/2019/10/lets-learn-dissecting-lazarus-windows.html
https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf
https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html?m=1
https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/
https://www.cfr.org/interactive/cyber-operations/covellite
https://blog.talosintelligence.com/lazarus-three-rats/
https://www.cisa.gov/uscert/ncas/alerts/aa22-187a
https://www.cisa.gov/uscert/sites/default/files/publications/aa22-187a-north-korean%20state-sponsored-cyber-actors-use-maui-ransomware-to-target-the-hph-sector.pdf
https://www.cisa.gov/uscert/ncas/alerts/TA18-275A
https://blogs.jpcert.or.jp/en/2020/08/Lazarus-malware.html
https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn
https://asec.ahnlab.com/en/57685/
https://adeo.com.tr/wp-content/uploads/2020/05/ADEO-Lazarus-APT38.pdf
https://media.defense.gov/2023/Feb/09/2003159161/-1/-1/0/CSA_RANSOMWARE_ATTACKS_ON_CI_FUND_DPRK_ACTIVITIES.PDF
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/how-cybercriminals-abuse-cloud-tunneling-services
https://us-cert.cisa.gov/ncas/alerts/aa20-345a
https://www.secrss.com/articles/18635
https://www.elastic.co/security-labs/elastic-users-protected-from-suddenicon-supply-chain-attack
https://blog.google/threat-analysis-group/countering-threats-north-korea/
https://www.sentinelone.com/blog/bluenoroff-how-dprks-macos-rustbucket-seeks-to-evade-analysis-and-detection/
https://www.microsoft.com/security/blog/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/
https://socket.dev/blog/lazarus-expands-malicious-npm-campaign-11-new-packages-add-malware-loaders-and-bitbucket
https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/
https://www.fbi.gov/news/press-releases/fbi-identifies-lazarus-group-cyber-actors-as-responsible-for-theft-of-41-million-from-stakecom
https://securelist.com/operation-applejeus/87553/
https://blog.talosintelligence.com/2019/09/panda-evolution.html
https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Loaders-Installers-and-Uninstallers-Report.pdf
http://baesystemsai.blogspot.de/2017/10/taiwan-heist-lazarus-tools.html
https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/
https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf
https://www.us-cert.gov/ncas/analysis-reports/ar20-045d
http://www.issuemakerslab.com/research3/
https://twitter.com/X__Junior/status/1743193763000828066
https://brandefense.io/blog/apt-groups/lazarus-apt-group-apt38/
https://medium.com/@DCSO_CyTec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/a-look-into-the-lazarus-groups-operations
https://web.archive.org/web/20140816135909/https://www.symantec.com/connect/blogs/inside-back-door-attack
https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf
https://github.com/werkamsus/Lilith
https://unit42.paloaltonetworks.com/unit42-operation-blockbuster-goes-mobile/
https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packages
https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
https://www.us-cert.gov/ncas/alerts/TA17-318A
https://www.hvs-consulting.de/lazarus-report/
https://www.group-ib.com/blog/apt-lazarus-python-scripts/
https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html
https://securingtomorrow.mcafee.com/mcafee-labs/android-malware-appears-linked-to-lazarus-cybercrime-group/#sf174581990
https://github.com/649/APT38-DYEPACK
https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks-new-malware
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability/
https://asec.ahnlab.com/ko/58215/
https://blog.talosintelligence.com/2020/12/2020-year-in-malware.html
https://github.com/0xZuk0/rules-of-yaras/blob/main/reports/Wannacry%20Ransomware%20Report.pdf
https://blogs.jpcert.or.jp/en/2021/03/Lazarus_malware3.html
https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signed-binary/
https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/
https://jsac.jpcert.or.jp/archive/2024/pdf/JSAC2024_1_6_dongwook-kim_seulgi-lee_en.pdf
https://blog.talosintelligence.com/2022/02/threat-roundup-0204-0211.html
https://securelist.com/lazarus-andariel-mistakes-and-easyrat/110119/
https://swanleesec.github.io/posts/Malware-Lazarus-group's-Brambul-worm-of-the-former-Wannacry-2
https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks-new-malware-0
https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/
https://securingtomorrow.mcafee.com/mcafee-labs/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048d
https://blog.cylance.com/the-ghost-dragon
https://docs.huihoo.com/rsaconference/usa-2014/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries-final.pdf
https://therecord.media/north-koreans-initial-laundering-bybit-hack
https://vipyrsec.com/research/elf64-rat-malware/
https://eng.nis.go.kr/common/download.do?type=&seq=8E464392CD0485169FA97278AEE8B607
https://securityintelligence.com/posts/defensive-considerations-lazarus-fudmodule/
https://blogs.vmware.com/security/2020/09/detecting-threats-in-real-time-with-active-c2-information.html
https://www.us-cert.gov/ncas/alerts/TA14-353A
https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
https://www.reversinglabs.com/blog/vmconnect-supply-chain-campaign-continues
https://sansec.io/research/north-korea-magecart
https://www.linkedin.com/posts/alessio-di-santo-712348197_iocs-ttps-lazarusgroup-activity-7263976334807220224-N6Ue/
https://global.ahnlab.com/global/upload/download/techreport/[AhnLab]Andariel_a_Subgroup_of_Lazarus%20(3).pdf
https://therecord.media/north-korea-accused-of-orchestrating-100-million-harmony-crypto-hack/
https://www.microsoft.com/en-us/security/blog/2022/12/06/dev-0139-launches-targeted-attacks-against-the-cryptocurrency-industry/
https://medium.com/s2wlab/analysis-of-threatneedle-c-c-communication-feat-google-tag-warning-to-researchers-782aa51cf74
https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/
https://www.welivesecurity.com/2017/02/16/demystifying-targeted-malware-used-polish-banks/
https://www.secureworks.com/research/threat-profiles/iron-viking
https://www.us-cert.gov/ncas/analysis-reports/AR19-129A
https://www.cisa.gov/news-events/analysis-reports/ar18-165a
https://blog.trendmicro.com/trendlabs-security-intelligence/new-killdisk-variant-hits-latin-american-financial-organizations-again/
http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks
https://raw.githubusercontent.com/yt0ng/cracking_softcell/main/Cracking_SOFTCLL_TLP_WHITE.pdf
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
https://us-cert.cisa.gov/ncas/alerts/aa22-108a
https://asec.ahnlab.com/en/56405/
https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
https://blog.avast.com/ransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today
https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf
https://www.youtube.com/watch?v=LUxOcpIRxmg
https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/
https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html
https://symantec-blogs.broadcom.com/blogs/threat-intelligence/elfin-apt33-espionage
https://baesystemsai.blogspot.com/2017/02/lazarus-false-flag-malware.html
https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-1/
https://www.trmlabs.com/post/north-korean-hackers-stole-600-million-in-crypto-in-2023
https://therecord.media/3cx-attack-north-korea-lazarus-group
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/
https://cocomelonc.github.io/tutorial/2021/09/04/simple-malware-av-evasion.html
https://asec.ahnlab.com/ko/47751/
https://twitter.com/ShadowChasing1/status/1399369260577681426?s=20
https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07170728/Guerrero-Saade-Raiu-VB2017.pdf
https://www.gendigital.com/blog/news/innovation/lazarus-fudmodule-v3
https://www.us-cert.gov/ncas/analysis-reports/ar20-045g
https://krebsonsecurity.com/2017/05/u-k-hospitals-hit-in-widespread-ransomware-attack/
https://asec.ahnlab.com/wp-content/uploads/2022/09/Analysis-Report-on-Lazarus-Groups-Rootkit-Attack-Using-BYOVD_Sep-22-2022.pdf
https://twitter.com/ccxsaber/status/1277064824434745345
https://www.virusbulletin.com/uploads/pdf/conference/vb2023/papers/Lazarus-campaigns-and-backdoors-in-2022-2023.pdf
https://sites.temple.edu/care/ci-rw-attacks/
https://twitter.com/greglesnewich/status/1742575613834084684
https://www.welivesecurity.com/2021/04/08/are-you-afreight-dark-watch-out-vyveva-new-lazarus-backdoor/
https://www.group-ib.com/blog/btc_changer
https://www.secureworks.com/research/a-peek-into-bronze-unions-toolbox
https://research.nccgroup.com/2022/05/05/north-koreas-lazarus-and-their-initial-access-trade-craft-using-social-media-and-social-engineering/
https://public.intel471.com/blog/partners-in-crime-north-koreans-and-elite-russian-speaking-cybercriminals/
https://attack.mitre.org/groups/G0082
https://www.sysnet.ucsd.edu/sysnet/miscpapers/darkmatter-www20.pdf
https://www.bleepingcomputer.com/news/security/fbi-links-north-korean-hackers-to-308-million-crypto-heist/
https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists
https://blog.prevailion.com/2020/06/the-gh0st-remains-same8.html
https://blog.trendmicro.com/trendlabs-security-intelligence/what-we-can-learn-from-the-bangladesh-central-bank-cyber-heist/
https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970
https://www.us-cert.gov/ncas/alerts/TA17-164A
https://www.telsy.com/download/5394/?uid=28b0a4577e
https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside
https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation
https://doubleagent.net/fastcash-for-linux/
https://www.secureworks.com/research/threat-profiles/aluminum-saratoga
https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/592/original/Hashes_IOCs_for_coverage.txt
https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds
https://decoded.avast.io/luigicamastra/apt-group-planted-backdoors-targeting-high-profile-networks-in-central-asia
https://medium.com/s2wlab/analysis-of-lazarus-malware-abusing-non-activex-module-in-south-korea-7d52b9539c12
https://www.bloomberg.com/news/articles/2018-05-29/mexico-foiled-a-110-million-bank-heist-then-kept-it-a-secret
https://www.attackiq.com/2023/01/05/emulating-the-highly-sophisticated-north-korean-adversary-lazarus-group/
https://twitter.com/RedDrip7/status/1595365451495706624
https://www.bleepingcomputer.com/news/security/lazarus-hackers-linked-to-60-million-alphapo-cryptocurrency-heist/
https://www.splunk.com/en_us/blog/security/splunk-insights-investigating-the-3cxdesktopapp-supply-chain-compromise.html
https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/
https://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/the-hack-of-sony-pictures-what-you-need-to-know
https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023
https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344
https://www.zdnet.com/article/google-north-korean-hackers-have-targeted-security-researchers-via-social-media/
https://us-cert.cisa.gov/ncas/alerts/aa21-048a
https://www.intezer.com/blog/malware-analysis/chinaz-relations/
https://www.us-cert.gov/ncas/analysis-reports/ar19-304a
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability
https://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html
https://asec.ahnlab.com/en/48223/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048a
https://www.malwarebytes.com/blog/news/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day
https://blog.qualys.com/vulnerabilities-threat-research/2022/02/08/lolzarus-lazarus-group-incorporating-lolbins-into-campaigns
https://st.drweb.com/static/new-www/news/2020/october/Study_of_the_ShadowPad_APT_backdoor_and_its_relation_to_PlugX_en.pdf
https://www.us-cert.gov/ncas/analysis-reports/ar20-045f
https://labs.sentinelone.com/dprk-hidden-cobra-update-north-korean-malicious-cyber-activity/
https://www.welivesecurity.com/2017/01/05/killdisk-now-targeting-linux-demands-250k-ransom-cant-decrypt
https://securityscorecard.com/wp-content/uploads/2025/01/Operation-Phantom-Circuit-Report_012725_03.pdf
https://www.tgsoft.it/files/report/download.asp?id=7481257469
https://brandefense.io/blog/apt-groups/mythic-leopard-apt-group/
https://www.secureworks.com/research/threat-profiles/bronze-globe
https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-cloud-snooper-report.pdf
https://www.bitdefender.com/files/News/CaseStudies/study/185/Bitdefender-Business-2017-WhitePaper-PZCHAO-crea2452-en-EN-GenericUse.pdf
https://objective-see.org/blog/blog_0x74.html
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020OverWatchNowheretoHide.pdf
http://www.nartv.org/mirror/ghostnet.pdf
https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/
https://securingtomorrow.mcafee.com/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/
https://blogs.vmware.com/security/2021/12/tigerrat-advanced-adversaries-on-the-prowl.html
https://baesystemsai.blogspot.de/2017/05/wanacrypt0r-ransomworm.html
https://thehackernews.com/2023/03/lazarus-group-exploits-zero-day.html
https://securelist.com/cryptocurrency-businesses-still-being-targeted-by-lazarus/90019/
https://labs.sentinelone.com/the-deadly-planeswalker-how-the-trickbot-group-united-high-tech-crimeware-apt/
https://www.cisa.gov/uscert/ncas/alerts/aa22-108a
https://medium.com/ax1al/reversing-ryuk-eef8ffd55f12
https://www.bleepingcomputer.com/news/security/coinspaid-blames-lazarus-hackers-for-theft-of-37-300-000-in-crypto/
https://blog.reversinglabs.com/blog/hidden-cobra
https://blogs.jpcert.or.jp/en/2020/09/BLINDINGCAN.html
https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/WannaCry-Aftershock.pdf
https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/
https://www.cfr.org/interactive/cyber-operations/lazarus-group
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf
https://www.youtube.com/watch?v=uakw2HMGZ-I
https://www.picussecurity.com/resource/blog/fbi-north-korean-lazarus-group-bybit-crypto-heist
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-F.pdf
https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits
https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised
https://www.darkreading.com/remote-workforce/dprk-using-unpatched-zimbra-devices-to-spy-on-researchers-
https://github.com/monoxgas/sRDI
https://threatrecon.nshc.net/2019/01/23/sectora01-custom-proxy-utility-tool-analysis/
https://blogs.blackberry.com/en/2023/03/initial-implants-and-network-analysis-suggest-the-3cx-supply-chain-operation-goes-back-to-fall-2022
https://www.youtube.com/watch?v=rjA0Vf75cYk
https://medium.com/insomniacs/what-happened-between-the-bigbadwolf-and-the-tiger-925549a105b2
https://twitter.com/KevinPerlow/status/1160766519615381504
https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e
https://ti.qianxin.com/blog/articles/Analysis-of-attacks-by-Lazarus-using-Daewoo-shipyard-as-bait/
https://www.brighttalk.com/webcast/18282/493986
http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update
https://web.archive.org/web/20131123012339/https://www.symantec.com/connect/blogs/trojankoredos-comes-unwelcomed-surprise
https://www.us-cert.gov/ncas/analysis-reports/AR18-165A
https://blog.cyble.com/2022/07/12/new-ransomware-groups-on-the-rise/
https://www.reversinglabs.com/blog/vmconnect-malicious-pypi-packages-imitate-popular-open-source-modules
https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_Operation_Interception.pdf
https://unit42.paloaltonetworks.com/tdrop2-attacks-suggest-dark-seoul-attackers-return/
https://vb2020.vblocalhost.com/conference/presentations/unveiling-the-cryptomimic/
https://blogs.jpcert.or.jp/en/2021/10/gh0sttimes.html
https://www.cisa.gov/news-events/analysis-reports/ar20-232a
https://www.cfr.org/interactive/cyber-operations/compromise-cryptocurrency-exchanges-south-korea
https://www.trmlabs.com/post/inside-north-koreas-crypto-heists
https://mp.weixin.qq.com/s/nnLqUBPX8xZ3hCr5u-iSjQ
https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-campaign-targeting-cryptocurrencies-reveals-remote-controller-tool-evolved-ratankba/
https://go.recordedfuture.com/hubfs/reports/cta-2023-1130.pdf
https://www.elliptic.co/blog/north-korean-hackers-return-to-tornado-cash-despite-sanctions
https://www.mandiant.com/resources/blog/north-korea-supply-chain
https://securelist.com/lazarus-threatneedle/100803/
https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247505438&idx=1&sn=cf1947c7af6581f4a66460ae6d14dc2f
https://cofense.com/blog/open-source-gh0st-rat-still-haunting-inboxes-15-years-after-release/
http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf
https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/
https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-targeting-brazil
https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/
https://any.run/cybersecurity-blog/darkcomet-rat-technical-analysis/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-north-star-summary-of-our-latest-analysis/
https://www.trendmicro.com/en_us/research/23/b/earth-kitsune-delivers-new-whiskerspy-backdoor.html
https://www.group-ib.com/blog/3cx-supply-chain-attack/?utm_source=twitter&utm_campaign=3cx-blog&utm_medium=social
https://www.intezer.com/wp-content/uploads/2021/02/Intezer-2020-Go-Malware-Round-Up.pdf
https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats
https://www.anquanke.com/post/id/223817
https://malwareandstuff.com/peb-where-magic-is-stored/
https://twitter.com/VK_Intel/status/1182730637016481793
https://cyware.com/news/lazarus-hacking-group-expand-their-attack-horizon-by-targeting-an-israeli-defense-company-02e2ec77
https://blog.sekoia.io/the-dprk-delicate-sound-of-cyber/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045a
https://www.us-cert.gov/ncas/analysis-reports/ar19-252a
https://unit42.paloaltonetworks.com/unit42-the-blockbuster-sequel/
https://blog.alyac.co.kr/2105
https://www.comae.com/posts/pandorabox-north-koreans-target-security-researchers/
https://www.welivesecurity.com/2020/11/16/lazarus-supply-chain-attack-south-korea/
https://www.secureworks.com/research/threat-profiles/bronze-edison
https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko
https://www.cyberbit.com/dtrack-apt-malware-found-in-nuclear-power-plant/
https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf
https://www.elliptic.co/blog/how-the-lazarus-group-is-stepping-up-crypto-hacks-and-changing-its-tactics
https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168
https://i.blackhat.com/eu-20/Wednesday/eu-20-Rivera-From-Zero-To-Sixty-The-Story-Of-North-Koreas-Rapid-Ascent-To-Becoming-A-Global-Cyber-Superpower.pdf
https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-continues-heists-mounts-attacks-on-financial-organizations-in-latin-america/
https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/
https://thehackernews.com/2022/04/chinese-hackers-target-vmware-horizon.html
https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and
https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-up-to-no-good-again/
https://decoded.avast.io/luiginocamastra/from-byovd-to-a-0-day-unveiling-advanced-exploits-in-cyber-recruiting-scams/
https://threatpost.com/lazarus-apt-spinoff-linked-to-banking-hacks/124746/
https://therecord.media/eu-sanctions-north-korea-ukraine-war-lazarus-group
https://www.secureworks.com/research/threat-profiles/bronze-fleetwood
https://community.broadcom.com/symantecenterprise/viewdocument/attackers-target-dozens-of-global-b
https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
https://asec.ahnlab.com/ko/22975/
http://www.hexblog.com/?p=1248
https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf
https://research.openanalysis.net/3cx/northkorea/apt/triage/2023/03/30/3cx-malware.html#Functionality
https://news.sophos.com/en-us/2022/03/17/the-ransomware-threat-intelligence-center/
https://www.seqrite.com/blog/rat-used-by-chinese-cyberspies-infiltrating-indian-businesses/
https://blog.malwarebytes.com/threat-analysis/2012/10/dark-comet-2-electric-boogaloo/
https://asec.ahnlab.com/ko/53832/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045c
https://www.proofpoint.com/sites/default/files/pfpt-us-wp-north-korea-bitten-by-bitcoin-bug.pdf
https://securelist.com/bluenoroff-new-macos-malware/111290/
https://twitter.com/ESETresearch/status/1559553324998955010
https://cocomelonc.github.io/tutorial/2021/09/06/simple-malware-av-evasion-2.html
https://securelist.com/dtrack-targeting-europe-latin-america/107798/
https://themoscowtimes.com/news/wcry-virus-reportedly-infects-russian-interior-ministrys-computer-network-57984
https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/
https://hackcon.org/uploads/327/05%20-%20Kwak.pdf
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
https://www.youtube.com/watch?v=Q90uZS3taG0
https://www.us-cert.gov/ncas/alerts/TA18-149A
https://blog.malwarebytes.com/threat-analysis/2020/05/new-mac-variant-of-lazarus-dacls-rat-distributed-via-trojanized-2fa-app/
https://www.bleepingcomputer.com/news/security/fbi-links-largest-crypto-hack-ever-to-north-korean-hackers/
http://www.malware-traffic-analysis.net/2018/01/04/index.html
https://content.fireeye.com/apt/rpt-apt38
https://asec.ahnlab.com/ko/40495/
https://dissectingmalwa.re/third-times-the-charm-analysing-wannacry-samples.html
https://www.bleepingcomputer.com/news/security/north-korean-hackers-linked-to-defense-sector-supply-chain-attack/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045e
https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/
https://www.malwarebytes.com/blog/threat-intelligence/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat
https://hub.elliptic.co/analysis/north-korea-s-lazarus-group-likely-responsible-for-35-million-atomic-crypto-theft/
https://www.bleepingcomputer.com/news/security/us-seizes-sinbad-crypto-mixer-used-by-north-korean-lazarus-hackers/
https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-239a
https://www.bleepingcomputer.com/news/security/debridge-finance-crypto-platform-targeted-by-lazarus-hackers/
https://threatray.com/wp-content/uploads/2021/12/threatray-establishing-the-tigerrat-and-tigerdownloader-malware-families.pdf
https://www.mandiant.com/resources/blog/dprk-whatsapp-phishing
https://sansorg.egnyte.com/dl/3P3HxFiNgL
https://www.3cx.com/blog/news/mandiant-security-update2/
https://www.zscaler.com/blogs/security-research/catching-rats-over-custom-protocols
https://objective-see.com/blog/blog_0x49.html
https://www.symantec.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware
https://www.us-cert.gov/ncas/analysis-reports/AR18-221A
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/
https://www.youtube.com/watch?v=fTX-vgSEfjk
https://www.hhs.gov/sites/default/files/manage-engine-vulnerability-sector-alert-tlpclear.pdf
https://www.krcert.or.kr/filedownload.do?attach_file_seq=3277&attach_file_id=EpF3277.pdf
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/april/decoding-network-data-from-a-gh0st-rat-variant/
https://unit42.paloaltonetworks.com/atoms/iron-taurus/
https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf
https://asec.ahnlab.com/en/57736/
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=5b9850b9-0fdd-48a9-b595-9234207ae7df&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
https://www.virusbulletin.com/uploads/pdf/conference/vb2022/papers/VB2022-Lazarus-and-BYOVD-evil-to-the-Windows-core.pdf
https://vblocalhost.com/uploads/VB2021-Lee-etal.pdf
https://cn.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf
http://www.mcafee.com/us/resources/white-papers/wp-dissecting-operation-troy.pdf
https://www.kaspersky.com/about/press-releases/2017_chasing-lazarus-a-hunt-for-the-infamous-hackers-to-prevent-large-bank-robberies
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
https://tccontre.blogspot.com/2021/02/gh0strat-anti-debugging-nested-seh-try.html
https://medium.com/threat-intel/lazarus-attacks-wannacry-5fdeddee476c
https://blog.bushidotoken.net/2020/06/deep-dive-darkhotel-apt.html
https://blog.talosintelligence.com/lazarus-collectionrat/
https://labs.bitdefender.com/wp-content/uploads/downloads/operation-pzchao-inside-a-highly-specialized-espionage-infrastructure/
https://blog.cyble.com/2023/03/31/a-comprehensive-analysis-of-the-3cx-attack
https://www.mandiant.com/resources/blog/lightshift-and-lightshow
https://yoroi.company/research/a-deep-dive-into-eternity-group-a-new-emerging-cyber-threat/
https://blog.sekoia.io/bluenoroffs-rustbucket-campaign/
https://youtu.be/_kzFNQySEMw?t=789
https://youtu.be/8hJyLkLHH8Q?t=1208
https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/
https://www.theregister.co.uk/2019/04/10/lazarus_group_malware/
https://securelist.com/the-lazarus-group-deathnote-campaign/109490/
https://blog.trendmicro.com/trendlabs-security-intelligence/operation-endtrade-finding-multi-stage-backdoors-that-tick/
https://securelist.com/big-threats-using-code-similarity-part-1/97239/
https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html
https://www.microsoft.com/en-us/security/blog/2023/11/22/diamond-sleet-supply-chain-compromise-distributes-a-modified-cyberlink-installer/
https://www.virusbulletin.com/uploads/pdf/magazine/2018/VB2018-Kalnai-Poslusny.pdf
https://www.ibtimes.sg/covid-19-relief-north-korea-hackers-lazarus-planning-massive-attack-us-uk-japan-singapore-47072
https://blog.gdatasoftware.com/2017/05/29751-wannacry-ransomware-campaign
https://twitter.com/h2jazi/status/1681426768597778440
https://s.tencent.com/research/report/836.html
https://www.theguardian.com/world/2009/jul/08/south-korea-cyber-attack
https://risky.biz/whatiswinnti/
https://objective-see.com/blog/blog_0x54.html
https://threatpost.com/banco-de-chile-wiper-attack-just-a-cover-for-10m-swift-heist/132796/
https://posts.specterops.io/introducing-venator-a-macos-tool-for-proactive-detection-34055a017e56
https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
https://www.cadosecurity.com/forensic-triage-of-a-windows-system-running-the-backdoored-3cx-desktop-app/
https://www.virusbulletin.com/uploads/pdf/conference/vb2024/papers/Sugarcoating-KANDYKORN-a-sweet-dive-into-a-sophisticated-MacOS-backdoor.pdf
https://cloud.google.com/blog/topics/threat-intelligence/unc4393-goes-gently-into-silentnight
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3cx-supply-chain-attack
https://objective-see.com/blog/blog_0x53.html
https://attack.mitre.org/groups/G0026
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048e
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
https://www.youtube.com/watch?v=9nuo-AGg4p4
https://securityscorecard.com/wp-content/uploads/2025/02/Operation-Marstech-Mayhem-Report_021025_03.pdf
https://web.archive.org/web/20200922165625/https://dcso.de/2019/03/18/enterprise-malware-as-a-service/