Search Again

Lazarus Group

Rank: 1
Get Free Access to Insights

Summary of Actor:Lazarus Group, also known as APT38, is a notorious state-sponsored hacking group attributed to North Korea. The group is known for its sophisticated cyber espionage and financially motivated attacks.

General Features:Lazarus Group is highly sophisticated and employs advanced techniques to conduct cyber espionage and financial theft. The group is backed by a nation-state and often uses malware, spear-phishing, and vulnerabilities to infiltrate targets.

Related Other Groups: APT37,Kimsuky,Reaper,BlueNoroff

Indicators of Attack (IoA):

  • Use of trojans and ransomware
  • Spear-phishing emails
  • Deployment of custom malware
  • Command and Control (C2) server communications

Recent Activities and Trends:

  • Latest Campaigns : Lazarus Group was recently linked to a series of ransomware attacks against major manufacturers in the United States and Europe, aiming to disrupt supply chains and extract ransom payments.
  • Emerging Trends : The group has been observed shifting towards more financially motivated attacks, including targeting cryptocurrency exchanges and venture capital firms.

...

Also Known As:

Group 77

Gods Disciples

Guardians of Peace

UNC577

UNC4899

+24

Target Countries

Hong Kong

India

Thailand

Bangladesh

Russian Federation

+18


Target Sectors

Public Administration

Space & Defense

Energy & Utilities

National Security&International Affairs

Electrical&Electronical Manufacturing

+2


Associated Malware/Software

osx.manuscrypt

TrojanSpy

RustDoor

Windows

osx.casso

+204


️Related CVEs

ATT&CK IDs:

T1102 - Web Service

T1060

T1053.003

T1566.001

TA0040

+409

Tactic Id Technique
Collection T1213 Data from Information Repositories

Sub Techniques

Detections

Mitigations

Collection T1039 Data from Network Shared Drive

Sub Techniques

Detections

Mitigations

Collection T1557 Adversary-in-the-Middle

Sub Techniques

Detections

Mitigations

Collection T1025 Data from Removable Media

Sub Techniques

Detections

Mitigations

Collection T1056 Input Capture

Sub Techniques

Detections

Mitigations

Collection T1560 Archive Collected Data

Sub Techniques

Detections

Mitigations

Collection T1115 Clipboard Data

Sub Techniques

Detections

Mitigations

Collection T1074 Data Staged

Sub Techniques

Detections

Mitigations

Collection T1114 Email Collection

Sub Techniques

Detections

Mitigations

Collection T1125 Video Capture

Sub Techniques

Detections

Mitigations

Collection T1530 Data from Cloud Storage

Sub Techniques

Detections

Mitigations

Collection T1113 Screen Capture

Sub Techniques

Detections

Mitigations

Collection T1005 Data from Local System

Sub Techniques

Detections

Mitigations

Collection T1119 Automated Collection

Sub Techniques

Detections

Mitigations

Command And Control T1104 Multi-Stage Channels

Sub Techniques

Detections

Mitigations

Command And Control T1219 Remote Access Software

Sub Techniques

Detections

Mitigations

Command And Control T1572 Protocol Tunneling

Sub Techniques

Detections

Mitigations

Command And Control T1132 Data Encoding

Sub Techniques

Detections

Mitigations

Command And Control T1105 Ingress Tool Transfer

Sub Techniques

Detections

Mitigations

Command And Control T1568 Dynamic Resolution

Sub Techniques

Detections

Mitigations

Command And Control T1090 Proxy

Sub Techniques

Detections

Mitigations

Command And Control T1001 Data Obfuscation

Sub Techniques

Detections

Mitigations

Command And Control T1071 Application Layer Protocol

Sub Techniques

Detections

Mitigations

Command And Control T1573 Encrypted Channel

Sub Techniques

Detections

Mitigations

Command And Control T1008 Fallback Channels

Sub Techniques

Detections

Mitigations

Command And Control T1024 Custom Cryptographic Protocol

Sub Techniques

Detections

Mitigations

Command And Control T1102 Web Service

Sub Techniques

Detections

Mitigations

Command And Control T1095 Non-Application Layer Protocol

Sub Techniques

Detections

Mitigations

Command And Control T1571 Non-Standard Port

Sub Techniques

Detections

Mitigations

Credential Access T1552 Unsecured Credentials

Sub Techniques

Detections

Mitigations

Credential Access T1556 Modify Authentication Process

Sub Techniques

Detections

Mitigations

Credential Access T1557 Adversary-in-the-Middle

Sub Techniques

Detections

Mitigations

Credential Access T1187 Forced Authentication

Sub Techniques

Detections

Mitigations

Credential Access T1081 Credentials in Files

Sub Techniques

Detections

Mitigations

Credential Access T1111 Multi-Factor Authentication Interception

Sub Techniques

Detections

Mitigations

Credential Access T1056 Input Capture

Sub Techniques

Detections

Mitigations

Credential Access T1110 Brute Force

Sub Techniques

Detections

Mitigations

Credential Access T1139 Bash History

Sub Techniques

Detections

Mitigations

Credential Access T1555 Credentials from Password Stores

Sub Techniques

Detections

Mitigations

Credential Access T1040 Network Sniffing

Sub Techniques

Detections

Mitigations

Credential Access T1003 OS Credential Dumping

Sub Techniques

Detections

Mitigations

Defense Evasion T1027 Obfuscated Files or Information

Sub Techniques

Detections

Mitigations

Defense Evasion T1556 Modify Authentication Process

Sub Techniques

Detections

Mitigations

Defense Evasion T1089 Disabling Security Tools

Sub Techniques

Detections

Mitigations

Defense Evasion T1140 Deobfuscate/Decode Files or Information

Sub Techniques

Detections

Mitigations

Defense Evasion T1622 Debugger Evasion

Sub Techniques

Detections

Mitigations

Defense Evasion T1550 Use Alternate Authentication Material

Sub Techniques

Detections

Mitigations

Defense Evasion T1553 Subvert Trust Controls

Sub Techniques

Detections

Mitigations

Defense Evasion T1143 Hidden Window

Sub Techniques

Detections

Mitigations

Defense Evasion T1055 Process Injection

Sub Techniques

Detections

Mitigations

Defense Evasion T1542 Pre-OS Boot

Sub Techniques

Detections

Mitigations

Defense Evasion T1574 Hijack Execution Flow

Sub Techniques

Detections

Mitigations

Defense Evasion T1127 Trusted Developer Utilities Proxy Execution

Sub Techniques

Detections

Mitigations

Defense Evasion T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Defense Evasion T1220 XSL Script Processing

Sub Techniques

Detections

Mitigations

Defense Evasion T1064 Scripting

Sub Techniques

Detections

Mitigations

Defense Evasion T1202 Indirect Command Execution

Sub Techniques

Detections

Mitigations

Defense Evasion T1497 Virtualization/Sandbox Evasion

Sub Techniques

Detections

Mitigations

Defense Evasion T1112 Modify Registry

Sub Techniques

Detections

Mitigations

Defense Evasion T1221 Template Injection

Sub Techniques

Detections

Mitigations

Defense Evasion T1036 Masquerading

Sub Techniques

Detections

Mitigations

Defense Evasion T1070 Indicator Removal

Sub Techniques

Detections

Mitigations

Defense Evasion T1562 Impair Defenses

Sub Techniques

Detections

Mitigations

Defense Evasion T1480 Execution Guardrails

Sub Techniques

Detections

Mitigations

Defense Evasion T1107 File Deletion

Sub Techniques

Detections

Mitigations

Defense Evasion T1564 Hide Artifacts

Sub Techniques

Detections

Mitigations

Defense Evasion T1014 Rootkit

Sub Techniques

Detections

Mitigations

Defense Evasion T1134 Access Token Manipulation

Sub Techniques

Detections

Mitigations

Defense Evasion T1548 Abuse Elevation Control Mechanism

Sub Techniques

Detections

Mitigations

Defense Evasion T1218 System Binary Proxy Execution

Sub Techniques

Detections

Mitigations

Defense Evasion T1620 Reflective Code Loading

Sub Techniques

Detections

Mitigations

Defense Evasion T1656 Impersonation

Sub Techniques

Detections

Mitigations

Defense Evasion T1045 Software Packing

Sub Techniques

Detections

Mitigations

Discovery T1124 System Time Discovery

Sub Techniques

Detections

Mitigations

Discovery T1018 Remote System Discovery

Sub Techniques

Detections

Mitigations

Discovery T1012 Query Registry

Sub Techniques

Detections

Mitigations

Discovery T1016 System Network Configuration Discovery

Sub Techniques

Detections

Mitigations

Discovery T1622 Debugger Evasion

Sub Techniques

Detections

Mitigations

Discovery T1049 System Network Connections Discovery

Sub Techniques

Detections

Mitigations

Discovery T1083 File and Directory Discovery

Sub Techniques

Detections

Mitigations

Discovery T1087 Account Discovery

Sub Techniques

Detections

Mitigations

Discovery T1010 Application Window Discovery

Sub Techniques

Detections

Mitigations

Discovery T1497 Virtualization/Sandbox Evasion

Sub Techniques

Detections

Mitigations

Discovery T1063 Security Software Discovery

Sub Techniques

Detections

Mitigations

Discovery T1057 Process Discovery

Sub Techniques

Detections

Mitigations

Discovery T1082 System Information Discovery

Sub Techniques

Detections

Mitigations

Discovery T1518 Software Discovery

Sub Techniques

Detections

Mitigations

Discovery T1046 Network Service Discovery

Sub Techniques

Detections

Mitigations

Discovery T1007 System Service Discovery

Sub Techniques

Detections

Mitigations

Discovery T1040 Network Sniffing

Sub Techniques

Detections

Mitigations

Discovery T1614 System Location Discovery

Sub Techniques

Detections

Mitigations

Discovery T1135 Network Share Discovery

Sub Techniques

Detections

Mitigations

Discovery T1217 Browser Information Discovery

Sub Techniques

Detections

Mitigations

Discovery T1033 System Owner/User Discovery

Sub Techniques

Detections

Mitigations

Execution T1059 Command and Scripting Interpreter

Sub Techniques

Detections

Mitigations

Execution T1155 AppleScript

Sub Techniques

Detections

Mitigations

Execution T1053 Scheduled Task/Job

Sub Techniques

Detections

Mitigations

Execution T1559 Inter-Process Communication

Sub Techniques

Detections

Mitigations

Execution T1064 Scripting

Sub Techniques

Detections

Mitigations

Execution T1204 User Execution

Sub Techniques

Detections

Mitigations

Execution T1047 Windows Management Instrumentation

Sub Techniques

Detections

Mitigations

Execution T1072 Software Deployment Tools

Sub Techniques

Detections

Mitigations

Execution T1569 System Services

Sub Techniques

Detections

Mitigations

Execution T1106 Native API

Sub Techniques

Detections

Mitigations

Execution T1129 Shared Modules

Sub Techniques

Detections

Mitigations

Execution T1203 Exploitation for Client Execution

Sub Techniques

Detections

Mitigations

Exfiltration T1048 Exfiltration Over Alternative Protocol

Sub Techniques

Detections

Mitigations

Exfiltration T1011 Exfiltration Over Other Network Medium

Sub Techniques

Detections

Mitigations

Exfiltration T1567 Exfiltration Over Web Service

Sub Techniques

Detections

Mitigations

Exfiltration T1041 Exfiltration Over C2 Channel

Sub Techniques

Detections

Mitigations

Exfiltration T1022 Data Encrypted

Sub Techniques

Detections

Mitigations

Exfiltration T1002 Data Compressed

Sub Techniques

Detections

Mitigations

Impact T1490 Inhibit System Recovery

Sub Techniques

Detections

Mitigations

Impact T1498 Network Denial of Service

Sub Techniques

Detections

Mitigations

Impact T1531 Account Access Removal

Sub Techniques

Detections

Mitigations

Impact T1561 Disk Wipe

Sub Techniques

Detections

Mitigations

Impact T1485 Data Destruction

Sub Techniques

Detections

Mitigations

Impact T1499 Endpoint Denial of Service

Sub Techniques

Detections

Mitigations

Impact T1486 Data Encrypted for Impact

Sub Techniques

Detections

Mitigations

Impact T1565 Data Manipulation

Sub Techniques

Detections

Mitigations

Impact T1489 Service Stop

Sub Techniques

Detections

Mitigations

Impact T1491 Defacement

Sub Techniques

Detections

Mitigations

Impact T1529 System Shutdown/Reboot

Sub Techniques

Detections

Mitigations

Impact T1495 Firmware Corruption

Sub Techniques

Detections

Mitigations

Impact T1496 Resource Hijacking

Sub Techniques

Detections

Mitigations

Initial Access T1199 Trusted Relationship

Sub Techniques

Detections

Mitigations

Initial Access T1189 Drive-by Compromise

Sub Techniques

Detections

Mitigations

Initial Access T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Initial Access T1133 External Remote Services

Sub Techniques

Detections

Mitigations

Initial Access T1195 Supply Chain Compromise

Sub Techniques

Detections

Mitigations

Initial Access T1091 Replication Through Removable Media

Sub Techniques

Detections

Mitigations

Initial Access T1566 Phishing

Sub Techniques

Detections

Mitigations

Initial Access T1192 Spearphishing Link

Sub Techniques

Detections

Mitigations

Initial Access T1190 Exploit Public-Facing Application

Sub Techniques

Detections

Mitigations

Lateral Movement T1550 Use Alternate Authentication Material

Sub Techniques

Detections

Mitigations

Lateral Movement T1021 Remote Services

Sub Techniques

Detections

Mitigations

Lateral Movement T1017 Application Deployment Software

Sub Techniques

Detections

Mitigations

Lateral Movement T1563 Remote Service Session Hijacking

Sub Techniques

Detections

Mitigations

Lateral Movement T1091 Replication Through Removable Media

Sub Techniques

Detections

Mitigations

Lateral Movement T1072 Software Deployment Tools

Sub Techniques

Detections

Mitigations

Lateral Movement T1570 Lateral Tool Transfer

Sub Techniques

Detections

Mitigations

Lateral Movement T1210 Exploitation of Remote Services

Sub Techniques

Detections

Mitigations

Lateral Movement T1534 Internal Spearphishing

Sub Techniques

Detections

Mitigations

Persistence T1547 Boot or Logon Autostart Execution

Sub Techniques

Detections

Mitigations

Persistence T1556 Modify Authentication Process

Sub Techniques

Detections

Mitigations

Persistence T1031 Modify Existing Service

Sub Techniques

Detections

Mitigations

Persistence T1098 Account Manipulation

Sub Techniques

Detections

Mitigations

Persistence T1542 Pre-OS Boot

Sub Techniques

Detections

Mitigations

Persistence T1137 Office Application Startup

Sub Techniques

Detections

Mitigations

Persistence T1574 Hijack Execution Flow

Sub Techniques

Detections

Mitigations

Persistence T1053 Scheduled Task/Job

Sub Techniques

Detections

Mitigations

Persistence T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Persistence T1133 External Remote Services

Sub Techniques

Detections

Mitigations

Persistence T1136 Create Account

Sub Techniques

Detections

Mitigations

Persistence T1023 Shortcut Modification

Sub Techniques

Detections

Mitigations

Persistence T1505 Server Software Component

Sub Techniques

Detections

Mitigations

Persistence T1176 Browser Extensions

Sub Techniques

Detections

Mitigations

Persistence T1546 Event Triggered Execution

Sub Techniques

Detections

Mitigations

Persistence T1037 Boot or Logon Initialization Scripts

Sub Techniques

Detections

Mitigations

Persistence T1543 Create or Modify System Process

Sub Techniques

Detections

Mitigations

Persistence T1060 Registry Run Keys / Startup Folder

Sub Techniques

Detections

Mitigations

Persistence T1138 Application Shimming

Sub Techniques

Detections

Mitigations

Privilege Escalation T1547 Boot or Logon Autostart Execution

Sub Techniques

Detections

Mitigations

Privilege Escalation T1068 Exploitation for Privilege Escalation

Sub Techniques

Detections

Mitigations

Privilege Escalation T1098 Account Manipulation

Sub Techniques

Detections

Mitigations

Privilege Escalation T1055 Process Injection

Sub Techniques

Detections

Mitigations

Privilege Escalation T1574 Hijack Execution Flow

Sub Techniques

Detections

Mitigations

Privilege Escalation T1053 Scheduled Task/Job

Sub Techniques

Detections

Mitigations

Privilege Escalation T1078 Valid Accounts

Sub Techniques

Detections

Mitigations

Privilege Escalation T1546 Event Triggered Execution

Sub Techniques

Detections

Mitigations

Privilege Escalation T1037 Boot or Logon Initialization Scripts

Sub Techniques

Detections

Mitigations

Privilege Escalation T1543 Create or Modify System Process

Sub Techniques

Detections

Mitigations

Privilege Escalation T1134 Access Token Manipulation

Sub Techniques

Detections

Mitigations

Privilege Escalation T1548 Abuse Elevation Control Mechanism

Sub Techniques

Detections

Mitigations

Privilege Escalation T1138 Application Shimming

Sub Techniques

Detections

Mitigations

Reconnaissance T1591 Gather Victim Org Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1595 Active Scanning

Sub Techniques

Detections

Mitigations

Reconnaissance T1592 Gather Victim Host Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1589 Gather Victim Identity Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1596 Search Open Technical Databases

Sub Techniques

Detections

Mitigations

Reconnaissance T1590 Gather Victim Network Information

Sub Techniques

Detections

Mitigations

Reconnaissance T1593 Search Open Websites/Domains

Sub Techniques

Detections

Mitigations

Resource Development T1583 Acquire Infrastructure

Sub Techniques

Detections

Mitigations

Resource Development T1608 Stage Capabilities

Sub Techniques

Detections

Mitigations

Resource Development T1586 Compromise Accounts

Sub Techniques

Detections

Mitigations

Resource Development T1587 Develop Capabilities

Sub Techniques

Detections

Mitigations

Resource Development T1585 Establish Accounts

Sub Techniques

Detections

Mitigations

Resource Development T1584 Compromise Infrastructure

Sub Techniques

Detections

Mitigations

Resource Development T1588 Obtain Capabilities

Sub Techniques

Detections

Mitigations

Total Count : 666


https://attack.mitre.org/groups/G0011
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/dark-river-you-can-t-see-them-but-they-re-there/
https://securelist.com/apt-trends-report-q1-2021/101967/
https://asec.ahnlab.com/en/56405/
https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds
https://www.bleepingcomputer.com/news/security/coinspaid-blames-lazarus-hackers-for-theft-of-37-300-000-in-crypto/
https://www.secureworks.com/research/threat-profiles/nickel-academy
https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/
https://www.youtube.com/watch?v=rjA0Vf75cYk
https://suspected.tistory.com/269
https://www.telsy.com/lazarus-gate/
https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packages
https://blog.alyac.co.kr/2105
https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update
https://web.archive.org/web/20130607233212/https://www.symantec.com/connect/blogs/south-korean-financial-companies-targeted-castov
https://securelist.com/bluenoroff-methods-bypass-motw/108383/
https://us-cert.cisa.gov/ncas/alerts/aa21-048a
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/
https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage
https://norfolkinfosec.com/a-lazarus-keylogger-pslogger/
https://objective-see.com/blog/blog_0x54.html
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-239a
https://objective-see.com/blog/blog_0x5F.html
https://www.flashpoint-intel.com/blog/linguistic-analysis-wannacry-ransomware/
https://www.secureworks.com/research/threat-profiles/bronze-fleetwood
https://www.virusbulletin.com/uploads/pdf/conference/vb2024/papers/Sugarcoating-KANDYKORN-a-sweet-dive-into-a-sophisticated-MacOS-backdoor.pdf
https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and
https://www.hvs-consulting.de/lazarus-report/
https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/
https://malverse.it/analisi-bankshot-copperhedge
https://labs.sentinelone.com/dprk-hidden-cobra-update-north-korean-malicious-cyber-activity/
https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and
https://www.secureworks.com/research/threat-profiles/aluminum-saratoga
https://www.linkedin.com/posts/alessio-di-santo-712348197_iocs-ttps-lazarusgroup-activity-7263976334807220224-N6Ue/
http://www.nartv.org/mirror/ghostnet.pdf
https://www.theguardian.com/world/2009/jul/08/south-korea-cyber-attack
https://unit42.paloaltonetworks.com/atoms/iron-taurus/
https://blogs.jpcert.or.jp/ja/2023/05/dangerouspassword.html
https://www.rapid7.com/blog/post/2023/03/30/backdoored-3cxdesktopapp-installer-used-in-active-threat-campaign/
https://www.bleepingcomputer.com/news/security/fbi-links-north-korean-hackers-to-308-million-crypto-heist/
https://community.broadcom.com/symantecenterprise/viewdocument/attackers-target-dozens-of-global-b
https://app.box.com/s/xyyord0b806e6or2nh92coxw2areyyx4
https://st.drweb.com/static/new-www/news/2021/april/drweb_research_attacks_on_russian_research_institutes_en.pdf
https://twitter.com/ESETresearch/status/1559553324998955010
https://attack.mitre.org/groups/G0082
https://blogs.vmware.com/security/2020/09/detecting-threats-in-real-time-with-active-c2-information.html
https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-targeting-brazil
https://blog.trendmicro.com/trendlabs-security-intelligence/operation-endtrade-finding-multi-stage-backdoors-that-tick/
https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/the-hack-of-sony-pictures-what-you-need-to-know
https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside
https://www.elastic.co/security-labs/DPRK-strikes-using-a-new-variant-of-rustbucket
https://slowmist.medium.com/slowmist-our-in-depth-investigation-of-north-korean-apts-large-scale-phishing-attack-on-nft-users-362117600519
https://public.intel471.com/blog/partners-in-crime-north-koreans-and-elite-russian-speaking-cybercriminals/
https://therecord.media/3cx-attack-north-korea-lazarus-group
https://www.bankinfosecurity.com/vietnamese-bank-blocks-1-million-online-heist-a-9105
https://securelist.com/dtrack-targeting-europe-latin-america/107798/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048d
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-232a
https://news.sophos.com/en-us/2019/09/18/the-wannacry-hangover/
https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023
https://securelist.com/lazarus-new-malware/115059/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048f
https://dragos.com/resource/covellite/
https://www.welivesecurity.com/2021/04/08/are-you-afreight-dark-watch-out-vyveva-new-lazarus-backdoor/
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/
https://mega.nz/file/lkh1gY5C#93FUlwTwl0y27cfM0jtm4SYnWbtk06d0qoDg1e4eQ6s
https://apt.etda.or.th/cgi-bin/showcard.cgi?u=f04ded49-5b0e-4422-9c6c-4c6e2ed7d3d3
https://asec.ahnlab.com/en/33801/
https://malwareandstuff.com/peb-where-magic-is-stored/
https://www.krcert.or.kr/filedownload.do?attach_file_seq=3277&attach_file_id=EpF3277.pdf
https://www.intezer.com/blog/malware-analysis/chinaz-relations/
https://blogs.jpcert.or.jp/en/2021/01/Lazarus_malware2.html
https://asec.ahnlab.com/en/60792/
https://www.bitdefender.com/files/News/CaseStudies/study/185/Bitdefender-Business-2017-WhitePaper-PZCHAO-crea2452-en-EN-GenericUse.pdf
https://www.youtube.com/watch?v=mrTdSdMMgnk
https://securelist.com/operation-applejeus-sequel/95596/
https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/WannaCry-Aftershock.pdf
https://blog.avast.com/ransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today
https://blog.lexfo.fr/ressources/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf
https://www.mandiant.com/resources/blog/apt29-evolving-diplomatic-phishing
https://objective-see.org/blog/blog_0x73.html
https://sites.temple.edu/care/ci-rw-attacks/
https://research.checkpoint.com/north-korea-turns-against-russian-targets/
https://cyware.com/news/lazarus-hacking-group-expand-their-attack-horizon-by-targeting-an-israeli-defense-company-02e2ec77
https://www.anquanke.com/post/id/223817
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/a-look-into-the-lazarus-groups-operations
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Tools-Report.pdf
https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/
https://blogs.jpcert.or.jp/en/2021/01/Lazarus_tools.html
https://www.nttsecurity.com/docs/librariesprovider3/default-document-library/craftypanda-analysis-report
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/lazarus-recruitment/
https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks-new-malware-0
https://securingtomorrow.mcafee.com/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/
https://attack.mitre.org/groups/G0032/
https://mp.weixin.qq.com/s/2sV-DrleHiJMSpSCW0kAMg
https://www.malwarebytes.com/blog/news/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day
https://github.com/xl7dev/WebShell/blob/master/Asp/RedHat%20Hacker.asp
https://blog.netlab.360.com/dacls-the-dual-platform-rat/
https://thehackernews.com/2022/04/chinese-hackers-target-vmware-horizon.html
https://www.youtube.com/watch?v=uakw2HMGZ-I
https://medium.com/s2wlab/analysis-of-lazarus-malware-abusing-non-activex-module-in-south-korea-7d52b9539c12
https://www.fireeye.com/blog/threat-research/2016/06/apt_group_sends_spea.html
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf
https://securelist.com/bluenoroff-new-macos-malware/111290/
https://www.bloomberg.com/news/articles/2018-05-29/mexico-foiled-a-110-million-bank-heist-then-kept-it-a-secret
http://contagiodump.blogspot.com/2012/06/rat-samples-from-syrian-targeted.html
https://www.cfr.org/interactive/cyber-operations/lazarus-group
https://www.hhs.gov/sites/default/files/manage-engine-vulnerability-sector-alert-tlpclear.pdf
https://blogs.jpcert.or.jp/en/2022/07/vsingle.html
https://sansec.io/research/north-korea-magecart
https://www.virusbulletin.com/uploads/pdf/conference/vb2023/papers/Lazarus-campaigns-and-backdoors-in-2022-2023.pdf
https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks-new-malware
https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine
https://www.boho.or.kr/filedownload.do?attach_file_seq=2452&attach_file_id=EpF2452.pdf
https://storage.googleapis.com/pub-tools-public-publication-data/pdf/ce44cbda9fdc061050c1d2a5dec0270874a9dc85.pdf
https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-up-to-no-good-again/
https://blogs.blackberry.com/en/2023/03/initial-implants-and-network-analysis-suggest-the-3cx-supply-chain-operation-goes-back-to-fall-2022
https://www.symantec.com/connect/blogs/wannacry-ransomware-attacks-show-strong-links-lazarus-group
https://objective-see.com/blog/blog_0x57.html
https://www.darkreading.com/attacks-breaches/north-korean-hacking-group-steals-$135-million-from-indian-bank-/d/d-id/1332678
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/april/decoding-network-data-from-a-gh0st-rat-variant/
https://www.carbonblack.com/2020/04/16/vmware-carbon-black-tau-threat-analysis-the-evolution-of-lazarus/
https://www.bleepingcomputer.com/news/security/us-seizes-sinbad-crypto-mixer-used-by-north-korean-lazarus-hackers/
https://www.proofpoint.com/sites/default/files/pfpt-us-wp-north-korea-bitten-by-bitcoin-bug-180129.pdf
https://www.trendmicro.com/en_us/research/23/c/information-on-attacks-involving-3cx-desktop-app.html
https://www.secureworks.com/research/threat-profiles/bronze-edison
https://www.us-cert.gov/ncas/alerts/TA17-164A
https://www.newyorker.com/magazine/2021/04/26/the-incredible-rise-of-north-koreas-hacking-army
https://blog.macnica.net/blog/2020/11/dtrack.html
https://www.secureworks.com/research/threat-profiles/iron-viking
https://github.com/0xZuk0/rules-of-yaras/blob/main/reports/Wannacry%20Ransomware%20Report.pdf
https://blog.talosintelligence.com/2022/02/threat-roundup-0204-0211.html
https://blog.comae.io/wannacry-decrypting-files-with-wanakiwi-demo-86bafb81112d
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/how-cybercriminals-abuse-cloud-tunneling-services
https://news.sophos.com/en-us/2021/03/15/dearcry-ransomware-attacks-exploit-exchange-server-vulnerabilities/
https://home.treasury.gov/index.php/news/press-releases/sm774
https://securelist.com/the-lazarus-group-deathnote-campaign/109490/
https://asec.ahnlab.com/ko/47751/
https://www.brighttalk.com/webcast/18282/493986
https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn
https://labs.withsecure.com/content/dam/labs/docs/WithSecure-Lazarus-No-Pineapple-Threat-Intelligence-Report-2023.pdf
https://exchange.xforce.ibmcloud.com/threat-group/0c0c39d309b5c7f00a0a7edd54bb025e
https://st.drweb.com/static/new-www/news/2020/october/Study_of_the_ShadowPad_APT_backdoor_and_its_relation_to_PlugX_en.pdf
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?1625657388
https://marcoramilli.com/2019/11/04/is-lazarus-apt38-targeting-critical-infrastructures/
https://attack.mitre.org/groups/G0001/
https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/
https://www.microsoft.com/security/blog/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/
https://www.secureworks.com/research/threat-profiles/bronze-globe
https://raw.githubusercontent.com/yt0ng/cracking_softcell/main/Cracking_SOFTCLL_TLP_WHITE.pdf
https://www.clearskysec.com/wp-content/uploads/2020/08/Dream-Job-Campaign.pdf
https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/
https://www.fbi.gov/news/press-releases/fbi-identifies-cryptocurrency-funds-stolen-by-dprk
https://www.botconf.eu/wp-content/uploads/2022/05/Botconf2022-40-LunghiHorejsi.pdf
https://blog.talosintelligence.com/lazarus-quiterat/
https://web.archive.org/web/20160527050022/https://www.symantec.com/connect/blogs/swift-attackers-malware-linked-more-financial-attacks
https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/
https://www.zdnet.com/article/north-korean-hackers-infiltrate-chiles-atm-network-after-skype-job-interview/
https://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html
https://threatpost.com/banco-de-chile-wiper-attack-just-a-cover-for-10m-swift-heist/132796/
https://blog.talosintelligence.com/2019/01/fake-korean-job-posting.html
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07170728/Guerrero-Saade-Raiu-VB2017.pdf
https://objective-see.com/blog/blog_0x49.html
https://attack.mitre.org/groups/G0026
https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf
https://www.trmlabs.com/post/inside-north-koreas-crypto-heists
https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Loaders-Installers-and-Uninstallers-Report.pdf
https://i.blackhat.com/eu-20/Wednesday/eu-20-Rivera-From-Zero-To-Sixty-The-Story-Of-North-Koreas-Rapid-Ascent-To-Becoming-A-Global-Cyber-Superpower.pdf
https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344
https://www.cyberbit.com/endpoint-security/dtrack-apt-malware-found-in-nuclear-power-plant/
https://blog.google/threat-analysis-group/update-campaign-targeting-security-researchers/
https://web.archive.org/web/20131123012339/https://www.symantec.com/connect/blogs/trojankoredos-comes-unwelcomed-surprise
https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-1/
https://doubleagent.net/fastcash-for-linux/
https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/
https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/
https://www.virusbulletin.com/uploads/pdf/conference/vb2022/papers/VB2022-Lazarus-and-BYOVD-evil-to-the-Windows-core.pdf
https://researchcenter.paloaltonetworks.com/2017/08/unit42-blockbuster-saga-continues/
https://labs.bitdefender.com/wp-content/uploads/downloads/operation-pzchao-inside-a-highly-specialized-espionage-infrastructure/
https://www.welivesecurity.com/2018/04/03/lazarus-killdisk-central-american-casino/
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-B_WHITE.PDF
https://www.cisa.gov/uscert/ncas/alerts/aa22-187a
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-north-star-a-job-offer-thats-too-good-to-be-true/
https://www.cfr.org/interactive/cyber-operations/covellite
http://blog.emsisoft.com/2017/05/12/wcry-ransomware-outbreak/
https://www.bleepingcomputer.com/news/security/dprk-hacking-groups-breach-south-korean-defense-contractors/
https://www.elliptic.co/blog/how-the-lazarus-group-is-stepping-up-crypto-hacks-and-changing-its-tactics
https://www.group-ib.com/blog/apt-lazarus-python-scripts/
https://securityintelligence.com/posts/direct-kernel-object-manipulation-attacks-etw-providers/
https://content.fireeye.com/apt/rpt-apt38
https://media.defense.gov/2023/Feb/09/2003159161/-1/-1/0/CSA_RANSOMWARE_ATTACKS_ON_CI_FUND_DPRK_ACTIVITIES.PDF
https://www.secureworks.com/research/threat-profiles/bronze-union
https://www.reversinglabs.com/blog/vmconnect-supply-chain-campaign-continues
https://ti.qianxin.com/blog/articles/Analysis-of-attacks-by-Lazarus-using-Daewoo-shipyard-as-bait/
https://thehackernews.com/2023/03/lazarus-group-exploits-zero-day.html
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048c
https://www.documentcloud.org/documents/4834259-Park-Jin-Hyok-Complaint.html
https://www.zscaler.com/blogs/security-research/analysis-lilithbot-malware-and-eternity-threat-group
https://research.openanalysis.net/3cx/northkorea/apt/triage/2023/03/30/3cx-malware.html#Functionality
https://us-cert.cisa.gov/ncas/alerts/aa22-108a
https://unit42.paloaltonetworks.com/unit42-blockbuster-saga-continues/
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/
https://www.bleepingcomputer.com/news/security/lazarus-group-deploys-its-first-mac-malware-in-cryptocurrency-exchange-hack/
https://labs.f-secure.com/assets/BlogFiles/f-secureLABS-tlp-white-lazarus-threat-intel-report2.pdf
http://baesystemsai.blogspot.de/2017/10/taiwan-heist-lazarus-tools.html
https://vipyrsec.com/research/elf64-rat-malware/
https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
https://www.bleepingcomputer.com/news/security/north-korean-hackers-stole-research-data-in-two-month-long-breach/
https://dragos.com/adversaries.html
https://www.boho.or.kr/filedownload.do?attach_file_seq=2612&attach_file_id=EpF2612.pdf
https://securelist.com/operation-applejeus/87553/
https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html?m=1
https://www.sentinelone.com/blog/four-distinct-families-of-lazarus-malware-target-apples-macos-platform/
https://www.ibtimes.sg/covid-19-relief-north-korea-hackers-lazarus-planning-massive-attack-us-uk-japan-singapore-47072
https://cocomelonc.github.io/tutorial/2021/09/04/simple-malware-av-evasion.html
https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/
https://www.secrss.com/articles/18635
https://risky.biz/whatiswinnti/
https://www.intezer.com/wp-content/uploads/2021/02/Intezer-2020-Go-Malware-Round-Up.pdf
https://www.us-cert.gov/ncas/analysis-reports/ar20-133a
https://unit42.paloaltonetworks.com/tdrop2-attacks-suggest-dark-seoul-attackers-return/
https://i.blackhat.com/USA-20/Wednesday/us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-Actors-Use-Public-Standards-For-Financial-Fraud-wp.pdf
https://labs.sentinelone.com/the-deadly-planeswalker-how-the-trickbot-group-united-high-tech-crimeware-apt/
https://asec.ahnlab.com/ko/53832/
https://tccontre.blogspot.com/2021/02/gh0strat-anti-debugging-nested-seh-try.html
https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/
https://www.vkremez.com/2019/10/lets-learn-dissecting-lazarus-windows.html
https://www.sygnia.co/mata-framework
https://unit42.paloaltonetworks.com/unit42-the-blockbuster-sequel/
https://www.fbi.gov/news/press-releases/fbi-identifies-lazarus-group-cyber-actors-as-responsible-for-theft-of-41-million-from-stakecom
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Analysen-und-Prognosen/Threat-Intelligence/Aktive_APT-Gruppen/aktive-apt-gruppen_node.html
https://www.symantec.com/security-center/writeup/2018-021216-4405-99#technicaldescription
https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045a
https://securelist.com/my-name-is-dtrack/93338/
https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-june-2023/
https://brandefense.io/blog/apt-groups/lazarus-apt-group-apt38/
https://decoded.avast.io/luiginocamastra/from-byovd-to-a-0-day-unveiling-advanced-exploits-in-cyber-recruiting-scams/
https://asec.ahnlab.com/ko/56256/
https://web.archive.org/web/20170311192337/http://download01.norman.no:80/documents/ThemanyfacesofGh0stRat.pdf
https://www.cfr.org/interactive/cyber-operations/compromise-cryptocurrency-exchanges-south-korea
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-north-korea-indictment
https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3cx-supply-chain-attack
https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf
https://twitter.com/kucher1n/status/1642886340105601029?t=3GCn-ZhDjqWEMXya_PKseg
https://blogs.vmware.com/security/2022/11/threat-analysis-active-c2-discovery-using-protocol-emulation-part4-dacls-aka-mata.html
https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-campaign-targeting-cryptocurrencies-reveals-remote-controller-tool-evolved-ratankba/
https://threatpost.com/operation-blockbuster-coalition-ties-destructive-attacks-to-lazarus-group/116422/
https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/
https://technical.nttsecurity.com/post/102fnog/targeted-trickbot-activity-drops-powerbrace-backdoor
https://attack.mitre.org/groups/G0032
https://www.cisa.gov/uscert/sites/default/files/publications/AA22-108A-TraderTraitor-North_Korea_APT_Targets_Blockchain_Companies.pdf
https://www.zscaler.com/blogs/security-research/catching-rats-over-custom-protocols
https://www.trendmicro.com/en_us/research/21/d/water-pamola-attacked-online-shops-via-malicious-orders.html
https://medium.com/threat-intel/lazarus-attacks-wannacry-5fdeddee476c
https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-Lazarus-targets-defense-industry-with-Threatneedle-En.pdf
https://www.acalvio.com/lateral-movement-technique-employed-by-hidden-cobra/
https://www.3cx.com/blog/news/mandiant-security-update2/
https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/
https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e
https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970
https://threatrecon.nshc.net/2019/01/23/sectora01-custom-proxy-utility-tool-analysis/
https://asec.ahnlab.com/en/32572/
https://media.ccc.de/v/froscon2021-2670-der_cyber-bankraub_von_bangladesch
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048a
https://www.bleepingcomputer.com/news/security/lazarus-hackers-linked-to-60-million-alphapo-cryptocurrency-heist/
https://blog.malwarebytes.com/threat-intelligence/2022/01/north-koreas-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign/
https://www.threatray.com/blog/establishing-the-tigerrat-and-tigerdownloader-malware-families
http://report.threatbook.cn/LS.pdf
https://twitter.com/VK_Intel/status/1182730637016481793
https://github.com/werkamsus/Lilith
https://blog.talosintelligence.com/lazarus-collectionrat/
https://www.elastic.co/security-labs/elastic-users-protected-from-suddenicon-supply-chain-attack
https://norfolkinfosec.com/osint-reporting-on-dprk-and-ta505-overlap/
https://blog.cyble.com/2022/07/12/new-ransomware-groups-on-the-rise/
https://asec.ahnlab.com/wp-content/uploads/2023/10/20231013_Lazarus_OP.Dream_Magic.pdf
https://www.bleepingcomputer.com/news/security/us-sanctions-crypto-mixer-tornado-cash-used-by-north-korean-hackers/
https://www.secureworks.com/research/wcry-ransomware-analysis
https://hub.elliptic.co/analysis/north-korea-s-lazarus-group-likely-responsible-for-35-million-atomic-crypto-theft/
http://blog.nsfocus.net/stumbzarus-apt-lazarus/
https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
https://asec.ahnlab.com/en/48223/
https://www.welivesecurity.com/2017/02/16/demystifying-targeted-malware-used-polish-banks/
https://us-cert.cisa.gov/ncas/alerts/aa20-345a
https://s.tencent.com/research/report/836.html
https://asec.ahnlab.com/en/53132/
https://decoded.avast.io/luigicamastra/apt-group-planted-backdoors-targeting-high-profile-networks-in-central-asia
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage
https://objective-see.com/blog/blog_0x53.html
https://www.us-cert.gov/ncas/analysis-reports/ar19-252a
https://www.cyberscoop.com/north-korea-hackers-lazarus-group-israel-defense/
https://dissectingmalwa.re/third-times-the-charm-analysing-wannacry-samples.html
https://www.cisa.gov/uscert/sites/default/files/publications/aa22-187a-north-korean%20state-sponsored-cyber-actors-use-maui-ransomware-to-target-the-hph-sector.pdf
https://i.blackhat.com/USA-20/Wednesday/us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-Actors-Use-Public-Standards-For-Financial-Fraud.pdf
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/592/original/Hashes_IOCs_for_coverage.txt
https://asec.ahnlab.com/en/55369/
https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/
https://www.darkreading.com/remote-workforce/dprk-using-unpatched-zimbra-devices-to-spy-on-researchers-
https://youtu.be/8hJyLkLHH8Q?t=1208
https://www.symantec.com/connect/blogs/trojankoredos-comes-unwelcomed-surprise
https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists
https://unit42.paloaltonetworks.com/unit42-operation-blockbuster-goes-mobile/
https://asec.ahnlab.com/wp-content/uploads/2021/11/Lazarus-%EA%B7%B8%EB%A3%B9%EC%9D%98-NukeSped-%EC%95%85%EC%84%B1%EC%BD%94%EB%93%9C-%EB%B6%84%EC%84%9D-%EB%B3%B4%EA%B3%A0%EC%84%9C.pdf
https://therecord.media/coinex-confirms-hack-after-31-million-allegedly-stolen
https://securelist.com/lazarus-trojanized-defi-app/106195/
http://www.intezer.com/lazarus-group-targets-more-cryptocurrency-exchanges-and-fintech-companies/
https://www.secureworks.com/research/threat-profiles/nickel-gladstone
https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signed-binary/
http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks
https://www.3cx.com/blog/news/mandiant-initial-results/
https://asec.ahnlab.com/en/57685/
https://www.computing.co.uk/ctg/news/3074007/lazarus-rises-warning-over-new-hoplight-malware-linked-with-north-korea
https://cofense.com/blog/open-source-gh0st-rat-still-haunting-inboxes-15-years-after-release/
https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/
https://attack.mitre.org/groups/G0096
https://www.anquanke.com/post/id/230161
https://adeo.com.tr/wp-content/uploads/2020/05/ADEO-Lazarus-APT38.pdf
https://www.reversinglabs.com/blog/vmconnect-malicious-pypi-packages-imitate-popular-open-source-modules
https://symantec-blogs.broadcom.com/blogs/threat-intelligence/elfin-apt33-espionage
https://therecord.media/coinex-cryptocurrency-heist-north-korea
https://www.bitdefender.com/en-us/blog/labs/lazarus-group-targets-organizations-with-sophisticated-linkedin-recruiting-scam
https://www.clearskysec.com/wp-content/uploads/2021/05/CryptoCore-Lazarus-Clearsky.pdf
https://blog.google/threat-analysis-group/countering-threats-north-korea/
http://researchcenter.paloaltonetworks.com/2017/04/unit42-the-blockbuster-sequel/
https://securelist.com/unveiling-lazarus-new-campaign/110888/
https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers/
https://www.trmlabs.com/post/north-korean-hackers-stole-600-million-in-crypto-in-2023
https://threatray.com/wp-content/uploads/2021/12/threatray-establishing-the-tigerrat-and-tigerdownloader-malware-families.pdf
https://krebsonsecurity.com/2017/05/u-k-hospitals-hit-in-widespread-ransomware-attack/
https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/
https://hackcon.org/uploads/327/05%20-%20Kwak.pdf
https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/
https://blog.talosintelligence.com/2019/09/panda-evolution.html
https://blog.malwarebytes.com/cybercrime/2017/05/how-did-wannacry-ransomworm-spread/
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
https://www.reuters.com/article/us-cyber-heist-swift-specialreport-idUSKCN0YB0DD
https://securelist.com/apt-trends-report-q2-2020/97937/
https://themoscowtimes.com/news/wcry-virus-reportedly-infects-russian-interior-ministrys-computer-network-57984
https://sansorg.egnyte.com/dl/3P3HxFiNgL
https://vblocalhost.com/uploads/VB2021-Park.pdf
https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing
https://threatbook.cn/ppt/The%2520Nightmare%2520of%2520Global%2520Cryptocurrency%2520Companies%2520-%2520Demystifying%2520the%2520%25E2%2580%259CDangerousPassword%25E2%2580%259D%2520of%2520the%2520APT%2520Organization.pdf
https://www.cisa.gov/news-events/analysis-reports/ar18-165a
https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits
https://cloud.google.com/blog/topics/threat-intelligence/unc2970-backdoor-trojanized-pdf-reader
https://blogs.jpcert.or.jp/en/2021/03/Lazarus_malware3.html
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability/
https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-continues-heists-mounts-attacks-on-financial-organizations-in-latin-america/
https://www.riskiq.com/blog/labs/lazarus-group-cryptocurrency/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
https://swanleesec.github.io/posts/Malware-Lazarus-group's-Brambul-worm-of-the-former-Wannacry-1
https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html
https://www.cfr.org/interactive/cyber-operations/operation-ghostsecret
https://www.symantec.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
https://asec.ahnlab.com/ko/58215/
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180231/LazarusUnderTheHood_PDF_final_for_securelist.pdf
https://www.us-cert.gov/ncas/analysis-reports/ar20-045b
https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/the-hermit-kingdoms-ransomware-play.html
https://twitter.com/RedDrip7/status/1595365451495706624
https://www.youtube.com/watch?v=LUxOcpIRxmg
https://www.us-cert.gov/ncas/analysis-reports/AR19-100A
https://www.sysnet.ucsd.edu/sysnet/miscpapers/darkmatter-www20.pdf
https://www.microsoft.com/en-us/security/blog/2022/12/06/dev-0139-launches-targeted-attacks-against-the-cryptocurrency-industry/
https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-3/
https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-apt-activity-report-q2-2023-q3-2023.pdf
https://www.us-cert.gov/ncas/analysis-reports/ar19-304a
https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/
https://threatpost.com/lazarus-apt-spinoff-linked-to-banking-hacks/124746/
https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto
https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html
https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf
https://cybersecurity.att.com/blogs/labs-research/lazarus-campaign-ttps-and-evolution
http://www.malware-traffic-analysis.net/2018/01/04/index.html
https://www.us-cert.gov/ncas/alerts/TA18-149A
https://therecord.media/north-korea-accused-of-orchestrating-100-million-harmony-crypto-hack/
https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/
https://twitter.com/KevinPerlow/status/1160766519615381504
https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
https://www.attackiq.com/2023/01/05/emulating-the-highly-sophisticated-north-korean-adversary-lazarus-group/
https://blog.trendmicro.com/trendlabs-security-intelligence/ratankba-watering-holes-against-enterprises/
https://www.cyberbit.com/dtrack-apt-malware-found-in-nuclear-power-plant/
https://mandiant.widen.net/s/pkffwrbjlz/m-trends-2023
https://cocomelonc.github.io/tutorial/2021/09/06/simple-malware-av-evasion-2.html
https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
https://vxhive.blogspot.com/2020/11/deep-dive-into-hermes-ransomware.html
https://blogs.jpcert.or.jp/en/2021/10/gh0sttimes.html
https://cocomelonc.github.io/tutorial/2022/05/09/malware-pers-4.html
https://twitter.com/h2jazi/status/1681426768597778440
https://research.nccgroup.com/2022/05/05/north-koreas-lazarus-and-their-initial-access-trade-craft-using-social-media-and-social-engineering/
https://symantec-blogs.broadcom.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware
https://www.youtube.com/watch?v=nUjxH1gW53s
http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf
https://www.il-pib.pl/czasopisma/JTIT/2019/1/113.pdf
https://global.ahnlab.com/global/upload/download/techreport/[AhnLab]Andariel_a_Subgroup_of_Lazarus%20(3).pdf
https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war
https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-berberoka.pdf
https://raw.githubusercontent.com/eric-erki/APT_CyberCriminal_Campagin_Collections/master/2017/2017.05.30.Lazarus_Arisen/Group-IB_Lazarus.pdf
https://www.anomali.com/blog/evidence-of-stronger-ties-between-north-korea-and-swift-banking-attacks
https://github.com/649/APT38-DYEPACK
https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/
https://blog.malwarebytes.com/threat-analysis/2012/10/dark-comet-2-electric-boogaloo/
https://blog.talosintelligence.com/2020/12/2020-year-in-malware.html
https://github.com/monoxgas/sRDI
https://www.bleepingcomputer.com/news/cryptocurrency/coinstats-says-north-korean-hackers-breached-1-590-crypto-wallets/
https://blogs.jpcert.or.jp/en/2020/09/BLINDINGCAN.html
https://www.theverge.com/2022/3/29/23001620/sky-mavis-axie-infinity-ronin-blockchain-validation-defi-hack-nft
https://www.cisa.gov/uscert/ncas/alerts/TA18-275A
https://www.trendmicro.com/en_us/research/23/b/earth-kitsune-delivers-new-whiskerspy-backdoor.html
https://blog.malwarebytes.com/threat-analysis/2020/05/new-mac-variant-of-lazarus-dacls-rat-distributed-via-trojanized-2fa-app/
https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf
https://www.us-cert.gov/ncas/analysis-reports/AR18-149A
https://businessinsights.bitdefender.com/tech-advisory-manageengine-cve-2022-47966
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/10/18092216/Updated-MATA-attacks-Eastern-Europe_full-report_ENG.pdf
https://mp.weixin.qq.com/s/nnLqUBPX8xZ3hCr5u-iSjQ
https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html
https://www.mandiant.com/resources/blog/lightshift-and-lightshow
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045c
https://www.symantec.com/connect/blogs/duuzer-back-door-trojan-targets-south-korea-take-over-computers
https://blog.trendmicro.com/trendlabs-security-intelligence/what-we-can-learn-from-the-bangladesh-central-bank-cyber-heist/
https://www.us-cert.gov/ncas/analysis-reports/AR19-129A
https://www.trendmicro.com/en_us/research/21/l/collecting-in-the-dark-tropic-trooper-targets-transportation-and-government-organizations.html
https://www.youtube.com/watch?v=Q90uZS3taG0
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-north-star-summary-of-our-latest-analysis/
https://blogs.jpcert.or.jp/en/2020/08/Lazarus-malware.html
https://logrhythm.com/blog/a-technical-analysis-of-wannacry-ransomware/
https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/
https://blog.qualys.com/vulnerabilities-threat-research/2022/02/08/lolzarus-lazarus-group-incorporating-lolbins-into-campaigns
https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack
https://blog.naver.com/checkmal/223416580495
https://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html
https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/
https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/
https://www.mandiant.com/resources/blog/dprk-whatsapp-phishing
https://norfolkinfosec.com/dprk-malware-targeting-security-researchers/
https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
https://apt.etda.or.th/cgi-bin/showcard.cgi?u=41dcfaff-d5f0-484d-8649-ef8c61588eec
https://securelist.com/lazarus-andariel-mistakes-and-easyrat/110119/
https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko
https://www.secureworks.com/research/threat-profiles/copper-fieldstone
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/webworm-espionage-rats
https://www.secureworks.com/research/a-peek-into-bronze-unions-toolbox
https://objective-see.org/blog/blog_0x74.html
https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168
https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/
https://home.treasury.gov/news/press-releases/sm924
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant/
https://www.mandiant.com/resources/blog/north-korea-supply-chain
https://www.sentinelone.com/labs/modifiedelephant-apt-and-a-decade-of-fabricating-evidence/
https://posts.specterops.io/introducing-venator-a-macos-tool-for-proactive-detection-34055a017e56
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical
https://blog.cylance.com/the-ghost-dragon
http://www.issuemakerslab.com/research3/
https://www.datanet.co.kr/news/articleView.html?idxno=133346
https://www.welivesecurity.com/2017/01/05/killdisk-now-targeting-linux-demands-250k-ransom-cant-decrypt
https://github.com/jeFF0Falltrades/IoCs/blob/master/APT/dtrack_lazarus_group.md
https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation
https://www.malwarebytes.com/blog/threat-intelligence/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048b
https://www.us-cert.gov/ncas/alerts/TA17-318A
https://www.cadosecurity.com/forensic-triage-of-a-windows-system-running-the-backdoored-3cx-desktop-app/
https://securelist.com/cryptocurrency-businesses-still-being-targeted-by-lazarus/90019/
https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/
https://eng.nis.go.kr/common/download.do?type=&seq=8E464392CD0485169FA97278AEE8B607
https://twitter.com/ShadowChasing1/status/1399369260577681426?s=20
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020OverWatchNowheretoHide.pdf
https://objective-see.com/blog/blog_0x51.html
https://blog.comae.io/wannacry-the-largest-ransom-ware-infection-in-history-f37da8e30a58
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536.11.WHITE.pdf
https://cybergeeks.tech/a-detailed-analysis-of-lazarus-malware-disguised-as-notepad-shell-extension/
http://baesystemsai.blogspot.de/2016/05/cyber-heist-attribution.html
https://blog.malwarebytes.com/threat-analysis/2012/06/you-dirty-rat-part-1-darkcomet/
https://www.microsoft.com/en-us/security/blog/2023/11/22/diamond-sleet-supply-chain-compromise-distributes-a-modified-cyberlink-installer/
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247505438&idx=1&sn=cf1947c7af6581f4a66460ae6d14dc2f
https://global.ahnlab.com/global/upload/download/techreport/%5BAhnLab%5DAndariel_a_Subgroup_of_Lazarus%20(3).pdf
https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised
https://www.cisa.gov/uscert/ncas/alerts/aa20-239a
https://securingtomorrow.mcafee.com/mcafee-labs/android-malware-appears-linked-to-lazarus-cybercrime-group/#sf174581990
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g
https://web.archive.org/web/20140816135909/https://www.symantec.com/connect/blogs/inside-back-door-attack
https://swanleesec.github.io/posts/Malware-Lazarus-group's-Brambul-worm-of-the-former-Wannacry-2
https://docs.huihoo.com/rsaconference/usa-2014/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries-final.pdf
https://twitter.com/BitsOfBinary/status/1321488299932983296
https://drive.google.com/file/d/1XoGQFEJQ4nFAUXSGwcnTobviQ_ms35mG/view
https://blog.talosintelligence.com/2020/11/crat-and-plugins.html
https://blogs.blackberry.com/en/2021/10/drawing-a-dragon-connecting-the-dots-to-find-apt41
https://www.zdnet.com/article/google-north-korean-hackers-have-targeted-security-researchers-via-social-media/
https://cn.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf
https://www.trendmicro.com/en_us/research/22/d/new-apt-group-earth-berberoka-targets-gambling-websites-with-old.html
https://cloud.google.com/blog/topics/threat-intelligence/unc4393-goes-gently-into-silentnight
https://blog.malwarebytes.com/threat-analysis/2019/03/the-advanced-persistent-threat-files-lazarus-group/
https://www.clearskysec.com/wp-content/uploads/2020/06/CryptoCore_Group.pdf
https://securelist.com/lazarus-threatneedle/100803/
https://www.telsy.com/download/5394/?uid=28b0a4577e
https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
https://www.theregister.co.uk/2019/04/10/lazarus_group_malware/
https://www.us-cert.gov/ncas/analysis-reports/ar20-045e
https://baesystemsai.blogspot.com/2017/02/lazarus-watering-hole-attacks.html
https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf
https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
https://github.com/hvs-consulting/ioc_signatures/tree/main/Lazarus_APT37
https://www.welivesecurity.com/2021/02/01/operation-nightscout-supply-chain-attack-online-gaming-asia/
https://www.seqrite.com/blog/rat-used-by-chinese-cyberspies-infiltrating-indian-businesses/
https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_Operation_Interception.pdf
http://www.hexblog.com/?p=1248
https://asec.ahnlab.com/wp-content/uploads/2022/09/Analysis-Report-on-Lazarus-Groups-Rootkit-Attack-Using-BYOVD_Sep-22-2022.pdf
https://medium.com/ax1al/reversing-ryuk-eef8ffd55f12
https://blog.talosintelligence.com/lazarus-three-rats/
https://twitter.com/BitsOfBinary/status/1337330286787518464
https://www.cisa.gov/uscert/ncas/alerts/aa22-108a
https://securelist.com/big-threats-using-code-similarity-part-1/97239/
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-239b
https://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf
https://vb2020.vblocalhost.com/conference/presentations/unveiling-the-cryptomimic/
https://blog.cyble.com/2023/03/31/a-comprehensive-analysis-of-the-3cx-attack
https://go.recordedfuture.com/hubfs/reports/cta-2023-1130.pdf
https://asec.ahnlab.com/en/54195/
https://www.us-cert.gov/ncas/analysis-reports/AR18-165A
https://blog.bushidotoken.net/2020/06/deep-dive-darkhotel-apt.html
https://www.nytimes.com/2013/03/21/world/asia/south-korea-computer-network-crashes.html
https://www.us-cert.gov/ncas/analysis-reports/ar20-045g
https://baesystemsai.blogspot.com/2017/02/lazarus-false-flag-malware.html
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-north-star-behind-the-scenes/
https://www.intezer.com/blog-chinaz-relations/
https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf
https://www.gendigital.com/blog/news/innovation/lazarus-fudmodule-v3
https://securelist.com/apt-trends-report-q2-2019/91897/
https://www.youtube.com/watch?v=1NkzTKkEM2k
https://medium.com/insomniacs/what-happened-between-the-bigbadwolf-and-the-tiger-925549a105b2
https://www.welivesecurity.com/2023/02/23/winordll64-backdoor-vast-lazarus-arsenal/
https://medium.com/s2wlab/analysis-of-threatneedle-c-c-communication-feat-google-tag-warning-to-researchers-782aa51cf74
https://www.us-cert.gov/ncas/alerts/TA17-318B
https://www.kaspersky.com/about/press-releases/2017_chasing-lazarus-a-hunt-for-the-infamous-hackers-to-prevent-large-bank-robberies
https://download.hauri.net/DownSource/down/dwn_detail_down.html?uid=55
https://github.com/Hildaboo/Unidentified081Server
https://blogs.jpcert.or.jp/en/2024/02/lazarus_pypi.html
https://yoroi.company/research/a-deep-dive-into-eternity-group-a-new-emerging-cyber-threat/
http://www.independent.co.uk/news/uk/home-news/wannacry-malware-hack-nhs-report-cybercrime-north-korea-uk-ben-wallace-a8022491.html
https://drive.google.com/file/d/1lq0Sjw4FKBxf017Ss7W7uGMvs7CgFzcA/view
https://vblocalhost.com/uploads/VB2021-Lee-etal.pdf
https://securelist.com/it-threat-evolution-q2-2023/110355/
https://securingtomorrow.mcafee.com/mcafee-labs/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant/
https://www.tgsoft.it/files/report/download.asp?id=7481257469
https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/pf/apt/rpt-apt38-2018.pdf
https://eromang.zataz.com/tag/agentbase-exe/
https://securelist.com/blog/sas/77908/lazarus-under-the-hood/
https://www.sentinelone.com/wp-content/uploads/2022/02/Modified-Elephant-APT-and-a-Decade-of-Fabricating-Evidence-SentinelLabs.pdf
https://securityscorecard.com/wp-content/uploads/2025/01/Report_011325_Strike_Operation99.pdf
https://blog.reversinglabs.com/blog/hidden-cobra
https://www.elliptic.co/blog/north-korean-hackers-return-to-tornado-cash-despite-sanctions
https://www.cisecurity.org/insights/blog/top-10-malware-march-2022
https://asec.ahnlab.com/en/34461/
https://www.us-cert.gov/ncas/alerts/TA18-275A
https://www.sentinelone.com/blog/bluenoroff-how-dprks-macos-rustbucket-seeks-to-evade-analysis-and-detection/
https://baesystemsai.blogspot.de/2017/05/wanacrypt0r-ransomworm.html
https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf
https://thehackernews.com/2023/10/north-koreas-lazarus-group-launders-900.html
https://www.us-cert.gov/ncas/alerts/aa20-106a
https://twitter.com/greglesnewich/status/1742575613834084684
https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf
https://www.welivesecurity.com/2020/11/16/lazarus-supply-chain-attack-south-korea/
https://blog.trendmicro.com/trendlabs-security-intelligence/new-killdisk-variant-hits-financial-organizations-in-latin-america/
https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479
https://medium.com/@DCSO_CyTec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
https://github.blog/2023-07-18-security-alert-social-engineering-campaign-targets-technology-industry-employees/
https://www.symantec.com/connect/blogs/south-korean-financial-companies-targeted-castov
https://usa.kaspersky.com/about/press-releases/2021_apt-actor-lazarus-attacks-defense-industry-develops-supply-chain-attack-capabilities
https://web.archive.org/web/20200922165625/https://dcso.de/2019/03/18/enterprise-malware-as-a-service/
https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf
https://blog.sekoia.io/bluenoroffs-rustbucket-campaign/
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-G.PDF
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-108a
https://norfolkinfosec.com/dprk-targeting-researchers-ii-sys-payload-and-registry-hunting/
https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
https://www.group-ib.com/blog/btc_changer
https://www.cisa.gov/news-events/analysis-reports/ar20-232a
https://securelist.com/lazarus-under-the-hood/77908/
https://youtu.be/_kzFNQySEMw?t=789
https://stairwell.com/wp-content/uploads/2022/07/Stairwell-Threat-Report-Maui-Ransomware.pdf
https://blog.sekoia.io/the-dprk-delicate-sound-of-cyber/
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/
https://www.splunk.com/en_us/blog/security/splunk-insights-investigating-the-3cxdesktopapp-supply-chain-compromise.html
https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-cloud-snooper-report.pdf
https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf
https://web.archive.org/web/20130701021735/https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war
https://research.nccgroup.com/2018/04/17/decoding-network-data-from-a-gh0st-rat-variant/
https://www.bleepingcomputer.com/news/security/north-korean-hackers-linked-to-defense-sector-supply-chain-attack/
https://www.symantec.com/connect/blogs/swift-attackers-malware-linked-more-financial-attacks
https://brandefense.io/blog/apt-groups/mythic-leopard-apt-group/
https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity
https://www.us-cert.gov/ncas/analysis-reports/ar20-045f
https://twitter.com/ccxsaber/status/1277064824434745345
https://www.consilium.europa.eu/en/press/press-releases/2020/07/30/eu-imposes-the-first-ever-sanctions-against-cyber-attacks/
https://www.group-ib.com/blog/3cx-supply-chain-attack/?utm_source=twitter&utm_campaign=3cx-blog&utm_medium=social
https://www.dropbox.com/s/hpr9fas9xbzo2uz/Whitepaper WannaCry Ransomware.pdf?dl=0
https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/
https://blog.gdatasoftware.com/2017/05/29751-wannacry-ransomware-campaign
https://any.run/cybersecurity-blog/darkcomet-rat-technical-analysis/
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research
https://attack.mitre.org/groups/G0034
https://www.us-cert.gov/ncas/alerts/TA14-353A
https://www.us-cert.gov/ncas/analysis-reports/ar20-045d
https://blog.nviso.eu/2022/02/24/threat-update-ukraine-russia-tensions/
https://securelist.com/apt-trends-report-q3-2020/99204/
https://www.youtube.com/watch?v=9nuo-AGg4p4
https://www.us-cert.gov/ncas/current-activity/2020/05/12/north-korean-malicious-cyber-activity
https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-dissecting-operation-troy.pdf
http://www.documentcloud.org/documents/7038686-US-Army-report-on-North-Korean-military.html
https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf
https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048e
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/covid-19-and-new-year-greetings-the-higaisa-group/
https://securityintelligence.com/posts/defensive-considerations-lazarus-fudmodule/
https://blog.prevailion.com/2020/06/the-gh0st-remains-same8.html
https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a
https://www.bleepingcomputer.com/news/security/debridge-finance-crypto-platform-targeted-by-lazarus-hackers/
https://www.prevailion.com/the-gh0st-remains-the-same-2/
https://www.us-cert.gov/ncas/analysis-reports/AR18-221A
https://blog.trendmicro.com/trendlabs-security-intelligence/new-killdisk-variant-hits-latin-american-financial-organizations-again/
https://www.zscaler.com/security-research/3CX-supply-chain-attack-analysis-march-2023
https://www.virusbulletin.com/uploads/pdf/magazine/2018/VB2018-Kalnai-Poslusny.pdf
https://blogs.jpcert.or.jp/en/2022/07/yamabot.html
https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA%3D%3D&mid=2247499462&idx=1&sn=7cc55f3cc2740e8818648efbec21615f
https://asec.ahnlab.com/en/57736/
https://securityscorecard.com/wp-content/uploads/2025/02/Operation-Marstech-Mayhem-Report_021025_03.pdf
https://www.youtube.com/watch?v=fTX-vgSEfjk
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/
https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-F.pdf
https://news.sophos.com/en-us/2022/03/17/the-ransomware-threat-intelligence-center/
https://www.proofpoint.com/sites/default/files/pfpt-us-wp-north-korea-bitten-by-bitcoin-bug.pdf
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability
https://securityscorecard.com/wp-content/uploads/2025/01/Operation-Phantom-Circuit-Report_012725_03.pdf
https://asec.ahnlab.com/ko/22975/
https://www.proofpoint.com/us/threat-insight/post/north-korea-bitten-bitcoin-bug-financially-motivated-campaigns-reveal-new
https://unit42.paloaltonetworks.com/operation-diplomatic-specter/
https://github.com/fboldewin/FastCashMalwareDissected/
https://blogs.vmware.com/security/2021/12/tigerrat-advanced-adversaries-on-the-prowl.html
https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats
https://www.bleepingcomputer.com/news/security/fbi-links-largest-crypto-hack-ever-to-north-korean-hackers/
https://blog.netlab.360.com/dacls-the-dual-platform-rat-en/
https://www.bankinfosecurity.com/south-korea-sanctions-pyongyang-hackers-a-21193
http://www.mcafee.com/us/resources/white-papers/wp-dissecting-operation-troy.pdf
https://www.comae.com/posts/pandorabox-north-koreans-target-security-researchers/
https://jsac.jpcert.or.jp/archive/2024/pdf/JSAC2024_1_6_dongwook-kim_seulgi-lee_en.pdf
https://www.youtube.com/watch?v=zGvQPtejX9w
https://github.com/dodo-sec/Malware-Analysis/blob/main/SmoothOperator/SmoothOperator.md
https://twitter.com/X__Junior/status/1743193763000828066
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=5b9850b9-0fdd-48a9-b595-9234207ae7df&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/
https://lifars.com/wp-content/uploads/2021/09/Lazarus.pdf
https://asec.ahnlab.com/ko/40495/