Lazarus Arisen: Architecture, Tools, Attribution

{{ }}
  • {{ $value }}

We are processing
your download

Loading Spin Wheel

Due to continued media attention and alleged connections to North Korea, Lazarus has become a well‑known hacking group. Among their targets have been financial institutions worldwide.

Group-IB Threat Intelligence team has been the first to identify new non-malware evidence of North Korean involvement in recent attacks, revealing their chain of anonymized nodes and C&C infrastructure.

Inside the report:
-indicators of compromise to check if your organisation was, or is, under attack by Lazarus
-detailed description of infrastructure used by Lazarus to cover up tracks leading to North Korea
-in-depth analysis of tools that allowed attackers to stay unnoticed in the corporate infrastructure
-Tactics, Technics, Procedures (TTPs) and recommendations on how to prevent infection