Threat Actor Profile

Andariel (Jumpy Pisces)

Andariel, also known as "Jumpy Pisces," is a North Korean-linked cyber espionage and ransomware group believed to have emerged around 2015. Affiliated with the infamous Lazarus Group, Andariel is known for targeting financial institutions, government entities, and enterprises through advanced ransomware campaigns and sophisticated phishing schemes. Their operations often aim to fund North Korea's regime or gather intelligence.


Threat Actor Profile

Andariel (Jumpy Pisces)

Country of Origin

Andariel is identified as a North Korean threat actor. The group's activities and affiliations with other North Korean entities confirm its connection to the country’s cyber warfare initiatives.

Members

The exact number and structure of Andariel members are unknown. However, their ties to other Lazarus Group operations indicate they are part of an organized and skillful team with expertise in ransomware and cyber espionage.

Leadership

Details regarding Andariel's leadership remain elusive. No specific names or aliases have been publicly disclosed, but their affiliation with North Korea suggests organizational oversight by its cyber units known for sophisticated operations.

Andariel (Jumpy Pisces) TTPs

Tactics

Andariel’s primary goals include financial gain and intelligence gathering. They often target industries such as finance, defense, energy, and government to disrupt operations or steal sensitive data.


Techniques

The group is notorious for deploying spear phishing emails to gain initial access, using social engineering and malicious attachments. They also leverage malware like Andariel backdoors and ransomware strains to maintain persistence and exfiltrate data.


Procedures

Andariel’s specific methods include developing and deploying custom ransomware, exploiting unpatched vulnerabilities, executing lateral movements across targeted networks, and concealing activities using advanced evasion techniques.

Want to Shut Down Threats Before They Start?

Notable Cyberattacks

2021 "Maui" ransomware campaign

Targeted healthcare providers, disrupting operations and demanding Bitcoin payments.

Persistent targeting of South Korean companies

Caused significant operational and financial damage through various campaigns.

Law Enforcement & Arrests

No arrests or enforcement actions specific to Andariel have been publicized to date. However, global law enforcement continues collaborating to disrupt North Korean cyber operations, targeting associated infrastructure and financial channels.


How to Defend Against Andariel

1

Implement Multi-Factor Authentication (MFA): Prevent unauthorized credential use

2

Patch Management: Regularly update software to mitigate zero-day vulnerabilities

3

Endpoint Detection and Response (EDR): Leverage tools to identify malware signatures and anomalous network behavior

4

Segmentation Standards: Limit access between critical systems to contain any lateral movement

5

User Awareness Campaigns: Train employees to recognize phishing attempts and follow cybersecurity best practices

6

Segmentation Standards: Limit access between critical systems to contain any lateral movement

Huntress solutions help protect organizations by monitoring endpoints, detecting intrusions, and mitigating Andariel threats with enterprise-grade technology.


Detect, Respond, Protect

See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.

Try Huntress for Free