Threat Actor Profile
Lazarus Group (ATP38)
The Lazarus Group, also referred to as APT38, HIDDEN COBRA, and Guardians of Peace, is a North Korean state-sponsored cybercriminal organization. Operating since at least 2009, Lazarus specializes in a range of malicious activities including financial theft, cyber espionage, and destructive cyberattacks. They have targeted industries such as finance, government, and critical infrastructure, utilizing sophisticated tactics and custom malware.
Threat Actor Profile
Lazarus Group (ATP38)
Country of Origin
Members
Leadership
Lazarus Group TTPs
Tactics
Financial theft and fund transfer manipulation, such as SWIFT attacks.
Espionage campaigns for collecting confidential data.
Disruption through ransomware and wiper malware.
Techniques
Initial Access: Spear-phishing emails and watering hole attacks.
Execution: Use of PowerShell scripts and malicious macros in documents.
Persistence: Scheduled tasks, registry run keys, or custom malware implants.
Privilege Escalation: Exploitation of software vulnerabilities.
Defense Evasion: Fileless malware and disguise as legitimate software.
Credential Access: Keylogging and credential dumping via Mimikatz.
Discovery: Network and system enumeration using tools like Nmap.
Lateral Movement: Pass-the-hash and PsExec for network traversal.
Collection: Data staging and exfiltration tools like RAR archives.
C2 (Command & Control): Use of compromised servers and encrypted channels.
Exfiltration: HTTP/HTTPS protocols for data theft.
Procedures
Lazarus continuously develops custom tools and evolves methods. Key malware includes:
WannaCry ransomware.
AppleJeus cryptocurrency malware.
RATANKBA (remote access tools)
Want to Shut Down Threats Before They Start?
Notable Cyberattacks
Law Enforcement & Arrests
The U.S. Department of Justice indicted Park Jin Hyok in 2018 for his alleged role in Lazarus operations. Sanctions have been imposed on North Korean entities accused of supporting cyber campaigns, which include Lazarus (source).
How to Defend Against Lazarus Group
Endpoint Detection and Response (EDR): Solutions like Huntress can detect threats at multiple stages of an attack, preventing compromise from escalating.
Network Segmentation: Restrict lateral movement by isolating sensitive systems.
Threat Intelligence Monitoring: Track Lazarus-specific IOCs to block malicious infrastructure.
User Awareness Training: Reduce phishing susceptibility through training initiatives.
Secure Configurations: Harden systems by patching known vulnerabilities and disabling unnecessary services.
Huntress solutions help protect organizations by monitoring endpoints, detecting intrusions, and mitigating threats like Lazarus Group with enterprise-grade technology.
References
Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.