Lazarus Arisen: Architecture, Tools and Attribution
← Research Hub

Lazarus Arisen: Architecture, Tools and Attribution

The only in-depth report outlining multiple layers of Lazarus infrastructure, thorough analysis of hacker’s tools and evidence leading to North Korean IP addresses

Inside the report:

Indicators of compromise to check if your organisation was, or is, under attack by LazarusIndicators of compromise to check if your organisation was, or is, under attack by Lazarus

Detailed description of infrastructure used by Lazarus to cover up tracks leading to North KoreaDetailed description of infrastructure used by Lazarus to cover up tracks leading to North Korea

In-depth analysis of tools that allowed attackers to stay unnoticed in the corporate infrastructureIn-depth analysis of tools that allowed attackers to stay unnoticed in the corporate infrastructure

Tactics, Techniques, Procedures (TTPs) and recommendations on how to prevent infectionTactics, Techniques, Procedures (TTPs) and recommendations on how to prevent infection

Due to continued media attention and alleged connections to North Korea, Lazarus has become a well‑known hacking group. However, existing attribution based primarily on malware code similarities is not always reliable.

Group-IB identified new non-malware evidence of North Korean involvement in recent attacks, revealing their chain of anonymized nodes and C&C infrastructure — allowing better understanding of their goals and motivation. This report contains an in-depth review of North Korean cyber division tools and tactics as well as recommendations on how to track their involvement in recent attacks on financial institutions and other critical infrastructure.

Dmitry Volkov
Dmitry Volkov
Chief Executive Officer

Advanced protection against cyber threats

Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence and deep analysis of attacks and incident response.