Also known as: Hidden Cobra, ZINC, Diamond Sleet, Labyrinth Chollima, APT38, Bluenoroff, Andariel, Guardians of Peace, Whois Team, TraderTraitor, Pompilus, Onyx Sleet, Stonefly, Selective Pisces, Alluring Pisces, Gleaming Pisces, Slow Pisces, Sparkling Pisces, Jumpy Pisces
T1566.003
T1195.002
T1059.006
T1059.007
T1204.002
T1565.001
T1071.001
T1553.002
T1195.001
T1071.004
T1583.003
T1608.005
T1213.003
T1134.004
T1574.002
T1588.002
T1587.001
T1203
T1588.001
T1583.001
T1057
T1070.004
T1112
T1012
T1016
T1049
T1033
Obfuscated Files or Information
Encrypt, encode, or obfuscate payloads and data to evade detection.
Masquerading
Disguise malicious artifacts by manipulating names or locations to appear legitimate.
Process Injection
Inject code into running processes to evade defenses and elevate privileges.
Trojanized cryptocurrency trading applications distributed as legitimate software. Targets Windows and macOS to steal cryptocurrency wallet credentials and keys.
Primary RAT using dual-proxy communication with RC4 encryption. Provides full remote access including file management, process manipulation, and system information gathering.
Sophisticated RAT with proxy-aware C2 communication. Used in defense contractor targeting campaigns with capabilities for screen capture, file transfer, and process manipulation.
Advanced backdoor used in defense industry espionage campaigns. Capable of pivoting between IT and restricted OT networks within compromised organizations.
Modular spyware used for keylogging, browser history theft, and collecting running processes. Evolved from DarkSeoul tools used in attacks against South Korea.
Highly customizable backdoor family used across multiple Lazarus campaigns. Supports extensive plugins for reconnaissance, exfiltration, and lateral movement.
Cross-platform malware framework (Windows, Linux, macOS) with modular plugin architecture. Supports file manipulation, proxying, and loading additional modules from C2.
Used extensively for post-exploitation in financial sector attacks. Beacons deployed via spear-phishing or trojanized apps for lateral movement and data exfiltration.
Deployed for credential harvesting from Windows systems. Used to obtain NTLM hashes and Kerberos tickets for lateral movement within financial institution networks.
Used for fileless malware execution, downloading secondary payloads, and living-off-the-land reconnaissance in compromised enterprise environments.
Self-propagating ransomware worm that exploited EternalBlue (MS17-010). Infected 300,000+ computers across 150 countries in 2017, causing billions in damages.
Custom malware deployed on banking switch application servers to intercept and approve fraudulent ATM withdrawal requests. Used in ATM jackpotting campaigns across Asia and Africa.
Custom tunneling tool that creates encrypted channels between compromised networks and C2 infrastructure, allowing data exfiltration through proxied connections.
Supply chain attacks via malicious packages on npm and PyPI registries targeting cryptocurrency developers. Packages contain hidden backdoors activated on install.
Elaborate fake recruiter personas on LinkedIn to target cryptocurrency and defense sector employees. Delivers trojanized coding challenges or job-related documents.
Trojanized versions of legitimate PyPI packages targeting Python developers. Used as part of supply chain attacks against cryptocurrency companies.
Remote access tool used by Andariel subgroup for data exfiltration
Trojanized cryptocurrency wallet application targeting blockchain users
Malware specifically designed to compromise cryptocurrency trading platforms
Remote access backdoor with extensive data collection capabilities
Backdoor with command execution and data exfiltration functionality
| Type | Value |
|---|---|
| domain | celasllc[.]com |
| domain | unioncrypto[.]vip |
| ip | 185[.]29[.]8[.]18 |
| ip | 45[.]33[.]2[.]79 |
| hash | 5d9e5c7d05c3a2e2e0e7c2de42a7c4e7 |
| domain | codepool[.]cloud |
| domain | aurevian[.]cloud |
| domain | amazonfiso[.]com |
| domain | human-check[.]com |
| domain | zoom-tech[.]us |
| domain | zoom[.]webus02[.]us |
| ip | 23[.]27[.]140[.]49 |
| ip | 23[.]27[.]140[.]135 |
| hash | 2360a69e5fd7217e977123c81d3dbb60bf4763a9dae6949bc1900234f7762df1 |
| hash | 689cfaa9319f3f7529a31472ecf6b2e0ca6891b736de009e0b6c2ebac958cc94 |
| Domain / Host | Status |
|---|---|
pypistorage[.]com | offline |
keondigital[.]com | active |
arcashop[.]org | whois_changed |
jdkgradle[.]com | offline |
latamics[.]org | offline |
lmaxtrd[.]com | offline |
paxosfuture[.]com | offline |
ftxstock[.]com | offline |
nansenpro[.]org | offline |
azureglobalaccelerator[.]com | active |
azuredeploypackages[.]net | active |
defitankwar[.]com | offline |
defitankzone[.]com | offline |
23[.]227[.]202[.]244 | offline |
codepool[.]cloud | active |
aurevian[.]cloud | whois_changed |
amazonfiso[.]com | whois_changed |
human-check[.]com | offline |
zoom-tech[.]us | offline |
zoom[.]webus02[.]us | offline |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
MITRE ATT&CK - Lazarus Group
https://attack.mitre.org/groups/G0032/
CISA - North Korean Malicious Cyber Activity
https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/north-korea
FBI - TraderTraitor: North Korean State-Sponsored APT Targets Blockchain
https://www.ic3.gov/Media/News/2022/220418.pdf
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
https://thehackernews.com/2026/02/lazarus-group-uses-medusa-ransomware-in.html
Lazarus Group Bitrefill Cyberattack
https://cyble.com/blog/lazarus-group-bitrefill-cyberattack/
FBI Confirms North Korean Lazarus Group Behind $1.5 Billion Bybit Crypto Heist
https://www.picussecurity.com/resource/blog/fbi-north-korean-lazarus-group-bybit-crypto-heist
Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE
https://thehackernews.com/2025/09/lazarus-group-expands-malware-arsenal.html
North Korean Lazarus group targets the drone sector in Europe
https://www.globenewswire.com/news-release/2025/10/23/3171642/0/en/North-Korean-Lazarus-group-targets-the-drone-sector-in-Europe-likely-for-espionage-ESET-Research-discovers.html
Lazarus targets nuclear-related organization with new malware
https://securelist.com/lazarus-new-malware/115059/
BlueNoroff reemerges with new campaigns for crypto theft and espionage
https://www.csoonline.com/article/4081001/bluenoroff-reemerges-with-new-campaigns-for-crypto-theft-and-espionage.html
Zoom & doom: BlueNoroff call opens the door
https://fieldeffect.com/blog/zoom-doom-bluenoroff-call-opens-the-door
Bybit Confirms Record-Breaking $1.5 Billion Crypto Heist
https://thehackernews.com/2025/02/bybit-confirms-record-breaking-146.html
CISA Alert (AA20-239A) - FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-239a
FBI Flash: Lazarus Group Targeting Cryptocurrency
https://www.ic3.gov/Media/News/2020/200916.pdf
Kaspersky: The BlueNoroff cryptocurrency hunt is still on
https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/
Mandiant: APT38: Un-usual Suspects
https://www.mandiant.com/resources/apt38-un-usual-suspects