Key Takeaways
- The Lazarus Group orchestrated the Sony Pictures Entertainment hack in November 2014, leaking over 100 terabytes of data including unreleased films and executive emails.
- Lazarus conducted Operation Troy DDoS attacks against South Korean targets starting in 2011.
- In 2013, Lazarus executed the DarkSeoul attacks destroying 32,000 hard drives at South Korean banks and media companies.
- The Sony hack resulted in $100 million in damages and lost revenue for Sony Pictures.
- WannaCry caused global economic losses estimated at $4 billion to $8 billion.
- Bangladesh Bank heist netted Lazarus $81 million successfully transferred.
- Lazarus Group primarily targets financial institutions, governments, and crypto platforms worldwide.
- South Korea has been hit by over 20 Lazarus campaigns since 2011.
- US entities, including Sony and crypto firms, comprise 15% of known Lazarus victims.
- Lazarus deploys WannaCry ransomware using ETERNALBLUE exploit (CVE-2017-0144).
- Group uses custom malware families like DESTOVER wiper in DarkSeoul.
- SWIFT-compromising malware used in Bangladesh heist called evtdiag.exe.
- US Government attributes Lazarus to Reconnaissance General Bureau since 2017.
- FireEye's 2016 report first publicly linked Lazarus to North Korea.
- MITRE ATT&CK profiles Lazarus as G0032 with 50+ techniques.
Lazarus Group orchestrated major financial, crypto, global attacks, thefts, damages.
Attacks and Incidents
- The Lazarus Group orchestrated the Sony Pictures Entertainment hack in November 2014, leaking over 100 terabytes of data including unreleased films and executive emails.
- Lazarus conducted Operation Troy DDoS attacks against South Korean targets starting in 2011.
- In 2013, Lazarus executed the DarkSeoul attacks destroying 32,000 hard drives at South Korean banks and media companies.
- The WannaCry ransomware attack attributed to Lazarus infected over 200,000 computers in 150 countries in May 2017.
- Lazarus hackers stole $81 million from Bangladesh Central Bank via SWIFT network in February 2016.
- Operation Blockbuster by FireEye linked Lazarus to 11 malware families used in attacks from 2006 to 2016.
- Lazarus targeted Vietnam Airlines in 2016, stealing 400,000 payment card details.
- In 2017, Lazarus hit a Polish bank, attempting to steal $1 million via malware.
- Lazarus conducted cryptocurrency theft from Youbit exchange in South Korea in December 2017, stealing 17% of funds.
- The group launched the FASTCash campaign targeting ATM networks in 2017.
- Lazarus stole $625 million from Ronin Network (Axie Infinity) in March 2022.
- In June 2022, Lazarus compromised Harmony Horizon Bridge for $100 million in crypto.
- Operation Dream Job saw Lazarus phishing LinkedIn users for crypto jobs in 2022.
- Lazarus targeted Atomic Wallet users in June 2023, stealing $100 million.
- The group hit CoinsPaid in July 2023 for $37.3 million.
- Lazarus stole $41 million from Alphapo in July 2023.
- TraderTraitor campaign by Lazarus stole $152 million from crypto traders in 2023.
- In 2014, Lazarus wiped data from South Korean nuclear plant systems.
- Lazarus used spear-phishing in the 2016 DNC hack precursor activities.
- The group conducted attacks on cryptocurrency exchanges in 2018, stealing from Bithumb.
- Lazarus linked to 2020 KuCoin hack of $280 million.
- In 2021, Lazarus stole from Poly Network $611 million (mostly returned).
- Operation AppleJeus involved macOS malware for crypto theft starting 2018.
- Lazarus hit Indian banks in 2017 as part of BlueNoroff campaign.
- Lazarus Group formed around 2009, active in 70+ countries.
- Bluenoroff subgroup focused on financial theft since 2015.
- Andariel subgroup targets South Korean defense since 2021.
- 2023 CoinsPaid attack used social engineering on helpdesk.
Attacks and Incidents Interpretation
Attribution and Analysis
- US Government attributes Lazarus to Reconnaissance General Bureau since 2017.
- FireEye's 2016 report first publicly linked Lazarus to North Korea.
- MITRE ATT&CK profiles Lazarus as G0032 with 50+ techniques.
- CrowdStrike names Lazarus as top threat actor in 2023 reports.
- Chainalysis tracks $600M+ Lazarus crypto thefts since 2022.
- UN Panel of Experts links Lazarus to 50% of DPRK cyber revenue.
- FBI indicted Park Jin Hyok in 2018 for Sony and WannaCry.
- Microsoft Threat Intelligence tracks 9 Lazarus clusters.
- Mandiant attributes Bluenoroff subgroup to financial ops.
- Operation Blockbuster by FireEye dismantled Lazarus infrastructure.
- Symantec confirms Lazarus use of HermitSpy in Middle East.
- Recorded Future links Lazarus to 170+ domains in 2023.
- NSA leaked tools like ETERNALBLUE tied to Lazarus exploits.
- UK NCSC attributes WannaCry directly to Lazarus.
- Over 80 sanctions by US Treasury on Lazarus members and entities.
- ESET discovers BluStealer linked to Lazarus in 2023.
- Google TAG observes Lazarus targeting aerospace/defense.
- FBI warns of 300% rise in Lazarus crypto activity in 2023.
- Kaspersky attributes Operation In(ter)ception to Lazarus.
- Cisco Talos tracks MagicRAT updates by Lazarus.
- DHS/FBI joint advisory on FASTCash in 2018.
- SWIFT's customer security programme triggered by Lazarus attacks.
- CISA adds Lazarus indicators to known exploited catalog.
- Interpol issues red notices for 11 Lazarus members.
Attribution and Analysis Interpretation
Financial Losses
- The Sony hack resulted in $100 million in damages and lost revenue for Sony Pictures.
- WannaCry caused global economic losses estimated at $4 billion to $8 billion.
- Bangladesh Bank heist netted Lazarus $81 million successfully transferred.
- Ronin Network hack led to $625 million stolen in Ethereum and USDC.
- Harmony Horizon Bridge theft amounted to $100 million in multiple tokens.
- Atomic Wallet hack attributed to Lazarus resulted in $100 million losses.
- CoinsPaid ransomware attack by Lazarus stole $37.3 million in Bitcoin.
- Alphapo (Safe) wallet losses from Lazarus reached $41 million in July 2023.
- Youbit exchange lost 17% of its assets, approximately $6 million, to Lazarus.
- Bithumb hack in 2018 linked to Lazarus caused $31 million in losses.
- KuCoin 2020 hack stole $280 million, with Lazarus laundering portions.
- Poly Network exploit of $611 million, Lazarus suspected in orchestration.
- Vietnam Airlines lost revenue from stolen 400,000 cards, estimated $10 million impact.
- Polish bank attack attempted $1 million theft, causing operational downtime costs.
- DarkSeoul attacks cost South Korean banks millions in recovery.
- Overall, Lazarus crypto thefts from July 2023 to July 2024 exceeded $200 million.
- FASTCash campaign enabled $1 million+ ATM cashouts across multiple countries.
- Operation Blockbuster linked Lazarus to attacks costing victims hundreds of millions.
- North Korean hackers, including Lazarus, stole $3 billion in crypto since 2017.
- TraderTraitor stole $152 million from individual traders using fake apps.
- Sony Pictures incurred $35 million in IT recovery costs alone.
- WannaCry hit UK's NHS for £92 million in losses.
- Lazarus-linked attacks on Indian banks prevented larger losses but cost millions in defenses.
- Bithumb hack led to $18 million immediate loss after 35% token drop.
Financial Losses Interpretation
Malware and Tools
- Lazarus deploys WannaCry ransomware using ETERNALBLUE exploit (CVE-2017-0144).
- Group uses custom malware families like DESTOVER wiper in DarkSeoul.
- SWIFT-compromising malware used in Bangladesh heist called evtdiag.exe.
- Operation Blockbuster revealed 11 Lazarus malware families including SHIPSHAPE RAT.
- AppleJeus macOS malware masquerades as crypto trading apps.
- FASTCash malware targets ATM SWIFT POS systems for cashouts.
- TraderTraitor uses Android malware like DeFiWalletFake for keylogging.
- WannaCry exploits SMBv1 vulnerability with DOUBLEPULSAR backdoor.
- Group employs spear-phishing with malicious Office docs exploiting CVE-2017-0199.
- Custom RATs like LIGHTLESSSKY used in crypto exchange intrusions.
- Operation Dream Job uses LinkedIn lures with Google Drive-hosted malware.
- Lazarus uses Manuscrypt backdoor in multiple campaigns.
- Tools include Mimikatz for credential dumping post-exploitation.
- Cobalt Strike beacons repurposed for C2 in recent ops.
- BrowserGood extension malware steals crypto wallet data.
- LazariKey ransomware deployed against non-crypto targets.
- Group leverages Tor for C2 and laundering via mixers.
- Custom loaders like Rc4Aes dropper used in Atomic Wallet.
- PowerShell-based loaders for initial access in banking ops.
- Wiper malware variants evolve from Shamoon influences.
- Nestead agent for persistence in Linux environments.
Malware and Tools Interpretation
Victims and Targets
- Lazarus Group primarily targets financial institutions, governments, and crypto platforms worldwide.
- South Korea has been hit by over 20 Lazarus campaigns since 2011.
- US entities, including Sony and crypto firms, comprise 15% of known Lazarus victims.
- Bangladesh Central Bank was a key victim in SWIFT hacks affecting 5 banks total.
- Vietnam Airlines and other Asian carriers targeted for payment data.
- Ronin Network, supporting Axie Infinity game with 2.5 million users, was breached.
- Harmony blockchain's Horizon Bridge served DeFi users across 10+ chains.
- Atomic Wallet had 2 million+ users affected by the malware campaign.
- CoinsPaid, servicing 500k+ users, lost funds from hot wallets.
- 35+ cryptocurrency exchanges targeted by Lazarus since 2016.
- South Korean government and military networks attacked in DarkSeoul.
- Democratic National Committee servers probed by Lazarus actors.
- Polish financial regulator and banks targeted in 2017.
- Indian banks like Cosmos received malware implants.
- NHS England hospitals disrupted, affecting 80 trusts.
- Global manufacturing like FedEx and Telefónica hit by WannaCry.
- Crypto platforms like ByBit and Stake.com investigated as Lazarus targets.
- Over 10 Middle Eastern banks probed in FASTCash operations.
- Gaming firms like Sky Mavis (Axie) represent emerging DeFi targets.
- Youbit and Bithumb represent 2 of 5 major South Korean exchange victims.
Victims and Targets Interpretation
Sources & References
- Reference 1ENen.wikipedia.orgVisit source
- Reference 2FIREEYEfireeye.comVisit source
- Reference 3REUTERSreuters.comVisit source
- Reference 4BBCbbc.comVisit source
- Reference 5UNIT42unit42.paloaltonetworks.comVisit source
- Reference 6CHAINALYSISchainalysis.comVisit source
- Reference 7MICROSOFTmicrosoft.comVisit source
- Reference 8THEHACKERNEWSthehackernews.comVisit source
- Reference 9CROWDSTRIKEcrowdstrike.comVisit source
- Reference 10BLOOMBERGbloomberg.comVisit source
- Reference 11NYTIMESnytimes.comVisit source
- Reference 12CNNcnn.comVisit source
- Reference 13COINTELEGRAPHcointelegraph.comVisit source
- Reference 14THERECORDtherecord.mediaVisit source
- Reference 15COINDESKcoindesk.comVisit source
- Reference 16SCWORLDscworld.comVisit source
- Reference 17THEREGISTERtheregister.co.ukVisit source
- Reference 18WIREDwired.comVisit source
- Reference 19FBIfbi.govVisit source
- Reference 20HOLLYWOODREPORTERhollywoodreporter.comVisit source
- Reference 21ECONOMICTIMESeconomictimes.indiatimes.comVisit source
- Reference 22CCNccn.comVisit source
- Reference 23ATTACKattack.mitre.orgVisit source
- Reference 24CSIScsis.orgVisit source
- Reference 25SWIFTswift.comVisit source
- Reference 26SECURITYAFFAIRSsecurityaffairs.coVisit source
- Reference 27BLOGblog.axieinfinity.comVisit source
- Reference 28HARMONYharmony.oneVisit source
- Reference 29ATOMICWALLETatomicwallet.ioVisit source
- Reference 30COINScoins.paidVisit source
- Reference 31SPECTRUMspectrum.ieee.orgVisit source
- Reference 32NDTVndtv.comVisit source
- Reference 33THEGUARDIANtheguardian.comVisit source
- Reference 34CNBCcnbc.comVisit source
- Reference 35ELLIPTICelliptic.coVisit source
- Reference 36SKYMAVISskymavis.comVisit source
- Reference 37BENTHAMSROUSEbenthamsrouse.comVisit source
- Reference 38SECURELISTsecurelist.comVisit source
- Reference 39RESEARCHCENTERresearchcenter.paloaltonetworks.comVisit source
- Reference 40ZDNETzdnet.comVisit source
- Reference 41ESETeset.comVisit source
- Reference 42SLOWMISTslowmist.ioVisit source
- Reference 43BANKINFOSECURITYbankinfosecurity.comVisit source
- Reference 44JUSTICEjustice.govVisit source
- Reference 45GOgo.chainalysis.comVisit source
- Reference 46UNun.orgVisit source
- Reference 47MANDIANTmandiant.comVisit source
- Reference 48SYMANTEC-ENTERPRISE-BLOGSsymantec-enterprise-blogs.security.comVisit source
- Reference 49RECORDEDFUTURErecordedfuture.comVisit source
- Reference 50THESHADOWBROKERStheshadowbrokers.comVisit source
- Reference 51NCSCncsc.gov.ukVisit source
- Reference 52HOMEhome.treasury.govVisit source
- Reference 53WELIVESECURITYwelivesecurity.comVisit source
- Reference 54CLOUDcloud.google.comVisit source
- Reference 55IC3ic3.govVisit source
- Reference 56BLOGblog.talosintelligence.comVisit source
- Reference 57US-CERTus-cert.govVisit source
- Reference 58CISAcisa.govVisit source
- Reference 59INTERPOLinterpol.intVisit source
- Reference 60BLACKBERRYblackberry.comVisit source
- Reference 61BLOGblog.coins.phVisit source






