Key Takeaways
- The Lazarus Group orchestrated the Sony Pictures Entertainment hack in November 2014, leaking over 100 terabytes of data including unreleased films and executive emails.
- Lazarus conducted Operation Troy DDoS attacks against South Korean targets starting in 2011.
- In 2013, Lazarus executed the DarkSeoul attacks destroying 32,000 hard drives at South Korean banks and media companies.
- The Sony hack resulted in $100 million in damages and lost revenue for Sony Pictures.
- WannaCry caused global economic losses estimated at $4 billion to $8 billion.
- Bangladesh Bank heist netted Lazarus $81 million successfully transferred.
- Lazarus Group primarily targets financial institutions, governments, and crypto platforms worldwide.
- South Korea has been hit by over 20 Lazarus campaigns since 2011.
- US entities, including Sony and crypto firms, comprise 15% of known Lazarus victims.
- Lazarus deploys WannaCry ransomware using ETERNALBLUE exploit (CVE-2017-0144).
- Group uses custom malware families like DESTOVER wiper in DarkSeoul.
- SWIFT-compromising malware used in Bangladesh heist called evtdiag.exe.
- US Government attributes Lazarus to Reconnaissance General Bureau since 2017.
- FireEye's 2016 report first publicly linked Lazarus to North Korea.
- MITRE ATT&CK profiles Lazarus as G0032 with 50+ techniques.
Lazarus Group orchestrated major financial, crypto, global attacks, thefts, damages.
Attacks and Incidents
Attacks and Incidents Interpretation
Attribution and Analysis
Attribution and Analysis Interpretation
Financial Losses
Financial Losses Interpretation
Malware and Tools
Malware and Tools Interpretation
Victims and Targets
Victims and Targets Interpretation
Sources & References
- Reference 1ENen.wikipedia.orgVisit source
- Reference 2FIREEYEfireeye.comVisit source
- Reference 3REUTERSreuters.comVisit source
- Reference 4BBCbbc.comVisit source
- Reference 5UNIT42unit42.paloaltonetworks.comVisit source
- Reference 6CHAINALYSISchainalysis.comVisit source
- Reference 7MICROSOFTmicrosoft.comVisit source
- Reference 8THEHACKERNEWSthehackernews.comVisit source
- Reference 9CROWDSTRIKEcrowdstrike.comVisit source
- Reference 10BLOOMBERGbloomberg.comVisit source
- Reference 11NYTIMESnytimes.comVisit source
- Reference 12CNNcnn.comVisit source
- Reference 13COINTELEGRAPHcointelegraph.comVisit source
- Reference 14THERECORDtherecord.mediaVisit source
- Reference 15COINDESKcoindesk.comVisit source
- Reference 16SCWORLDscworld.comVisit source
- Reference 17THEREGISTERtheregister.co.ukVisit source
- Reference 18WIREDwired.comVisit source
- Reference 19FBIfbi.govVisit source
- Reference 20HOLLYWOODREPORTERhollywoodreporter.comVisit source
- Reference 21ECONOMICTIMESeconomictimes.indiatimes.comVisit source
- Reference 22CCNccn.comVisit source
- Reference 23ATTACKattack.mitre.orgVisit source
- Reference 24CSIScsis.orgVisit source
- Reference 25SWIFTswift.comVisit source
- Reference 26SECURITYAFFAIRSsecurityaffairs.coVisit source
- Reference 27BLOGblog.axieinfinity.comVisit source
- Reference 28HARMONYharmony.oneVisit source
- Reference 29ATOMICWALLETatomicwallet.ioVisit source
- Reference 30COINScoins.paidVisit source
- Reference 31SPECTRUMspectrum.ieee.orgVisit source
- Reference 32NDTVndtv.comVisit source
- Reference 33THEGUARDIANtheguardian.comVisit source
- Reference 34CNBCcnbc.comVisit source
- Reference 35ELLIPTICelliptic.coVisit source
- Reference 36SKYMAVISskymavis.comVisit source
- Reference 37BENTHAMSROUSEbenthamsrouse.comVisit source
- Reference 38SECURELISTsecurelist.comVisit source
- Reference 39RESEARCHCENTERresearchcenter.paloaltonetworks.comVisit source
- Reference 40ZDNETzdnet.comVisit source
- Reference 41ESETeset.comVisit source
- Reference 42SLOWMISTslowmist.ioVisit source
- Reference 43BANKINFOSECURITYbankinfosecurity.comVisit source
- Reference 44JUSTICEjustice.govVisit source
- Reference 45GOgo.chainalysis.comVisit source
- Reference 46UNun.orgVisit source
- Reference 47MANDIANTmandiant.comVisit source
- Reference 48SYMANTEC-ENTERPRISE-BLOGSsymantec-enterprise-blogs.security.comVisit source
- Reference 49RECORDEDFUTURErecordedfuture.comVisit source
- Reference 50THESHADOWBROKERStheshadowbrokers.comVisit source
- Reference 51NCSCncsc.gov.ukVisit source
- Reference 52HOMEhome.treasury.govVisit source
- Reference 53WELIVESECURITYwelivesecurity.comVisit source
- Reference 54CLOUDcloud.google.comVisit source
- Reference 55IC3ic3.govVisit source
- Reference 56BLOGblog.talosintelligence.comVisit source
- Reference 57US-CERTus-cert.govVisit source
- Reference 58CISAcisa.govVisit source
- Reference 59INTERPOLinterpol.intVisit source
- Reference 60BLACKBERRYblackberry.comVisit source
- Reference 61BLOGblog.coins.phVisit source






