lazarusholic

Everyday is lazarus.dayβ

Lazarus Group

2020-11-23, Rapid7
https://docs.rapid7.com/insightidr/lazarus-group/
#Unit121 #Bureau121

Contents

Lazarus Group
Lazarus Group is a threat group that has been attributed to the North Korean government. The group has been active since at least 2009, and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of the campaign Operation Blockbuster, which was named by Novetta.
Malware used by Lazarus Group has correlated to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. In late 2017, Lazarus Group used the disk-wiping tool KillDisk in an attack against an online casino based in Central America.
North Korean group definitions have significant overlap, and the name Lazarus Group encompasses a broad range of activity. Some organizations use Lazarus Group to refer to any activity attributed to North Korea. Some organizations track North Korean clusters or groups, such as Bluenoroff, APT37, and APT38 separately, while other organizations track some activity associated with …