Lazarus Group
MISPNation-state
KP
Unknown
[Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group attributed to the Reconnaissance General Bureau (RGB). (Citation: US-CERT HIDDEN COBRA June 2017) (Citation: Treasury North Korean Cyber Groups September 2019) [Lazarus Group](https://attack.mitre.org/groups/G0032) has been active since at least 2009 and is reportedly responsible for the November 2014 destructive wiper attack on Sony Pictures Entertainment, identified by Novetta as part of Operation Blockbuster. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain.(Citation: Novetta Blockbuster)
North Korea’s cyber operations have shown a consistent pattern of adaptation, forming and reorganizing units as national priorities shift. These units frequently share personnel, infrastructure, malware, and tradecraft, making it difficult to attribute specific operations with high confidence. Public reporting often uses “Lazarus Group” as an umbrella term for multiple North Korean cyber operators conducting espionage, destructive attacks, and financially motivated campaigns.(Citation: Mandiant DPRK Laz Org Breakdown 2022)(Citation: Mandiant DPRK Groups 2023)(Citation: JPCert Blog Laz Subgroups 2025)
Tecniche Utilizzate (93)
| ID | ATT&CK | Tattiche |
|---|---|---|
| T1001.003 | Protocol or Service Impersonation | - |
| T1005 | Data from Local System | - |
| T1008 | Fallback Channels | - |
| T1010 | Application Window Discovery | - |
| T1012 | Query Registry | - |
| T1016 | System Network Configuration Discovery | - |
| T1021.001 | Remote Desktop Protocol | - |
| T1021.002 | SMB/Windows Admin Shares | - |
| T1021.004 | SSH | - |
| T1027.007 | Dynamic API Resolution | - |
| T1027.009 | Embedded Payloads | - |
| T1027.013 | Encrypted/Encoded File | - |
| T1033 | System Owner/User Discovery | - |
| T1036.003 | Rename Legitimate Utilities | - |
| T1036.004 | Masquerade Task or Service | - |
Riferimenti (10)
- threatpost.com - 116422
- us-cert.gov - TA17 164A
- us-cert.gov - TA17 318A
- us-cert.gov - TA17 318B
- securelist.com - 87553
- securelist.com - 77908
- us-cert.gov - HIDDEN COBRA North Korean Malicious Cyber Activity
- mcafee.com - Wp Dissecting Operation Troy.pdf
- bleepingcomputer.com - North Korean Hackers Are Up To No Good Again
- cfr.org - Lazarus Group
Alias (4780)
Malware Utilizzato (26)
Metadata
| ID: | 67 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 04:00 |