Once considered a singular entity, Lazarus has evolved into a network of specialized subgroups with overlapping tactics, techniques, and procedures (TTPs), complicating efforts to classify and counter their activities.
Initially, “Lazarus” referred to a single APT group or a small set of coordinated actors.
However, as the scale of their operations expanded, the group fragmented into multiple subunits, each with distinct objectives and operational structures.
Today, Lazarus encompasses various subgroups such as Diamond Sleet, Citrine Sleet, Moonstone Sleet, and others.
This proliferation has led to inconsistent naming conventions across security vendors, further complicating attribution efforts.
Subgroups are often identified by their specific campaigns or malware usage.
For instance, campaigns like Operation Dreamjob and AppleJeus target cryptocurrency businesses, while others focus on ransomware attacks or corporate espionage.
The overlapping TTPs among these subgroups blur the lines between individual entities, making accurate attribution increasingly challenging.
One of the most significant hurdles in attributing Lazarus activities is the overlap in their methods.
Multiple subgroups share similar initial attack vectors, command-and-control (C2) infrastructure, and malware components.
For example, several Lazarus-affiliated actors have been observed contacting targets via LinkedIn or other social platforms to persuade them to download malicious Python or npm packages hosted on PyPI or GitHub repositories.
Moonstone Sleet and Citrine Sleet are two notable subgroups employing this tactic.
While they share similarities in their attack vectors and infrastructure, their objectives differ—Moonstone Sleet targets cryptocurrency theft and ransomware deployment, whereas Citrine Sleet focuses primarily on cryptocurrency businesses.
Detailed identification of Lazarus subgroups is critical for several reasons:
Recent trends indicate the emergence of task force-like groups that transcend traditional subgroup classifications.
For instance, Bureau325 and APT43 have been identified as entities that share TTPs across multiple Lazarus subgroups while utilizing tools common to other North Korean-linked actors like Kimsuky.
These developments suggest a shift toward more dynamic and flexible organizational structures within APT groups.
Attribution can be categorized into two types: “soft” attribution used for virtual grouping and profiling within the cybersecurity community, and “hard” attribution employed in legal contexts to identify specific individuals or organizations responsible for attacks.
While soft attribution aids in issuing timely alerts and deploying countermeasures, hard attribution is essential for long-term strategic responses.
However, achieving reliable hard attribution is often challenging due to insufficient evidence linking specific actors to state-sponsored activities.
The evolution of Lazarus from a singular entity into a network of interconnected subgroups underscores the growing complexity of modern cyber threats.
Accurate subgroup-level identification is not merely an academic exercise; it is vital for crafting effective defense strategies, issuing targeted alerts, and demonstrating cybersecurity capabilities to both allies and adversaries.
As threat actors continue to adapt their operations, cybersecurity analysts must refine their methodologies for tracking APT groups while addressing unresolved issues surrounding attribution and information disclosure.
The dynamic nature of Lazarus highlights the need for continuous vigilance and innovation in the field of cybersecurity.
Are You from SOC/DFIR Team? - Try Free Malware Research with ANY.RUN - Start Now
The post Lazarus Group is No Longer Consider a Single APT Group, But Collection of Many Sub Groups appeared first on Cyber Security News.
One of the state’s most unusual colleges, the aviation-heavy Daniel Webster College that lasted next…
Curled wood shavings sprinkled across Jim McLaughlin’s workspace, filling the cabin connected to the garage…
For more than 150 years, a small band of Loudon property owners who live along…
A Warner man was arrested on Saturday after crashing into a highway sign for the…
An Iranian threat actor known as Handala Hack has carried out a series of destructive…
An Iranian threat actor known as Handala Hack has carried out a series of destructive…
This website uses cookies.