Lazarus Group
MITRE: G0032Lazarus Group is a known alias of the APT group APT38
Lazarus Group is a North Korean state-sponsored cyber threat group that has been attributed to the Reconnaissance General Bureau. The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by Lazarus Group correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain.North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups, such as Andariel, APT37, APT38, and Kimsuky.
The Lazarus Group is an advanced persistent threat (APT) that has been active since at least 2011, with ties to North Korea. They are responsible for several high-profile cyber attacks on financial institutions and government agencies around the world. Their tactics include spear phishing emails, malware injections, and exploiting vulnerabilities in software. The group is known for their sophisticated techniques and ability to evade detection by security measures.\\
\\
Techniques, tactics and practices: \\
\\
The Lazarus Group is an advanced persistent threat that has been active since at least 2011. They have ties to North Korea and are responsible for several high-profile cyber attacks on financial institutions and government agencies around the world. Their tactics include spear phishing emails, malware injections, and exploiting vulnerabilities in software. The group is known for their sophisticated techniques and ability to evade detection by security measures.