Lazarus' Architecture, Tools, Attribution as Researched by Group-IB Threat Intelligence Team

Lazarus' Architecture, Tools, Attribution as Researched by Group-IB Threat Intelligence Team

Group-IB, one of the global leaders in providing high fidelity Threat Intelligence, leaves no doubt that the Lazarus group, which attempted to steal 1 billion USD from the Central Bank of Bangladesh and attacked Sony Pictures, is connected to North Korea.

Group-IB Threat Intelligence experts identified new non-malware evidence of North Korean involvement, and gained unique insight into their complex botnet infrastructure.

Inside the report you will find:

  • Indicators to check if your organisation was, or is, under attack
  • A detailed description of the infrastructure used by Lazarus to cover up tracks leading to North Korea
  • In-depth analysis of Tactics, Technics, Procedures (TTPs)
  • Recommendations on how to prevent or detect an attack



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.