← Return to Intelligence

Emulating Lazarus Group TTPs

  <p>A deep dive into the operational security and toolset of the Lazarus Group. We analyze their use of modified open-source tools and custom malware families.</p>
  <h3>Observed TTPs</h3>
  <ul>
    <li>Spear-phishing with malicious documents</li>
    <li>DLL Side-loading of signed binaries</li>
    <li>Proprietary encrypted C2 protocols</li>
  </ul>
  <p>Understanding these patterns allows organizations to tune their SIEM and EDR rules to detect state-sponsored activity earlier in the kill chain.</p>

Share this intel