JAN 22, 2026 • GENERAL
Emulating Lazarus Group TTPs
<p>A deep dive into the operational security and toolset of the Lazarus Group. We analyze their use of modified open-source tools and custom malware families.</p>
<h3>Observed TTPs</h3>
<ul>
<li>Spear-phishing with malicious documents</li>
<li>DLL Side-loading of signed binaries</li>
<li>Proprietary encrypted C2 protocols</li>
</ul>
<p>Understanding these patterns allows organizations to tune their SIEM and EDR rules to detect state-sponsored activity earlier in the kill chain.</p>