LABYRINTH CHOLLIMA Evolves into Three Adversaries | CrowdStrike

LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft. Learn more.

CrowdStrike.com
2026 Global Threat Report | Latest Cybersecurity Trends & Insights | CrowdStrike

Discover key cyber threat trends in CrowdStrike’s 2026 Global Threat Report. Learn about rising attacks, malware-free threats, and evolving adversary tactics. Download the report now.

CrowdStrike.com
Labyrinth Chollima APT Adversary Simulation - Abdulrehman Ali - Medium

This is a simulation of attack by (Labyrinth Chollima) APT group targeting victims working on energy company and the aerospace industry, the attack campaign was active before June 2024, The attack…

Medium
"Exploring CISA’s 2023 Top Routinely Exploited Vulnerabilities" published by Vulncheck. #LabyrinthChollima, #SilentChollima, #Trend, #VelvetChollima, #DPRK, #CTI https://vulncheck.com/blog/cisa-top-exploited-2024
Exploring CISA’s 2023 Top Routinely Exploited Vulnerabilities

In September, VulnCheck identified evidence of 78 CVEs that were publicly disclosed for the first time as exploited in the wild.

VulnCheck
"Labyrinth Chollima Using Poisoned Python Packages to Deliver PondRAT" published by PolySwarm. #LabyrinthChollima, #PondRAT, #POOLRAT, #PyPI, #DPRK, #CTI https://blog.polyswarm.io/labyrinth-chollima-using-poisoned-python-packages-to-deliver-pondrat
Labyrinth Chollima Using Poisoned Python Packages to Deliver PondRAT

North Korea nexus threat actor group Labyrinth Chollima was observed using poisoned Python packages to deliver PondRAT, a backdoor that targets MacOS and Linux systems.

"North Korea’s Post-Infection Python Payloads" published by Norforlk. #LabyrinthChollima, #NPM, #CTI, #OSINT, #LAZARUS https://norfolkinfosec.com/north-koreas-post-infection-python-payloads/
North Korea’s Post-Infection Python Payloads – One Night in Norfolk

"FortiGuard Labs Outbreak Alerts Annual Report 2023: A Glimpse into the Evolving Threat Landscape" published by Fortinet. #Trend, #LabyrinthChollima, #Andariel, #DiamondSleet, #CTI, #OSINT, #LAZARUS https://www.fortinet.com/blog/threat-research/fortiguard-labs-outbreak-alerts-report-2023
"VMConnect supply chain attack continues, evidence points to North Korea" published by ReversingLabs. #LabyrinthChollima, #VMConnect, #CTI, #OSINT, #LAZARUS https://www.reversinglabs.com/blog/vmconnect-supply-chain-campaign-continues
VMConnect supply chain attack continues, evidence points to North Korea

ReversingLabs researchers discovered more packages that are part of the previously identified VMConnect campaign, and evidence linking the campaign to North Korean threat actors.

ReversingLabs

CrowdStrike and SentinelOne are reporting that a version of the 3CX softphone app has been bundled with malware in a supply chain attack, similar to what happened with Solarwinds. CrowdStrike intelligence has attributed this activity to a North Korean APT group they track as LABYRINTH CHOLLIMA. The response from 3CX is arrogant as hell!

#InfoSec #3CX #SupplyChainAttack #CrowdStrike #SentinelOne #NorthKorea #DPRK #APT #LABYRINTHCHOLLIMA

CrowdStrike Prevents 3CXDesktopApp Intrusion Campaign

On March 29, 2023, CrowdStrike observed unexpected malicious activity emanating from a legitimate, signed binary, 3CXDesktopApp — a softphone application from 3CX.

crowdstrike.com

Anybody tracking the 3CX Desktop App incident? @crowdstrike is reporting a potential software supply chain compromise by Lazarus Group.

#3cx #lazarusgroup #apt38 #labyrinthchollima