lazarusholic

@lazarusholic@infosec.exchange
76 Followers
0 Following
1.2K Posts
a big fan of lazarus. You can find me on http://t.me/lazarusholic , https://lazarus.day.
"Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis" published by Google. #APT37, #CVE-2024-21338, #CVE-2024-38178, #Trend, #DPRK, #CTI https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends/?hl=en
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis | Google Cloud Blog

This Google Threat Intelligence Group report presents an analysis of detected 2024 zero-day exploits.

Google Cloud Blog
"Inside North Korea’s Cyber Ops with Silas Cutler" published by Censys. #BeaverTail, #NPM, #Youtube, #DPRK, #CTI https://censys.com/podcasts-videos/inside-north-korea-cyber-ops-with-silas-cutler
Exclusive Threat Briefing: Inside North Korea’s Cyber Ops with Silas Cutler

Discover new insights into North Korea’s cyber ops, BeaverTail malware, and how Censys helps threat hunters move faster with real-time intel.

Censys
"Threat Group Profiling: Lazarus" published by S2W. #Lazarus, #DPRK, #CTI https://s2w.inc/en/resource/detail/812
"Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries" published by SentinelOne. #ITWorker, #Trend, #DPRK, #CTI https://www.sentinelone.com/labs/top-tier-target-what-it-takes-to-defend-a-cybersecurity-company-from-todays-adversaries/
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries

This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.

SentinelOne
"NSFOCUS APT Monthly Briefing - March 2025" published by NSFOCUS. #APT37, #Lazarus, #Trend, #DPRK, #CTI https://nsfocusglobal.com/nsfocus-apt-briefing-march-2025/
NSFOCUS APT Monthly Briefing - March 2025 - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.

Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South Asia, East Asia, Eastern Europe, and South America, as shown in the following figure. In terms of group activity, the most active APT […]

NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
"Now that the cat is out of the bag regarding the use of front companies like BlockNovas LLC" published by TeamCymru. #ContagiousInterview, #DPRK, #CTI https://archive.is/E2Hcp
Rolling in the Deep(Web): Lazarus Tsunami

The „Contagious Interview“ campaign to steal crypto currencies is still going on. We share our analysis of a comprehensive sample of the Tsunami framework used by the Lazarus group together with Yara rules and IoC to help detecting it.

HiSolutions Research
"How AI services power the DPRK’s IT contracting scams" published by Okta. #ITWorker, #Wagemole, #Deepfake, #DPRK, #CTI https://sec.okta.com/articles/2025/04/GenAIDPRK/
How AI services power the DPRK’s IT contracting scams

Over the past few months, Okta Threat Intelligence conducted in-depth research into online services used by individuals identified by US authorities and trus

Okta Security
"Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware" published by Silentpush. #BeaverTail, #ContagiousInterview, #InvisibleFerret, #OtterCookie, #FamousChollima, #ClickFix, #DPRK, #CTI https://www.silentpush.com/blog/contagious-interview-front-companies/
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie

Contagious Interview (DPRK) have launched a new campaign involving three front companies that deliver BeaverTail, InvisibleFerret, and OtterCookie malware.

Silent Push
Operation SyncHole: Lazarus APT goes back to the well

Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.

Kaspersky