lazarusholic

@lazarusholic@infosec.exchange
85 Followers
0 Following
1.5K Posts
a big fan of lazarus. You can find me on http://t.me/lazarusholic , https://lazarus.day.
"North Korea Drives Record $2 Billion Crypto Theft Year, Pushing All-Time Total to $6.75 Billion" published by Chainalysis. #DeFi, #ITWorker, #MoneyLaundering, #DPRK, #CTI https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2026/
2025 Crypto Theft Reaches $3.4 Billion

North Korean hackers stole $2.02 billion in cryptocurrency in 2025, a 51% year-over-year increase, pushing their all-time total to $6.75 billion.

Chainalysis
"Inside DPRK Operations: New Lazarus and Kimsuky Infrastructure Uncovered Across Global Campaigns" published by Hunt.io. #Kimsuky, #Lazarus, #DPRK, #CTI https://hunt.io/blog/dprk-lazarus-kimsuky-infrastructure-uncovered
Inside DPRK Operations: New Lazarus and Kimsuky Infrastructure Uncovered Across Global Campaigns

Deep investigation into DPRK activity, revealing new Lazarus and Kimsuky infrastructure through multi-stage hunts and exposed operational patterns.

"EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2" published by Sysdig. #CVE-2025-55182, #EtherRAT, #React2Shell, #Suspicious, #DPRK, #CTI https://www.sysdig.com/blog/etherrat-dissected-how-a-react2shell-implant-delivers-5-payloads-through-blockchain-c2
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2 | Sysdig

Sysdig TRT analyzes EtherRAT, a novel blockchain-based implant exploiting React2Shell, revealing credential theft, worm propagation, and forensic insights.

Kimsuky Distributing Malicious Mobile App via QR Code | Enki White Hat

Kimsuky Distributing Malicious Mobile App via QR Code

"QR 코드를 이용해 악성 모바일 앱을 유포하는 Kimsuky" published by ENKI. #DocSwap, #Kimsuky, #Mobile, #DPRK, #CTI https://www.enki.co.kr/media-center/blog/kimsuky-distributing-malicious-mobile-app-via-qr-code
QR 코드를 이용해 악성 모바일 앱을 유포하는 Kimsuky | 엔키화이트햇

QR 코드를 이용해 악성 모바일 앱을 유포하는 Kimsuky

"DPRK threat actors are still rekting way too many of you via their fake Zoom / fake Teams meets" published by Tay. #DPRK, #CTI https://archive.md/vi3Pg
"The Infostealer to APT Pipeline: How Lazarus Group Hijacked a Yemen Disinformation Network" published by HudsonRock. #Lazarus, #DPRK, #CTI https://www.hudsonrock.com/blog/5710
Hudson Rock - Infostealer Intelligence Solutions

Powered by Hudson Rock's continuously augmented cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.

Hudson Rock
"APT-C-26(Lazarus)组织利用WinRAR漏洞部署Blank Grabber木马的技术分析" published by Qihoo360. #APT-C-26, #BlankGrabber, #CVE-2025-8088, #DPRK, #CTI https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247507693&idx=1&sn=e73e1cca5af2ee80c3037daa1dbd2ab1
"2025년 11월 APT 공격 동향 보고서(국내)" published by Ahnlab. #LNK, #Trend, #DPRK, #CTI https://asec.ahnlab.com/ko/91529/
2025년 11월 APT 공격 동향 보고서(국내) - ASEC

2025년 11월 APT 공격 동향 보고서(국내) ASEC

ASEC
"2025년 11월 APT 그룹 동향 보고서" published by Ahnlab. #FamousChollima, #Kimsuky, #Konni, #Trend, #DPRK, #CTI https://asec.ahnlab.com/ko/91524/
2025년 11월 APT 그룹 동향 보고서 - ASEC

2025년 11월 APT 그룹 동향 보고서 ASEC

ASEC