Lazarus Group, Hidden Cobra, Labyrinth Chollima

Description

(Malwarebytes) Lazarus Group is commonly believed to be run by the North Korean government, motivated primarily by financial gain as a method of circumventing long-standing sanctions against the regime. They first came to substantial media notice in 2013 with a series of coordinated attacks against an assortment of South Korean broadcasters and financial institutions using DarkSeoul, a wiper program that overwrites sections of the victims’ master boot record.

In November 2014, a large scale breach of Sony Pictures was attributed to Lazarus. The attack was notable due to its substantial penetration across Sony networks, the extensive amount of data exfiltrated and leaked, as well of use of a wiper in a possible attempt to erase forensic evidence. Attribution on the attacks was largely hazy, but the FBI released a statement tying the Sony breach to the earlier DarkSeoul attack, and officially attributed both incidents to North Korea.

Fast forward to May 2017 with the widespread outbreak of WannaCry, a piece of ransomware that used an SMB exploit as an attack vector. Attribution to North Korea rested largely on code reuse between WannaCry and previous North Korean attacks, but this was considered to be thin grounds given the common practice of tool sharing between regional threat groups. Western intelligence agencies released official statements to the public reaffirming the attribution, and on September 6, 2018, the US Department of Justice charged a North Korean national with involvement in both WannaCry and the Sony breach.

Lazarus Group has 3 subgroups:

  1. Subgroup: Andariel, Silent Chollima
  2. Subgroup: BeagleBoyz
  3. Subgroup: Bluenoroff, APT 38, Stardust Chollima
  4. Subgroup: Operation Contagious Interview

The following groups may be associated with the Lazarus Group: Covellite, Reaper, APT 37, Ricochet Chollima, ScarCruft, Wassonite and Moonstone Sleet.

Names

NameName-Giver
Lazarus GroupKaspersky
Labyrinth ChollimaCrowdStrike
Group 77Talos
Hastati GroupSecureWorks
Whois Hacking TeamMcAfee
NewRomanic Cyber Army TeamMcAfee
ZincMicrosoft
Hidden CobraTrend Micro
ApplewormSymantec
APT-C-26Qihoo 360
ATK 3Thales
SectorA01ThreatRecon
ITG03IBM
TA404Proofpoint
DEV-0139Microsoft
Guardians of Peaceself given
Gods Apostlesself given
Gods Disciplesself given
UNC577Mandiant
UNC2970Mandiant
UNC4034Mandiant
UNC4736Mandiant
UNC4899Mandiant
Diamond SleetMicrosoft
Citrine SleetMicrosoft
Jade SleetMicrosoft
TraderTraitorCISA
Gleaming PiscesPalo Alto
Slow PiscesPalo Alto

Country

State-sponsored, Bureau/Unit 211

Motivation

  • Information theft and espionage
  • Sabotage and destruction
  • Financial crime

First Seen

2007

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Other Information

Uuid

41dcfaff-d5f0-484d-8649-ef8c61588eec

Last Card Change

2025-06-30