Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Lazarus Targets Developers in Global Attack

January 30, 2025
Reading Time: 3 mins read
in Alerts
SparkRAT Attacks Target Multiple Platforms

The Lazarus Group, a notorious North Korean state-sponsored Advanced Persistent Threat (APT), is behind a large-scale cyberattack campaign known as “Operation Phantom Circuit.” This operation, which began in September 2024, involves embedding malicious backdoors into legitimate software packages used by developers and organizations worldwide. The Lazarus Group’s targets include a significant number of victims in the cryptocurrency and technology sectors, where the impact has been especially concentrated. The attack has already affected over 233 organizations globally, with many of the compromised applications distributed through trusted platforms like GitLab and other open-source repositories.

The method used by the Lazarus Group in this campaign revolves around manipulating legitimate software packages, such as cryptocurrency apps and authentication tools, to include obfuscated malware. When unsuspecting developers download and execute these altered packages, they unknowingly trigger the infection chain. Once the malware is executed, it establishes communication with Command-and-Control (C2) servers that use advanced evasion techniques, including routing traffic through Astrill VPN endpoints and proxy servers located in Russia.

This multi-layered approach is designed to hide the true origin of the attacks, which have been traced back to North Korean IP addresses.

The C2 servers used by the Lazarus Group feature a hidden administrative layer that allows them to manage exfiltrated data, oversee compromised systems, and deliver additional payloads. The servers use ports such as 1224 and 1245, with the latter hosting a concealed web-admin panel that requires authentication for access. This panel allows operators to organize stolen data and offers advanced search and filtering capabilities to streamline their operations. Since the campaign has unfolded in waves, with each month seeing an increase in targeted victims, it is evident that the Lazarus Group is strategically expanding its attack surface.

Researchers have attributed the campaign to North Korea through the use of NetFlow analysis and the identification of traffic patterns linked to North Korean IP addresses. The Lazarus Group’s infrastructure makes use of proxies and VPNs to obscure the true source of the attacks, further complicating attribution. To defend against such sophisticated tactics, experts recommend implementing rigorous code verification processes, regularly auditing third-party software dependencies, and monitoring network traffic for anomalies. Organizations in high-risk sectors like cryptocurrency and technology are advised to adopt proactive cybersecurity measures, including endpoint detection and response (EDR) solutions and a zero-trust security model.

Reference:
  • Lazarus Group Targets Global Developers with Operation Phantom Circuit

About Lazarus Group:

Andariel - Lazarus Group
Lazarus Group

Andariel is a North Korean state-sponsored threat group that has been active since at least 2009. Andariel has primarily focused its operations–which have included destructive attacks–against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cyber financial operations against ATMs, banks, and cryptocurrency exchanges.

It is considered a sub-set of Lazarus Group, and has been attributed to North Korea’s Reconnaissance General Bureau.

North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups.

Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJanuary 2025
ADVERTISEMENT

Related Posts

Stealth Malware Targets Fortinet Firewalls

Spyware in App Stores Steals Your Photos

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Stealth Malware Targets Fortinet Firewalls

June 23, 2025
New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025

Latest Alerts

Spyware in App Stores Steals Your Photos

Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

Subscribe to our newsletter

    Latest Incidents

    Aflac Hacked in Spree on Insurance Firms

    CoinMarketCap Doodle Hack Steals Crypto

    UK’s Oxford Council Legacy Systems Breached

    Massive Leak Exposes 16 Billion Credentials

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial