

The group has been very active since 2011 and was originally disclosed when Novetta published the results of its Operation Blockbuster research. The scale of the Lazarus operations is shocking. We believe Lazarus is not just “yet another APT actor”. See:Īmong other things, the Lazarus group was responsible for the Sony Wiper attack, the Bangladesh bank heist and the DarkSeoul operation. We wrote about the Lazarus group extensively and presented together with our colleagues from BAE and SWIFT at the Kaspersky Security Analyst Summit (SAS 2017). I know about Wannacry, but what is Lazarus? So, what does it all mean? Here’s a few questions and answers to think about.
Lazarus group code#
The similarity can be observed in the screenshot below, taken between the two samples, with the shared code highlighted: A Lazarus APT group sample from February 2015.A WannaCry cryptor sample from February 2017 which looks like a very early variant.The two samples Neel refers to in the post are: The cryptic message in fact refers to a similarity between two samples that have shared code. We encourage you to do your own research before investing.A few hours ago, Neel Mehta, a researcher at Google posted a mysterious message on Twitter with the #WannaCryptAttribution hashtag:

Lazarus group update#
The stolen funds as the laundering progresses, and will update its tools to reflect the movement of these assets.ĭISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. The relatively short periods during which the stolen funds stop being moved out of Tornado cash are consistent with APAC nighttime hours.We have observed very similar programmatic laundering of funds stolen from the Ronin Bridge, which has been attributed to Lazarus, as well as a number of other attacks linked to the group.

The regularity of the deposits into Tornado over extended periods of time suggests that an automated process is being used.Although Harmony is based in the US, many of the core team have links to the APAC region. Lazarus Group tends to focus on APAC-based targets, perhaps for language reasons.Such techniques have frequently been used by the Lazarus Group. The theft was perpetrated by compromising the cryptographic keys of a multi-signature wallet – likely through a social engineering attack on Harmony team members.

For example, the group is believed to be behind the $540 million hack of Ronin Bridge.
