Threat Advisory

Lazarus and Kimsuky APT Uncovering Malware Deployment and Certificate Reuse

Threat: Malicious Campaign
Threat Actor Name: Lazarus, Kimsuky
Threat Actor Type: State-Sponsored
Targeted Region: Global
Alias: Genie Spider, Labyrinth Chollima, UNC577, UNC2970, UNC4034, UNC4736, UNC4899, Zinc, DEV-0139, Diamond Sleet, Jade Sleet, TA404, ITG03, Hastati Group, Hidden Cobra, Black Alicanto, ATK 3, Dangerous Password, CryptoCore , Leery Turtle , CryptoMimic, Group 77, Whois Hacking Team, NewRomanic Cyber Army Team, Appleworm, APT-C-26, SectorA01, Guardians of Peace, Gods Apostles, Gods Disciples, TraderTraitor, G0094, Velvet Chollima, UNC1130/UNC3782/UNC4469/APT43, Thallium/Cerium/Ruby Sleet/Emerald Sleet, TA406/TA427, Springtail, ITG16, Nickel Kimball, Black Banshee, APT-C-55, SharpTongue, ARCHIPELAGO, KTA082
Criticality: High


EXECUTIVE SUMMARY:

North Korean state-linked cyber actors, including Lazarus and Kimsuky, continue to conduct widespread malicious operations that span espionage, credential harvesting, covert access, and infrastructure reuse across global campaigns. These threat actors, including multiple subgroups with distinct motives, often rely on shared infrastructure artifacts and operational patterns that persist even as specific malware and lure content evolves. Tracking their activities through the infrastructure they deploy offers reliable visibility into their operational habits, enabling defenders to connect disparate incidents and better anticipate future actions.

Analysts identified multiple exposed assets being used as staging and command infrastructure, including open HTTP directories hosting credential harvesting tools, RAT frameworks, and backdoor binaries. One cluster included a Linux backdoor variant similar to a previously documented backdoor family, with modifications such as enhanced logging mechanisms that improve operator visibility into execution status. Pivoting on known hashes and IP indicators revealed additional hosts running large collections of credential recovery utilities, remote administration tools, and data exfiltration utilities, underscoring a pattern of using open directories for rapid deployment and reuse of toolsets. Further investigation showed a set of FRP binaries deployed uniformly across several hosts, indicating automated provisioning of proxy tunnels for resilient command and control. Another significant finding involved clusters of RDP-exposed hosts tied together by the reuse of a distinctive TLS certificate, with most of these nodes exhibiting direct associations with known malware samples. Across all clusters, the recurring reuse of specific hosting providers, certificates, and identical tool binaries emphasized repeatable operational habits that can be monitored as reliable signals.

The uncovered infrastructure underscores the value of focusing on operational artifacts rather than just malware payloads when tracking DPRK threat actors. Consistent habits such as exposing open directories with credential harvesting tools, deploying uniform reverse-proxy tunnels, and reusing certificates across hosts create a pattern that defenders can monitor proactively. Recognizing these signals enables earlier identification of assets and provides defenders with actionable to detect and mitigate malicious activity before intrusion chains fully unfold.

 

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1566.001 Phishing Spearphishing Attachment
T1566.002 Spearphishing Link
T1190 Exploit Public-Facing Application
Execution T1059.003 Command and Scripting Interpreter Windows Command Shell
T1059.004 Unix Shell
T1204.002 User Execution Malicious File
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
T1136.001 Create Account Local Account
Privilege Escalation T1068 Exploitation for Privilege Escalation
Defense Evasion T1070.004 Indicator Removal File Deletion
T1036.005 Masquerading Match Legitimate Resource Name or Location
Credential Access T1003.001 OS Credential Dumping LSASS Memory
T1555.003 Credentials from Password Stores Credentials from Web Browsers
Discovery T1082 System Information Discovery
T1046 Network Service Discovery
Lateral Movement T1021.001 Remote Services Remote Desktop Protocol
Command and Control T1071.001 Application Layer Protocol Web Protocols
T1090.001 Proxy Internal Proxy
T1573.002 Encrypted Channel Asymmetric Cryptography
T1105 Ingress Tool Transfer
Exfiltration T1041 Exfiltration Over C2 Channel
Impact T1491.001 Defacement Internal Defacement

 

REFERENCES:

The following reports contain further technical details:

crossmenu