APT Profil – Lazarus Group
The APT with countless lives
- 20. Februar 2024
- Zettl-Schabath, Kerston; Jazxhi, Alisa; Borrett, Camille
- EN
About Lazarus Group
It is important to emphasise that there is little consolidated, broadly-recognised knowledge about the Lazarus Group and its specific political affiliations within the North Korean state apparatus compared to the knowledge of other nation-state APTs. The name usually acts as an umbrella term for a wider subset of North-Korean cyber activities and responsible sub-groups, which makes the attribution of specific operations often difficult (see section “Attribution Ambiguities” below). The threat intelligence community, academics, and state authorities have no common understanding of a clearly-defined hierarchy or the organisation of North Korean cyber units and their respective APT designations so far. The present profile therefore seeks to differentiate the more general aspects that can be perceived as a given common denominator from more specific details that are still contested by varying actors analysing the regime’s cyber posture.
In general, the Lazarus Group refers to a large subset of state-sponsored cyber activities of the Democratic People’s Republic of Korea (DPRK), operating as an integral wing of North Korea’s central foreign intelligence agency, the Reconnaissance General Bureau (RGB) that comprises six different bureaus. It is a widely-accepted understanding that North Korean cyber activity of any kind is most likely directed or controlled by the RGB. Within the RGB, most sources, including academic analyses and threat intelligence reports, such as one from Mandiant in 2023, associate the Lazarus group with the RGB Lab 110. Mandiant represents Lab 110 as an expanded/reorganised version of the better-known Bureau 121, often referred to as North Korea’s primary hacking unit. Older sources, such as an academic chapter by South Korean researchers from 2019, consider Lab 110 to be subordinate to Bureau 121.
Associated APT designations
- Lazarus Group (Novetta/Kapersky)
- Labyrinth Chollima (CrowdStrike)
- Diamond Sleet, fka ZINC (Microsoft)
- G0032 (MITRE ATT&CK)
- HIDDEN COBRA (CISA/US DHS)
- NICKEL ACADEMY (Secureworks)
- Guardians of Peace (self-given)
- New Romantic Cyber Army Team (McAfee)
- Whois Hacking Team (McAfee)
- Group 77 (Talos)
- Appleworm (origin unknown)
Country of origin
Period of activity
2009 – today
Mehr APT Profiles
- Research and Analysis
APT Profil – Lazarus Group
Fusing Technical and Social Vulnerabilities
- 20. Februar 2024
- Zettl-Schabath, Kerston; Jazxhi, Alisa; Borrett, Camille
- EN
About UNC1151
UNC1151 is a state-integrated hacking group (members of the Belarusian military, potentially supported by “quasi- seconded” officers of the Russian military intelligence service) and/or state-ordered hacking group (Belarusian military actors operating as proxies of Russian military intelligence). If, as reported by industry experts, UNC1151 operates from Belarusian soil and (at least for a part of its activities) coordinates with Russian military intelligence actors, as indicated by Recorded Future reporting from March 2022, the group’s further characterisation depends on whether its members are part of Belarusian military units or Russian citizens/military intelligence officers operating from Belarus. Based on the reported close connection between Belarusian and Russian intelligence services, Belarusian responsibility for the execution of UNC1151 activities, at the direction of or in consultation with Russian military intelligence actors, appears plausible.
Associated APT designations
- UNC1151 (FireEye/Mandiant, ThreatConnect)
- TA445 (Proofpoint)
- PUSHCHA (Google TAG)
- Storm-0257/DEV-0257 (Microsoft)
- Moonscape (Secureworks)
- UAC-0051 (CERT-UA)
Country of origin
Period of activity
1996 (alternatively 2001) – today
Mehr APT Profiles
- Research and Analysis