Andariel
andariel · primary source: MITRE · first observed 2008
KP · DPRKState-sponsoredHigh confidencelast cited Jul 24, 2024 · 1.8y ago
DPRK state-sponsored intrusion set publicly attributed to the Reconnaissance General Bureau's 3rd Bureau (Andariel). Treated by MITRE as a sub-cluster of Lazarus Group; conducts both espionage against defense, aerospace, nuclear, and engineering targets and financially-motivated operations against banks and ATMs. Joint advisory AA24-207A in July 2024 attributed sustained intellectual-property theft against critical-infrastructure research to the group.
Aliases
Silent ChollimaCrowdStrikeOnyx SleetMicrosoftPLUTONIUMMicrosoftStoneflyOtherAPT45Mandiant
Motivations
espionagefinancial gain
Target sectors
defenseaerospacenuclearenergyfinancial
Target countries
KRUSJPIN
Lineage & relationships
full graph →Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
1 eventIndicators of compromise
2 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | Andariel implant sample listed in CISA / FBI / NSA joint advisory AA24-207A (25 July 2024) covering the RGB 3rd Bureau group also tracked as Onyx Sleet / Stonefly / Silent Chollima. The advisory ties the group to defence, aerospace, nuclear and engineering espionage in support of DPRK military and nuclear programs. | Jul 24, 2024 | CISA |
| SHA-256 | family · Maui Maui ransomware sample (maui.exe). FBI / CISA / Treasury advisory AA22-187A documents its use by DPRK state actors against U.S. Healthcare and Public Health sector targets from at least May 2021. Encryption combines AES, RSA and XOR and is driven manually via CLI by the operator. | Apr 30, 2021 | CISA |
Related actors
shared ATT&CK techniques- IR · IranPioneer Kitten3 shared techniques
- ?? · UnknownALPHV/BlackCat2 shared techniques
- CN · ChinaAPT32 shared techniques
- IR · IranAPT392 shared techniques
- CN · ChinaAPT402 shared techniques
- RU · RussiaCadet Blizzard2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Andariel — actor profile. Retrieved from https://threatintel.local/actors/andariel
latest cited activity · 2024-07-25 · 2 cataloged indicators