threatintel
actor tracker
All actors

Lazarus Group

lazarus-group · primary source: MITRE · first observed 2008
KP · DPRKState-sponsoredHigh confidencelast cited Apr 17, 2026 · 1mo ago

DPRK state-sponsored umbrella set associated with the Reconnaissance General Bureau. Mixes financially-motivated operations (including major cryptocurrency exchange thefts and SWIFT-network bank intrusions) with espionage and destructive operations such as the 2014 Sony Pictures intrusion and the 2017 WannaCry outbreak.

Aliases

HIDDEN COBRAOtherLABYRINTH CHOLLIMACrowdStrikeDiamond SleetMicrosoft

Motivations

financial gainespionagedestruction

Target sectors

financialcryptocurrencydefensemediaenergy

Target countries

USKRJPGBINBDVNESMXAR

Lineage & relationships

full graph →

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Lazarus Group
  • DPRK
  • financial gain
  • espionage
  • destruction
Infrastructure
  • iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
Victim
  • financial
  • cryptocurrency
  • defense
  • US
  • KR
  • +1 more

MITRE ATT&CK techniques

Timeline

8 events
  1. CompromiseCritical2026-04-18·TRM Labs

    Lazarus / TraderTraitor steals $577M from Drift + KelpDAO inside three weeks

    North Korean operators hit two DeFi protocols inside a seventeen-day window in April 2026: Drift Protocol on 1 April ($285M) and KelpDAO's LayerZero bridge on 18 April ($292M). The combined $577M, combined with the February 2025 Bybit theft, drove North Korea's share of all cryptocurrency-hack value to 76% in 2026 through April per TRM Labs tracking — the highest single-actor concentration of crypto-theft attribution since continuous tracking began. Initial access for both incidents traced to the same TraderTraitor recruiter- persona social-engineering of engineers at the victim ecosystem (a continuation of the DMM Bitcoin / Ginco LinkedIn-lure tradecraft pattern from 2024).

    cryptocurrencydefisocial-engineeringdprksupply-chain
  2. CompromiseCritical2025-02-21·U.S. Federal Bureau of Investigation

    Lazarus / TraderTraitor executes $1.5B Bybit heist — largest crypto theft in history

    On 21 February 2025, North Korean operators tracked as TraderTraitor (assessed by FBI as Lazarus / APT38) transferred approximately $1.5B in Ethereum and ERC-20 tokens out of Bybit during a routine cold-wallet-to-hot- wallet rotation. The operation eclipsed the 2022 Ronin Bridge hack ($625M) as the single largest cryptocurrency theft on record. ZachXBT and subsequent FBI confirmation linked the wallets to the earlier Phemex, BingX, and Poloniex hacks attributed to the same cluster. The Bybit heist alone roughly tripled North Korea's running annual crypto take and forced multi-week downstream response from cryptocurrency exchanges attempting to block onward laundering.

    cryptocurrencysupply-chaindprkrecord-theft
  3. AnnouncementHigh2024-12-23·U.S. Federal Bureau of Investigation

    FBI attributes $308M DMM Bitcoin theft to DPRK TraderTraitor

    FBI, DC3, and Japan's NPA jointly attributed the May 2024 theft of 4,502.9 BTC (~$308M at time of theft) from Japanese exchange DMM Bitcoin to North Korean TraderTraitor activity, overlapping with Lazarus / APT38 reporting. The operation started with a LinkedIn-delivered fake pre-employment test targeting an employee at Ginco, DMM's wallet-software vendor; operators rode that access to manipulate a legitimate withdrawal request from a DMM employee. DMM ultimately announced closure following the loss.

    cryptocurrencysupply-chainattributionjapan
  4. CompromiseCritical2023-03-29·Mandiant

    3CX Desktop App supply-chain compromise

    Trojanized installers of 3CX's desktop softphone application were distributed via 3CX's official channels. Multiple vendors attributed the operation to a Lazarus subcluster (UNC4736 / Labyrinth Chollima), with downstream second-stage targeting observed against cryptocurrency-related entities.

    supply-chain3cxcryptocurrency
  5. CompromiseCritical2022-03-29·U.S. Department of the Treasury

    Ronin Network bridge theft (~$620M)

    An attacker drained the Ronin cross-chain bridge supporting the Axie Infinity game of approximately 173,600 ETH and 25.5M USDC — roughly $620M at the time. The U.S. Treasury subsequently linked the address to Lazarus Group.

    cryptocurrencybridgeronin
  6. CompromiseCritical2017-05-12·The White House

    WannaCry global ransomware outbreak

    Worm-propagating ransomware leveraging the EternalBlue SMB exploit infected over 200,000 systems in 150+ countries — most notably crippling parts of the UK NHS. The U.S., UK, Australia, and others publicly attributed the outbreak to the DPRK / Lazarus.

    ransomwarewannacryeternalblue
  7. CompromiseCritical2016-02-04·BAE Systems Threat Research

    Bangladesh Bank SWIFT heist

    Attackers issued fraudulent SWIFT messages from Bangladesh Bank's account at the Federal Reserve Bank of New York, attempting transfers of nearly $1B and successfully moving $81M to accounts in the Philippines. Multiple analyses — including the BAE Systems / SWIFT joint report — link the tradecraft and tooling to Lazarus.

    financialswiftbangladesh-bank
  8. CompromiseCritical2014-11-24·FBI

    Sony Pictures Entertainment destructive intrusion

    A destructive intrusion at Sony Pictures wiped large portions of the corporate network and leaked unreleased films, employee data, and executive correspondence. The U.S. government formally attributed the operation to North Korea.

    destructivesonydprk

Indicators of compromise

1 indicator
csv
TypeValueFirst seenSource
Domain
iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
family · WannaCry
WannaCry kill-switch domain. Discovery and sinkholing by a security researcher ("MalwareTech") on 12 May 2017 halted the ransomware's worldwide spread within hours of the outbreak.
May 11, 2017MalwareTech

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Lazarus Group — actor profile. Retrieved from https://threatintel.local/actors/lazarus-group

latest cited activity · 2026-04-18 · 1 cataloged indicators