🇰🇵
Lazarus Group
APT Group
Information theft and espionage
Sabotage and destruction
Financial crime
Financial gain
88 zero-day CVEs
ETDA ✓
Also Known As 40 names
APT 38
APT-C-26
APT38
ATK117
ATK3
Andariel
Appleworm
BeagleBoyz
Black Artemis
Bluenoroff
Bureau 121
COPERNICIUM
COVELLITE
Citrine Sleet
DEV-0139
DEV-1222
Dark Seoul
Diamond Sleet
G0032
G0082
Genie Spider
Group 77
Hastati Group
Hidden Cobra
Labyrinth Chollima
Lazarus
Moonstone Sleet
NICKEL GLADSTONE
NewRomanic Cyber Army Team
Nickel Academy
Operation AppleJeus
Operation DarkSeoul
Operation GhostSecret
Operation Troy
Sapphire Sleet
Stardust Chollima
TA404
Unit 121
Whois Hacking Team
ZINC
Target Countries 45
Countries highlighted in red
United Arab Emirates
Australia
Bangladesh
Belgium
Burkina Faso
Brazil
Canada
Switzerland
Chile
China
Cyprus
Germany
Ecuador
Estonia
Egypt
France
United Kingdom
Guatemala
Hong Kong
Ireland
Israel
India
Italy
Japan
Saint Kitts and Nevis
Republic of Korea
Mexico
Malaysia
Nigeria
Netherlands
Nepal
Philippines
Poland
Russian Federation
Sweden
Singapore
Slovakia
Thailand
Province of China Taiwan
United Republic of Tanzania
Uganda
United States
Bolivarian Republic of Venezuela
Vietnam
South Africa
Sectors Targeted
Miscellaneous Intermediation
52391
Portfolio Management
52392
Offices of Lawyers
541110
Educational Services
611
Technology
Outpatient Care Centers
6214
Mining, Quarrying, and Oil and Gas Extraction
21
Insurance Carriers and Related Activities
524
Educational Support Services
6117
Food Manufacturing
311
Finance
Telephone Apparatus Manufacturing
33421
Food Services and Drinking Places
722
BitCoin exchanges
Engineering
Other Personal Services
8129
Promoters of Performing Arts, Sports, and Similar Events
7113
Newspaper Publishers
51111
Media
Shipping and Logistics
Employment Placement Agencies and Executive Search Services
56131
Motion Picture and Video Production
51211
Investigation, Guard, and Armored Car Services
56161
Religious Organizations
8131
Research and Development in the Social Sciences and Humanities
54172
Energy
Telecommunications
517
Hospitals
622
Photographic Services
54192
Grantmaking and Giving Services
8132
Healthcare
Air Transportation
481
Other Amusement and Recreation Industries
7139
Government
Civic and Social Organizations
8134
Management, Scientific, and Technical Consulting Services
5416
Computer Systems Design and Related Services
54151
Convention and Trade Show Organizers
56192
Computer Systems Design Services
541512
Internet Publishing and Broadcasting and Web Search Portals
51913
Aerospace
Motor Vehicle Manufacturing
3361
All Other Information Services
51919
Computer Systems Design and Related Services
5415
Commercial Banking
52211
Advertising Agencies
54181
National Security and International Affairs
928110
Business, Professional, Labor, Political, and Similar Organizations
8139
Defense
Investment Banking and Securities Dealing
52311
Periodical Publishers
51112
Business Schools and Computer and Management Training
6114
Justice, Public Order, and Safety Activities
9221
Freight Transportation Arrangement
48851
Public Relations Agencies
54182
Electronics and Appliance Stores
44314
Human Resources Consulting Services
541612
Construction
23
Real Estate
531
Financial
Data Processing, Hosting, and Related Services
51821
Details
Origin
🇰🇵 KP
Last Updated
21 Mar 2025
Malware Families 87
wannacryptor
bistromath
nachocheese
brambul
lambload
wagenttea
hotwax
magic_rat
sierras
alphanc
wormhole
artfulpie
blindtoad
wininetloader
hermeticwiper
vyveva
simpletea
touchmove
cur1_downloader
electricfish
spectral_blur
fudmodule
jessiecontea
cheesetray
win.scoutc2
DARKCOMET
bookcodesrat
unidentified_101
iconic_stealer
fuwuqidrama
unidentified_106
outcrypt
zhmimikatz
minitypeframe
httpsuploader
lpeclient
feed_load
3cx_backdoor
anchormtea
coredn
js.ether_rat
contopee
roll_sling
duuzer
ghost_secret
crat
joanap
redshawl
forest_tiger
buffetline
casso
redhat_hacker
phandoor
slickshoes
lazardoor
banpolmex
power_ratankba
pslogger
nestegg
manuscrypt
watchcat
lazarus_killdisk
lazarloader
snatchcrypto
lcpdot
ratankbapos
unidentified_077
unidentified_090
cleantoad
vsingle
racket
wannaren
bravonc
bitsran
bootwreck
deltas
alreay
klackring
webbytea
yort
imprudentcook
neddnloader
interception
agendacrypt
log_collector
dyepack
hloader
MITRE ATT&CK 371
T1001 - Data Obfuscation
T1001.003 - Protocol Impersonation
T1002
T1003 - OS Credential Dumping
T1003.001 - LSASS Memory
T1003.003 - NTDS
T1003.004 - LSA Secrets
T1005 - Data from Local System
T1007
T1008
T1010 - Application Window Discovery
T1011
T1011.001 - Exfiltration Over Bluetooth
T1012 - Query Registry
T1014 - Rootkit
T1016 - System Network Configuration Discovery
T1016.001 - Internet Connection Discovery
T1017 - Application Deployment Software
T1018 - Remote System Discovery
T1020 - Automated Exfiltration
T1020.001 - Traffic Duplication
T1021 - Remote Services
T1021.001 - Remote Desktop Protocol
T1021.002 - SMB/Windows Admin Shares
T1021.004 - SSH
T1021.006 - Windows Remote Management
T1022
T1023 - Shortcut Modification
T1024 - Custom Cryptographic Protocol
T1025
T1027 - Obfuscated Files or Information
T1027.002 - Software Packing
T1027.003
T1027.007
T1027.009
T1027.013
T1031 - Modify Existing Service
T1033 - System Owner/User Discovery
T1035 - Service Execution
T1036 - Masquerading
T1036.003
T1036.004 - Masquerade Task or Service
T1036.005 - Match Legitimate Name or Location
T1036.006
T1036.008
T1037 - Boot or Logon Initialization Scripts
T1037.001 - Logon Script (Windows)
T1037.003 - Network Logon Script
T1038 - DLL Search Order Hijacking
T1039 - Data from Network Shared Drive
T1040 - Network Sniffing
T1041 - Exfiltration Over C2 Channel
T1045 - Software Packing
T1046
T1047 - Windows Management Instrumentation
T1048 - Exfiltration Over Alternative Protocol
T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
T1049 - System Network Connections Discovery
T1053 - Scheduled Task/Job
T1053.003
T1053.005 - Scheduled Task
T1055 - Process Injection
T1055.001 - Dynamic-link Library Injection
T1055.002 - Portable Executable Injection
T1055.011 - Extra Window Memory Injection
T1055.012 - Process Hollowing
T1056 - Input Capture
T1056.001 - Keylogging
T1056.002 - GUI Input Capture
T1056.004 - Credential API Hooking
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.002 - AppleScript
T1059.003 - Windows Command Shell
T1059.004 - Unix Shell
T1059.005 - Visual Basic
T1059.006 - Python
T1059.007 - JavaScript
T1060 - Registry Run Keys / Startup Folder
T1062 - Hypervisor
T1063 - Security Software Discovery
T1064
T1068 - Exploitation for Privilege Escalation
T1069 - Permission Groups Discovery
T1069.002 - Domain Groups
T1070 - Indicator Removal on Host
T1070.001
T1070.003
T1070.004 - File Deletion
T1070.006 - Timestomp
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1071.004 - DNS
T1072 - Software Deployment Tools
T1074 - Data Staged
T1074.001
T1076 - Remote Desktop Protocol
T1078 - Valid Accounts
T1078.002 - Domain Accounts
T1078.003 - Local Accounts
T1078.004 - Cloud Accounts
T1081 - Credentials in Files
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1084 - Windows Management Instrumentation Event Subscription
T1087 - Account Discovery
T1087.002
T1089 - Disabling Security Tools
T1090 - Proxy
T1090.001
T1090.002
T1090.003 - Multi-hop Proxy
T1091
T1095 - Non-Application Layer Protocol
T1098
T1102 - Web Service
T1102.001 - Dead Drop Resolver
T1102.002 - Bidirectional Communication
T1102.003 - One-Way Communication
T1104 - Multi-Stage Channels
T1105 - Ingress Tool Transfer
T1106 - Native API
T1107
T1110 - Brute Force
T1110.003
T1111 - Two-Factor Authentication Interception
T1112 - Modify Registry
T1113 - Screen Capture
T1114 - Email Collection
T1115 - Clipboard Data
T1119 - Automated Collection
T1124
T1125 - Video Capture
T1127
T1129 - Shared Modules
T1130 - Install Root Certificate
T1132 - Data Encoding
T1132.001 - Standard Encoding
T1133 - External Remote Services
T1134 - Access Token Manipulation
T1134.001
T1134.002 - Create Process with Token
T1135 - Network Share Discovery
T1136 - Create Account
T1137 - Office Application Startup
T1138 - Application Shimming
T1139 - Bash History
T1140 - Deobfuscate/Decode Files or Information
T1143 - Hidden Window
T1155 - AppleScript
T1176 - Browser Extensions
T1185 - Man in the Browser
T1187 - Forced Authentication
T1189 - Drive-by Compromise
T1190 - Exploit Public-Facing Application
T1192 - Spearphishing Link
T1193 - Spearphishing Attachment
T1195 - Supply Chain Compromise
T1195.001 - Compromise Software Dependencies and Development Tools
T1195.002 - Compromise Software Supply Chain
T1199 - Trusted Relationship
T1202 - Indirect Command Execution
T1203 - Exploitation for Client Execution
T1204 - User Execution
T1204.001 - Malicious Link
T1204.002 - Malicious File
T1207 - Rogue Domain Controller
T1210 - Exploitation of Remote Services
T1211 - Exploitation for Defense Evasion
T1212 - Exploitation for Credential Access
T1213 - Data from Information Repositories
T1217 - Browser Bookmark Discovery
T1218 - Signed Binary Proxy Execution
T1218.001
T1218.005
T1218.007 - Msiexec
T1218.010
T1218.011 - Rundll32
T1219 - Remote Access Software
T1220
T1221 - Template Injection
T1404 - Exploit OS Vulnerability
T1406 - Obfuscated Files or Information
T1410 - Network Traffic Capture or Redirection
T1428 - Exploit Enterprise Resources
T1432 - Access Contact List
T1441
T1442
T1444
T1445 - Abuse of iOS Enterprise App Signing Key
T1449 - Exploit SS7 to Redirect Phone Calls/SMS
T1454 - Malicious SMS Message
T1459 - Device Unlock Code Guessing or Brute Force
T1480 - Execution Guardrails
T1480.002
T1485 - Data Destruction
T1486 - Data Encrypted for Impact
T1489
T1490 - Inhibit System Recovery
T1491
T1491.001
T1495
T1496 - Resource Hijacking
T1497 - Virtualization/Sandbox Evasion
T1497.001 - System Checks
T1497.002 - User Activity Based Checks
T1497.003
T1498 - Network Denial of Service
T1499 - Endpoint Denial of Service
T1505 - Server Software Component
T1505.003 - Web Shell
T1505.004
T1512 - Capture Camera
T1518 - Software Discovery
T1518.001 - Security Software Discovery
T1528 - Steal Application Access Token
T1529
T1530
T1531
T1534
T1539 - Steal Web Session Cookie
T1542
T1542.003
T1543 - Create or Modify System Process
T1543.001 - Launch Agent
T1543.003
T1543.004 - Launch Daemon
T1546 - Event Triggered Execution
T1547 - Boot or Logon Autostart Execution
T1547.001 - Registry Run Keys / Startup Folder
T1547.006
T1547.008 - LSASS Driver
T1547.009
T1547.011 - Plist Modification
T1548 - Abuse Elevation Control Mechanism
T1548.002 - Bypass User Account Control
T1550 - Use Alternate Authentication Material
T1550.002 - Pass the Hash
T1552 - Unsecured Credentials
T1552.001 - Credentials In Files
T1552.004 - Private Keys
T1553 - Subvert Trust Controls
T1553.002 - Code Signing
T1553.003 - SIP and Trust Provider Hijacking
T1553.005 - Mark-of-the-Web Bypass
T1555 - Credentials from Password Stores
T1555.001 - Keychain
T1555.003 - Credentials from Web Browsers
T1555.005 - Password Managers
T1556 - Modify Authentication Process
T1556.001 - Domain Controller Authentication
T1557 - Man-in-the-Middle
T1557.001
T1559
T1560 - Archive Collected Data
T1560.001 - Archive via Utility
T1560.002
T1560.003
T1561 - Disk Wipe
T1561.001 - Disk Content Wipe
T1561.002 - Disk Structure Wipe
T1562 - Impair Defenses
T1562.001 - Disable or Modify Tools
T1562.003
T1562.004
T1562.013
T1563
T1564 - Hide Artifacts
T1564.001
T1564.003 - Hidden Window
T1565 - Data Manipulation
T1565.001
T1565.002
T1565.003
T1566 - Phishing
T1566.001 - Spearphishing Attachment
T1566.002 - Spearphishing Link
T1566.003 - Spearphishing via Service
T1567 - Exfiltration Over Web Service
T1567.002 - Exfiltration to Cloud Storage
T1568 - Dynamic Resolution
T1568.002 - Domain Generation Algorithms
T1569
T1569.002
T1570 - Lateral Tool Transfer
T1571 - Non-Standard Port
T1572 - Protocol Tunneling
T1573 - Encrypted Channel
T1573.001 - Symmetric Cryptography
T1573.002 - Asymmetric Cryptography
T1574 - Hijack Execution Flow
T1574.001 - DLL Search Order Hijacking
T1574.002 - DLL Side-Loading
T1574.010 - Services File Permissions Weakness
T1574.012 - COR_PROFILER
T1574.013
T1578 - Modify Cloud Compute Infrastructure
T1580 - Cloud Infrastructure Discovery
T1583 - Acquire Infrastructure
T1583.001 - Domains
T1583.002 - DNS Server
T1583.003 - Virtual Private Server
T1583.004 - Server
T1583.005
T1583.006
T1584 - Compromise Infrastructure
T1584.001 - Domains
T1584.002 - DNS Server
T1584.004 - Server
T1584.005 - Botnet
T1585 - Establish Accounts
T1585.001 - Social Media Accounts
T1585.002
T1586 - Compromise Accounts
T1587 - Develop Capabilities
T1587.001 - Malware
T1587.002
T1587.003 - Digital Certificates
T1587.004 - Exploits
T1588 - Obtain Capabilities
T1588.001 - Malware
T1588.002 - Tool
T1588.003
T1588.004 - Digital Certificates
T1589 - Gather Victim Identity Information
T1589.002
T1590 - Gather Victim Network Information
T1590.005
T1591 - Gather Victim Org Information
T1591.001 - Determine Physical Locations
T1591.002 - Business Relationships
T1591.004
T1592 - Gather Victim Host Information
T1592.002
T1593 - Search Open Websites/Domains
T1593.001
T1595 - Active Scanning
T1596 - Search Open Technical Databases
T1598
T1598.003
T1602.001 - SNMP (MIB Dump)
T1602.002 - Network Device Configuration Dump
T1608 - Stage Capabilities
T1608.001 - Upload Malware
T1608.002
T1609 - Container Administration Command
T1614
T1614.001
T1620
T1622
T1656
T1680
T1684
T1684.001
T1685
T1685.005
T1686
T1686.002
T1686.003
T1690
TA0002 - Execution
TA0003 - Persistence
TA0004
TA0005 - Defense Evasion
TA0006
TA0007
TA0009
TA0011
TA0034
TA0040
Related Zero-Days 88
CVE-2017-0144
CVE-2017-0145
CVE-2017-0199
CVE-2018-0802
CVE-2018-8174
CVE-2018-8453
CVE-2019-0708
CVE-2019-5591
CVE-2020-1380
CVE-2020-1472
CVE-2021-26855
CVE-2021-30657
CVE-2021-34527
CVE-2021-41773
CVE-2021-44228
CVE-2022-0609
CVE-2022-21882
CVE-2022-22965
CVE-2022-30190
CVE-2022-3236
CVE-2022-32917
CVE-2022-41040
CVE-2022-41082
CVE-2022-41128
CVE-2022-42475
CVE-2023-0669
CVE-2023-20109
CVE-2023-20198
CVE-2023-22515
CVE-2023-23376
CVE-2023-23397
CVE-2023-27350
CVE-2023-2868
CVE-2023-3079
CVE-2023-33246
CVE-2023-36884
CVE-2023-38831
CVE-2023-46604
CVE-2023-46805
CVE-2023-4966
CVE-2024-0012
CVE-2024-12356
CVE-2024-21338
CVE-2024-21412
CVE-2024-21887
CVE-2024-21893
CVE-2024-23222
CVE-2024-24919
CVE-2024-30051
CVE-2024-3400
CVE-2024-38106
CVE-2024-38112
CVE-2024-38178
CVE-2024-38193
CVE-2024-4040
CVE-2024-43093
CVE-2024-43461
CVE-2024-47575
CVE-2024-4947
CVE-2024-50302
CVE-2024-50623
CVE-2024-5274
CVE-2024-53104
CVE-2024-53197
CVE-2024-7971
CVE-2025-0411
CVE-2025-0994
CVE-2025-21391
CVE-2025-21418
CVE-2025-24200
CVE-2025-24201
CVE-2025-24983
CVE-2025-24984
CVE-2025-24985
CVE-2025-24991
CVE-2025-24993
CVE-2025-26633
CVE-2025-27363
CVE-2025-2783
CVE-2025-43300
CVE-2025-4427
CVE-2025-4428
CVE-2025-55182
CVE-2025-61882
CVE-2025-6218
CVE-2025-7775
CVE-2025-8088
CVE-2025-9491