{"id":15784,"date":"2025-09-10T09:21:28","date_gmt":"2025-09-10T09:21:28","guid":{"rendered":"\/cybersecurity-blog\/?p=15784"},"modified":"2025-09-23T13:42:21","modified_gmt":"2025-09-23T13:42:21","slug":"lazarus-group-attacks-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/","title":{"rendered":"Lazarus Group Attacks in 2025: Here&#8217;s Everything SOC Teams Need to Know\u00a0"},"content":{"rendered":"\n<p>The Lazarus Group, North Korea\u2019s state-sponsored hacking collective, has held the title of the most notorious advanced persistent threat (APT) for almost two decades now. In 2025, it escalated its cyber operations, targeting tech industries with fake IT workers, fraudulent job interviews, and hijacked open-source software.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It\u2019s time to take a closer look at its current activities and see how SOC teams can proactively detect and track the group attacks using <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s solutions<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Biggest Lazarus Group Campaigns So Far&nbsp;<\/h2>\n\n\n\n<p>Lazarus\u2019s 2025 campaigns combine sophisticated social engineering and supply chain attacks, posing severe risks to businesses\u2019 financial stability, data security, and operational continuity.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">North Korean IT Workers&nbsp;<\/h3>\n\n\n\n<p>Since 2024, Lazarus Group has been deploying North Korean operatives posing as legitimate remote IT workers to infiltrate companies, particularly in the U.S. and UK. Using stolen or AI-enhanced identities, these operatives secure tech roles to steal sensitive data, deploy malware, or generate illicit revenue for North Korea.&nbsp;<\/p>\n\n\n\n<p>According to the U.S. Department of Justice, these schemes compromised over 100 U.S. companies, including Fortune 500 firms. For example, an Atlanta-based blockchain company lost over <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-coordinated-nationwide-actions-combat-north-korean-remote\" target=\"_blank\" rel=\"noreferrer noopener\">$900,000<\/a> in virtual currency due to insider access by fake IT workers.&nbsp;<\/p>\n\n\n\n<p>Beyond financial losses, businesses face reputational damage, loss of intellectual property, and regulatory scrutiny for hiring vulnerabilities. Extortion attempts, where operatives hold stolen data hostage, further disrupt operations and erode customer trust.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-1024x579.png\" alt=\"\" class=\"wp-image-15817\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-1024x579.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-1536x868.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-2.png 1842w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>PyLangGhost, malware operated by Lazarus, analyzed in ANY.RUN&#8217;s Interactive Sandbox<\/em> <\/figcaption><\/figure><\/div>\n\n\n<p>To detect such attacks early, SOC teams require a reliable solution for proactive analysis of suspicious files and URLs. <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a> provides a fast, isolated, and hands-on way to expose malware and phishing in seconds.&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nBoost detection rate of evasive malware and phishing<br>Analyze threats inside a <span class=\"highlight\">fully interactive<\/span> sandbox\u00a0 &nbsp;  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lazarus_attacks_25&#038;utm_term=100925&#038;utm_content=linktoregistration#register\" target=\"_blank\" rel=\"noopener\">\nGet started\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Operation 99: Fake Job Interviews (Contagious Interview)&nbsp;<\/h3>\n\n\n\n<p>Operation 99 (aka \u201cContagious Interview\u201d) is a campaign from Lazarus and its subgroups like <a href=\"https:\/\/any.run\/cybersecurity-blog\/pylangghost-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Famous Chollima<\/a> that targets tech, crypto developers and CEOs, with fake job and partnership interviews.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Posing as <a href=\"https:\/\/quetzal.bitso.com\/p\/interview-with-the-chollima\" target=\"_blank\" rel=\"noreferrer noopener\">recruiters on LinkedIn<\/a>, Telegram, or Calendly, Lazarus lures victims with fraudulent coding tests hosted on malicious GitLab repositories. As part of the scheme, Lazarus hackers utilize NPM packages.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For C-suite targets, criminals typically share fake Zoom executables and malware disguised as other software widely used in corporate environments.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"667\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-1024x667.png\" alt=\"\" class=\"wp-image-15791\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-1024x667.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-300x195.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-768x500.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-370x241.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-270x176.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1-740x482.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image1.png 1456w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Example of a fake job proposal from a Lazarus operative. Source: Mauro Eldritch, Bitso Quetzal Team\u2019s Medium<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The common losses for victims include stolen cryptocurrency and credentials, compromised systems, and disrupted operations. In some cases, device infections led to downstream supply chain attacks, affecting customers and partners. Crypto and tech firms rely on skilled developers, making them prime targets for social engineering. These attacks disrupt product development, expose proprietary code, and undermine trust in hiring processes, while recovery costs (e.g., system remediation, legal fees) strain budgets.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hijacking Open Source Packages&nbsp;<\/h3>\n\n\n\n<p>Despite doing it since September 2024, Lazarus Group continues to embed malicious backdoors in cloned open-source software packages on repositories like GitHub and PyPI, targeting developers in both medium and large enterprises. Over <a href=\"https:\/\/cybersecuritynews.com\/lazarus-hackers-weaponized-234-packages\/\" target=\"_blank\" rel=\"noreferrer noopener\">230 malicious packages<\/a> have been identified since the start of 2025, affecting 36,000 firms in Europe, India, and Brazil.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Victims face losses from stolen credentials, authentication tokens, and system data, with recovery costs exceeding millions. Open-source software is critical to tech and crypto industries.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Given that many IT companies work in tight cooperation, a successful attack on an endpoint at one firm can lead to major incidents in other businesses down the supply chain. A notable example here is the <a href=\"https:\/\/www.wilsoncenter.org\/article\/bybit-heist-what-happened-what-now\" target=\"_blank\" rel=\"noreferrer noopener\">$1.5 billion ByBit hack<\/a> orchestrated by Lazarus.&nbsp;<\/p>\n\n\n\n<p>The initial compromise occurred on a developer\u2019s machine at Safe{Wallet}, a multisignature provider used by ByBit, through a malicious Docker project. From there, the attackers gained access to Safe{Wallet}\u2019s Amazon Web Services (AWS) S3 bucket and managed to push a malicious script to the system. This resulted in ByBit\u2019s transaction being hijacked and the funds funneled to a wallet controlled by Lazarus Group.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Current Lazarus Malware Threats and How to Detect Them&nbsp;<\/h2>\n\n\n\n<p>Lazarus\u2019s 2025 operations leverage advanced malware and TTPs, tailored to maximize damage to businesses through data theft, system compromise, and financial extortion.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s take a look at several examples of malware families employed by Lazarus Group in their attacks and see how sandboxing simplifies their identification.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">InvisibleFerret&nbsp;<\/h3>\n\n\n\n<p>InvisibleFerret is a modular malware often deployed by Lazarus hackers via fake job interviews, capable of keylogging, screen capturing, and establishing persistent C2 connections to steal sensitive data.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/invisibleferret-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read technical analysis of InvisibleFerret<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-1024x577.png\" alt=\"\" class=\"wp-image-15792\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-1536x866.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2.png 1838w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis of an InvisibleFerret sample inside ANY.RUN\u2019s Interactive Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>InvisibleFerret compromises developer endpoints, exposing proprietary code and client data.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"613\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-1024x613.png\" alt=\"\" class=\"wp-image-15793\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-1024x613.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-300x180.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-768x460.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-370x222.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-270x162.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3-740x443.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image3.png 1489w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN highlights malicious actions of InvisibleFerret on the system<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>As shown in a <a href=\"https:\/\/app.any.run\/tasks\/1951b184-a2fe-4cff-9999-cea0320910d4\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">sandbox analysis session<\/a>, the malware engages in several activities on an infected system, such as attempting to connect to an unusual port. <\/p>\n\n\n\n<p>In a business setting, armed with this knowledge, SOCs can act proactively and prevent the incident, keeping the network safe.&nbsp;<\/p>\n\n\n\n<!-- Highlight Block HTML START -->\n<div class=\"window\">\n  <div class=\"window-header\">\n    <div class=\"pill\">\u261d\ufe0f How Interactive Sandbox boosts SOCs  <\/div>\n  <\/div>\n  <div class=\"window-body\">\n    <ul>\n      <li>Higher detection rate with deep insights into threat behavior.<\/li>\n      <li>Shorter MTTR with fast identification of malware and detailed reports for informed mitigation. <\/li>\n<li>Reduced manual effort with analysis automation.<\/li>\n    <\/ul>\n  <\/div>\n<\/div>\n<!-- Highlight Block HTML END -->\n\n\n<!-- Highlight Block CSS START -->\n<style>\n  .window {\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n\n    border-radius: 4px;\n    margin: 20px auto 50px auto;\n    padding: 20px 40px;\n    line-height: 2rem;\n  }\n\n  .window-header {\n    display: flex;\n    justify-content: center;\n    margin-bottom: 20px;\n  }\n\n  .pill {\n    background-color: #fff;\n    border-radius: 20px;\n    color: #333;\n    font-weight: bold;\n    padding: 8px 32px;\nborder: 1px solid rgba(75, 174, 227, 0.32);\n  }\n\n  @media (max-width: 480px) {\n    .window {\n      padding: 10px;\n    }\n    \n    .pill {\n      font-size: 14px;\n      padding: 6px 12px;\n    }\n  }\n<\/style>\n<!-- Highlight Block CSS END -->\n\n\n\n<h3 class=\"wp-block-heading\">OtterCookie&nbsp;<\/h3>\n\n\n\n<p>OtterCookie is a malware which is often embedded in hijacked open-source packages. It is used as part of the Contagious Interview campaign to extract authentication tokens, session data, and crypto wallets. Stolen tokens allow attackers to bypass authentication, access corporate systems, or customer accounts.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/ottercookie-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read technical analysis of OtterCookie<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-1024x579.png\" alt=\"\" class=\"wp-image-15795\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-1024x579.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-1536x868.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image4-1.png 1842w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>OtterCookie malware analysis inside ANY.RUN\u2019s Interactive Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Thanks to the <a href=\"https:\/\/app.any.run\/tasks\/53ff914c-7b67-481a-a4ea-68a275dcdf7f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analysis inside ANY.RUN\u2019s Interactive Sandbox<\/a>, we can observe the entire attack chain for this malware.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-1024x582.png\" alt=\"\" class=\"wp-image-15796\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-1024x582.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-768x436.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-1536x872.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5-740x420.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image5.png 1845w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>OtterCookie payload being downloaded from an external server<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The sandbox session shows that attackers use a fake error and a try\/catch block to download and run a piece of malicious code responsible for deploying OtterCookie on the system. This is an evasion technique which may escape detection by signature-based solutions.&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDiscover attacks on your business before the damage is done<br>Cut MTTD and response time with <span class=\"highlight\">proactive sandbox analysis<\/span>&nbsp;  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lazarus_attacks_25&#038;utm_term=100925&#038;utm_content=linktodemo\" target=\"_blank\" rel=\"noopener\">\nRequest 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>With ANY.RUN\u2019s advanced threat tracking, we get notified about the malicious activity and can stop the attack early, keeping our company\u2019s infrastructure secure and free from disruptions.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PyLangGhost RAT&nbsp;<\/h3>\n\n\n\n<p>PyLangGhost is a relatively new remote access trojan from Lazarus APT. Delivered via fake interviews or malicious packages, it enables long-term espionage and data theft, compromising trade secrets and customer data. As a result of its activities, businesses may face prolonged downtime during remediation and regulatory fines for data breaches.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/pylangghost-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read technical analysis of OtterCookie<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"844\" height=\"444\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6.png\" alt=\"\" class=\"wp-image-15797\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6.png 844w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6-300x158.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6-768x404.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6-370x195.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6-270x142.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image6-740x389.png 740w\" sizes=\"(max-width: 844px) 100vw, 844px\" \/><figcaption class=\"wp-element-caption\"><em>A fake error, prompting the user to run a command. Source: BlockOSINT<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The malware has been observed in attacks involving the use of the <a href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-august-2025\/#rhadamanthys-stealer-delivered-via-clickfix-with-png-steganography-15633\" target=\"_blank\" rel=\"noreferrer noopener\">ClickFix tactic<\/a>, a trick that presents victims with a fake page instructing them to run a malicious script on their system as a way to solve an error or verify their identity.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-1024x579.png\" alt=\"\" class=\"wp-image-15798\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-1024x579.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-1536x868.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image7.png 1842w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Interactive Sandbox lets analysts run the malicious script to ensure full detection<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In the case of PyLangGhost, users were often asked to paste and run a command on their computer to fix an issue with their camera. Using the <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactivity of ANY.RUN\u2019s sandbox<\/a>, we can manually perform these actions in an isolated, cloud-based virtual environment to trigger the threat\u2019s execution. The result is a malware being installed on the system, as you can see in the <a href=\"https:\/\/app.any.run\/tasks\/275e3573-0b3e-4e77-afaf-fe99b935c510\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analysis<\/a>.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"531\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-1024x531.png\" alt=\"\" class=\"wp-image-15799\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-1024x531.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-300x155.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-768x398.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-1536x796.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-370x192.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-270x140.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8-740x384.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image8.png 1557w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Interactive Sandbox detects PyLangGhost and its activities in seconds<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The sandbox marks the processes spawned by the threat as malicious, providing analysts with a definitive and actionable verdict for instant incident resolution.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-1024x731.png\" alt=\"\" class=\"wp-image-15800\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-1024x731.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-300x214.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-768x548.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-370x264.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-270x193.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9-740x528.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image9.png 1358w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Interactive Sandbox collects and displays all IOCs collected during analysis<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Once the investigation is over, we can collect the indicators of compromise (IOCs) gathered by ANY.RUN and use them to create detection rules to spot future attacks in advance.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Identify and Track Lazarus Attacks with Threat Intelligence&nbsp;<\/h2>\n\n\n\n<p>To keep up with the evolution of Lazarus Group\u2019s attacks, we can utilize <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Threat Intelligence Lookup<\/a>. It is a <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-lookup-new-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">free-access database<\/a> of the latest <a href=\"https:\/\/any.run\/cybersecurity-blog\/iocs-iobs-ioas-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">indicators of compromise<\/a>, behavior (IOBs), and attack (IOAs). This data is extracted from live sandbox analyses of active malware and phishing attacks across <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 SOCs<\/a>, ensuring the indicators are fresh and available quickly after an attack.&nbsp;<\/p>\n\n\n\n<p>To see examples of Lazarus Group\u2019s recent attacks, we can start with a simple query:&nbsp;<br><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktolookup#%7B%2522query%2522:%2522threatName:%255C%2522lazarus%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;lazarus&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-1024x574.png\" alt=\"\" class=\"wp-image-15801\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-1024x574.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-300x168.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-768x431.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-1536x862.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-270x151.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10-740x415.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image10.png 1847w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Lookup provides fresh sandbox reports on Lazarus attacks<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The service provides us with a list of sandbox sessions with threats attributed to the Lazarus APT. This provides us with rich context about the current malware families, TTPs, and campaigns run by the group. For example, as visible from a <a href=\"https:\/\/app.any.run\/tasks\/a27ac4c6-37ea-48de-8937-56f9e58b114d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">report from August 17<\/a>, the OtterCookie malware is still in use.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-1024x580.png\" alt=\"\" class=\"wp-image-15802\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-1024x580.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-1536x870.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11-740x419.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image11.png 1842w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata IDS rule identifying OtterCookie triggered inside ANY.RUN\u2019s Interactive Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We can dive deeper into each report to collect actionable indicators for detection rules and see what threats the North Korean hackers are using right now.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEnrich investigations with live attack data\u00a0\n\n<br>from threat analyses <span class=\"highlight\">across 15K SOCs <\/span>\u00a0 &nbsp;  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lazarus_attacks_25&#038;utm_term=100925&#038;utm_content=linktolookup\" target=\"_blank\" rel=\"noopener\">\nTry TI Lookup\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>With TI Lookup, SOC teams can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Accelerated Response<\/strong>: Reduce MTTR by quickly understanding threat behavior, objectives, and targets through sandbox analysis.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enriched Threat Investigations<\/strong>: Gain deeper insight into threats by connecting existing artifacts with real-world attacks.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stronger Proactive Defense<\/strong>: Gather intelligence on emerging threats to act before they cause damage.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improved Detection Rules<\/strong>: Leverage intelligence from TI Lookup to refine SIEM, IDS\/IPS, and EDR rules for stronger proactive defense.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>Over 500,000 cybersecurity professionals and 15,000+ companies in finance, manufacturing, healthcare, and other sectors rely on <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> to streamline malware investigations worldwide.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Speed up triage and response by detonating suspicious files in <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a>, observing malicious behavior in real time, and gathering insights for faster, more confident security decisions. Paired with <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> and <a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>, it provides actionable data on cyberattacks to improve detection and deepen your understanding of evolving threats.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus_attacks_25&amp;utm_term=100925&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Explore more ANY.RUN\u2019s capabilities during 14-day trial\u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Lazarus Group, North Korea\u2019s state-sponsored hacking collective, has held the title of the most notorious advanced persistent threat (APT) for almost two decades now. In 2025, it escalated its cyber operations, targeting tech industries with fake IT workers, fraudulent job interviews, and hijacked open-source software.&nbsp;&nbsp; It\u2019s time to take a closer look at its [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15803,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40],"class_list":["post-15784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lazarus Group Attacks in 2025: Overview for SOC Teams<\/title>\n<meta name=\"description\" content=\"Discover the current campaigns and malware of Lazarus Group and learn to detect its attacks in your SOC.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Lazarus Group Attacks in 2025: Here&#8217;s Everything SOC Teams Need to Know\u00a0\",\"datePublished\":\"2025-09-10T09:21:28+00:00\",\"dateModified\":\"2025-09-23T13:42:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/\"},\"wordCount\":1764,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/\",\"name\":\"Lazarus Group Attacks in 2025: Overview for SOC Teams\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-09-10T09:21:28+00:00\",\"dateModified\":\"2025-09-23T13:42:21+00:00\",\"description\":\"Discover the current campaigns and malware of Lazarus Group and learn to detect its attacks in your SOC.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lazarus Group Attacks in 2025: Here&#8217;s Everything SOC Teams Need to Know\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lazarus Group Attacks in 2025: Overview for SOC Teams","description":"Discover the current campaigns and malware of Lazarus Group and learn to detect its attacks in your SOC.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Lazarus Group Attacks in 2025: Here&#8217;s Everything SOC Teams Need to Know\u00a0","datePublished":"2025-09-10T09:21:28+00:00","dateModified":"2025-09-23T13:42:21+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/"},"wordCount":1764,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/","name":"Lazarus Group Attacks in 2025: Overview for SOC Teams","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-09-10T09:21:28+00:00","dateModified":"2025-09-23T13:42:21+00:00","description":"Discover the current campaigns and malware of Lazarus Group and learn to detect its attacks in your SOC.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-attacks-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Lazarus Group Attacks in 2025: Here&#8217;s Everything SOC Teams Need to Know\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15784"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=15784"}],"version-history":[{"count":10,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15784\/revisions"}],"predecessor-version":[{"id":15968,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15784\/revisions\/15968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/15803"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=15784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=15784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=15784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}