{"id":7897,"date":"2022-07-19T14:29:54","date_gmt":"2022-07-19T21:29:54","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7897"},"modified":"2022-07-12T14:41:13","modified_gmt":"2022-07-12T21:41:13","slug":"lazarus-group-targets-financial-services-and-cryptocurrency-sector","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/","title":{"rendered":"Lazarus Group Targets Financial Services and Cryptocurrency Sector"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The advisory has noted that North Korean cyber actors are targeting a variety of organizations in the blockchain technology and cryptocurrency industry, including cryptocurrency exchanges, decentralized finance (DeFi) protocols, play-to-earn cryptocurrency video games, cryptocurrency trading companies, venture capital funds investing in cryptocurrency, and individual holders of large amounts of cryptocurrency or valuable non-fungible tokens (NFTs).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The activity described in this advisory involves social engineering of victims using a variety of communication platforms to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. The cyber actors then use the applications to gain access to the victim\u2019s computer, propagate malware across the victim\u2019s network environment, and steal private keys or exploit other security gaps. These activities enable additional follow-on activities that initiate fraudulent blockchain transactions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Intrusions begin with numerous spearphishing messages sent to employees of cryptocurrency companies. These employees are often working in system administration or software development\/IT operations (DevOps) and are using a variety of communication platforms. The messages often appear as a recruitment effort and offer high-paying jobs to entice the recipients to download malware-laced cryptocurrency applications. These are referred to by the U.S. government as &#8220;TraderTraitor.&#8221; The term TraderTraitor describes a series of malicious applications written using cross-platform JavaScript code with the Node.js runtime environment using the Electron framework. The malicious applications are derived from a variety of open-source projects and purport to be cryptocurrency trading or price prediction tools. TraderTraitor campaigns feature websites with modern design advertising the alleged features of the applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The advisory suggests several mitigations to protect potentially targeted organizations in infrastructure, the financial sector, and in the blockchain and cryptocurrency industry. These mitigations include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apply defense-in-depth security strategy.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement patch management.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforce credential requirements and multifactor authentication.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Educate users on social engineering on social media and spearphishing.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement email and domain mitigations.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement endpoint protection security controls.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforce application security.\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Disable macros in office products.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Be aware of third-party downloads, especially those for cryptocurrency applications.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create an incident response plan to respond to possible cyber intrusions.\u00a0<\/span><\/li>\n<\/ul>\n<h3><b>DNS Security Will be Critical to Your Defense<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Over the past few years, it has been documented (<\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0032\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/groups\/G0032\/<\/span><\/a><span style=\"font-weight: 400;\"> MITRE ATT&amp;CK T1583.001) that the Lazarus Group has acquired domains related to their campaigns to act as distribution points and C2 channels. In some cases, the Lazarus Group has obtained SSL certificates for their C2 domains (<\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0032\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/groups\/G0032\/<\/span><\/a><span style=\"font-weight: 400;\"> MITRE ATT&amp;CK T1588.004).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As always, DNS is a common denominator for threat actors and Lazarus Group is not an exception. DNS is frequently used to set up and execute attack chains across the majority of cyberattacks, including those by the Lazarus Group. DNS is often used when an infected system communicates with the threat actors such as Lazarus Group through command and control (C&amp;C) servers. DNS is critical infrastructure that everyone already relies on for connectivity, and can be used to improve your organization\u2019s security posture.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/uscert\/sites\/default\/files\/publications\/AA22-108A-TraderTraitor-North_Korea_APT_Targets_Blockchain_Companies.pdf\"><span style=\"font-weight: 400;\">Click here<\/span><\/a><span style=\"font-weight: 400;\"> for a complete PDF version of this advisory.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can see more information on the Lazarus Group here: <\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0032\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/groups\/G0032\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on North Korean state-sponsored malicious cyber activity, visit <\/span><a href=\"https:\/\/www.us-cert.cisa.gov\/northkorea\"><span style=\"font-weight: 400;\">https:\/\/www.us-cert.cisa.gov\/northkorea<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about DNS security here: <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">To find out more about how Infoblox can help protect your DNS infrastructure, please reach out to us via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-form\/\"><span style=\"font-weight: 400;\">https:\/\/info.infoblox.com\/contact-form\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A June 2021 <\/span><a href=\"https:\/\/info.infoblox.com\/resources-whitepapers-gartner-how-can-organizations-use-dns-to-improve-their-security-posture.html\"><span style=\"font-weight: 400;\">Gartner report<\/span><\/a><span style=\"font-weight: 400;\"> recommends organizations leverage DNS logs for threat detection and forensic purposes with their Security Information and Event Management platforms.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7683\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/shields-up.png\" alt=\"\" width=\"512\" height=\"137\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up-300x80.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Russia\u2019s invasion of Ukraine could impact organizations both within and beyond the region, to include <\/span><a href=\"https:\/\/www.cisa.gov\/uscert\/russia\"><span style=\"font-weight: 400;\">malicious cyber activity<\/span><\/a><span style=\"font-weight: 400;\"> against the U.S. homeland, including as a response to the unprecedented economic costs imposed on Russia by the U.S. and our allies and partners. Evolving intelligence indicates that the Russian Government is exploring options for potential cyberattacks. Every organization\u2014large and small\u2014must be prepared to respond to disruptive cyber incidents. As the nation\u2019s cyber defense agency, CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyberattacks. When cyber incidents are reported quickly, we can use this information to render assistance and as a warning to prevent other organizations and entities from falling victim to a similar attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations should report anomalous cyber activity and\/or cyber incidents 24\/7 to report@cisa.gov or (888) 282-0870.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":4882,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[724,389,445,308,334,725,662,339,726,727,728,313,729],"class_list":{"0":"post-7897","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-lazarus-group","9":"tag-financial-services","10":"tag-cryptocurrency","11":"tag-fbi","12":"tag-cisa","13":"tag-treasury","14":"tag-csa","15":"tag-apt","16":"tag-apt38","17":"tag-bluenoroff","18":"tag-stardust-chollima","19":"tag-north-korea","20":"tag-tradertraitor","21":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Lazarus Group Targets Financial Services and Cryptocurrency Sector<\/title>\n<meta name=\"description\" content=\"Lazarus Group Targets Financial Services and Cryptocurrency Sector. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lazarus Group Targets Financial Services and Cryptocurrency Sector\" \/>\n<meta property=\"og:description\" content=\"Lazarus Group Targets Financial Services and Cryptocurrency Sector. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-19T21:29:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"383\" \/>\n\t<meta property=\"og:image:height\" content=\"254\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Lazarus Group Targets Financial Services and Cryptocurrency Sector\",\"datePublished\":\"2022-07-19T21:29:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/\"},\"wordCount\":827,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"keywords\":[\"Lazarus Group\",\"financial services\",\"cryptocurrency\",\"FBI\",\"CISA\",\"Treasury\",\"CSA\",\"apt\",\"APT38\",\"BlueNoroff\",\"Stardust Chollima\",\"north korea\",\"Tradertraitor\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/\",\"name\":\"Lazarus Group Targets Financial Services and Cryptocurrency Sector\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"datePublished\":\"2022-07-19T21:29:54+00:00\",\"description\":\"Lazarus Group Targets Financial Services and Cryptocurrency Sector. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"width\":383,\"height\":254},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lazarus Group Targets Financial Services and Cryptocurrency Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Lazarus Group Targets Financial Services and Cryptocurrency Sector","description":"Lazarus Group Targets Financial Services and Cryptocurrency Sector. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/","og_locale":"en_US","og_type":"article","og_title":"Lazarus Group Targets Financial Services and Cryptocurrency Sector","og_description":"Lazarus Group Targets Financial Services and Cryptocurrency Sector. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/","og_site_name":"Infoblox Blog","article_published_time":"2022-07-19T21:29:54+00:00","og_image":[{"width":383,"height":254,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Lazarus Group Targets Financial Services and Cryptocurrency Sector","datePublished":"2022-07-19T21:29:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/"},"wordCount":827,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","keywords":["Lazarus Group","financial services","cryptocurrency","FBI","CISA","Treasury","CSA","apt","APT38","BlueNoroff","Stardust Chollima","north korea","Tradertraitor"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/","url":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/","name":"Lazarus Group Targets Financial Services and Cryptocurrency Sector","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","datePublished":"2022-07-19T21:29:54+00:00","description":"Lazarus Group Targets Financial Services and Cryptocurrency Sector. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) issued another joint Cybersecurity Advisory (CSA) focused on the cyber threat associated with cryptocurrency thefts and tactics. This advisory is specific to those tactics and techniques used by a North Korean state-sponsored advanced persistent threat (APT) group since 2020. This group is commonly tracked by the cybersecurity industry as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","width":383,"height":254},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/lazarus-group-targets-financial-services-and-cryptocurrency-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Lazarus Group Targets Financial Services and Cryptocurrency Sector"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7897"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7897\/revisions"}],"predecessor-version":[{"id":7898,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7897\/revisions\/7898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4882"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}