{"id":9227,"date":"2023-12-14T10:00:27","date_gmt":"2023-12-14T18:00:27","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9227"},"modified":"2024-04-26T13:57:31","modified_gmt":"2024-04-26T20:57:31","slug":"dns-for-early-detection-lazarus-kandykorn","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/","title":{"rendered":"DNS for Early Detection &#8211; LAZARUS KANDYKORN"},"content":{"rendered":"<p>Infoblox\u2019s DNS Early Detection Program utilizes proprietary techniques to identify potentially malicious domains at the earliest opportunity. The program shares our recent analysis of malicious domains disclosed through public OSINT, contrasting it with our preliminary identification of these domains as suspicious.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9236\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-thumbnail.png\" alt=\"\" width=\"325\" height=\"262\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-thumbnail.png 325w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-thumbnail-300x242.png 300w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\" \/><\/p>\n<p>The need for speed is real. Threat actors have refined their techniques, causing most of the potential damage before malicious domains are identified and shared through open source intelligence (OSINT) and the majority of commercial threat intel feeds. Threat actors are capitalizing on the speed of execution, which necessitates an even faster response from defenders.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Every second counts when identifying malicious campaigns and the DNS domains which support them. Infoblox&#8217;s early identification of these malicious domains as suspicious makes them available for blocking weeks, even months, ahead of the data provided in many industry-wide malicious threat intel feeds and OSINT sources.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>The Lazarus Group Releases KandyKorn<\/h3>\n<p><a href=\"https:\/\/attack.mitre.org\/groups\/G0032\" target=\"_blank\" rel=\"noopener\">Lazarus Group<\/a> is a state-sponsored cyber threat group that has been attributed to the North Korean Reconnaissance General Bureau<sup>1,2<\/sup>. The group started activity in approximately 2009 and over many years they have been involved in the theft of many millions of dollars of financial assets as well as the theft of intellectual property and other confidential data. Initially they attacked the South Korean government in Seoul, but have since moved broadly to steal from banks and attack commercial organizations such as Sony Pictures. Targets include the finance industry and potentially healthcare, supply chain management, government related industries, and more.<\/p>\n<p>Malware used by <a href=\"https:\/\/attack.mitre.org\/groups\/G0032\" target=\"_blank\" rel=\"noopener\">Lazarus Group<\/a> correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name <a href=\"https:\/\/attack.mitre.org\/groups\/G0032\" target=\"_blank\" rel=\"noopener\">Lazarus Group<\/a> instead of tracking clusters or subgroups, such as <a href=\"https:\/\/attack.mitre.org\/groups\/G0138\" target=\"_blank\" rel=\"noopener\">Andariel<\/a>, <a href=\"https:\/\/attack.mitre.org\/groups\/G0067\" target=\"_blank\" rel=\"noopener\">APT37<\/a>, <a href=\"https:\/\/attack.mitre.org\/groups\/G0082\" target=\"_blank\" rel=\"noopener\">APT38<\/a>, and <a href=\"https:\/\/attack.mitre.org\/groups\/G0094\" target=\"_blank\" rel=\"noopener\">Kimsuky<\/a>. More information disambiguating Lazarus Group is available within <a href=\"https:\/\/attack.mitre.org\/groups\/G0032\/\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK<\/a>.<\/p>\n<p>KandyKorn is a highly sophisticated and dangerously formidable remote access trojan (RAT). Lazarus Group\u2019s use of the KandyKorn malware tool highlights the group\u2019s continued build-out of sophisticated tools and growing dangers of their cyberattacks. The KandyKorn campaign utilizes Python scripts to directly target blockchain software engineers using the MacOS. A very detailed analysis of this attack and the indicators of compromise (\u201cobservables\u201d) were published in OSINT on October 31, 2023<sup>3<\/sup>.<\/p>\n<h3>Anatomy of the Attack &#8211; Lazarus KandyKorn<\/h3>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Stage 0: <\/strong>Social engineering blockchain engineers via conversations on Discord which loads Watcher.py<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Using Discord and leveraging social engineering, programmers and engineers are tricked into downloading a malicious Python application. As we see all of the time, users are manipulated by social engineering to participate in the early stages of the Cyber Kill Chain<sup>4<\/sup>. This Python application appears as a crypto arbitrage bot which enables users to profit from cryptocurrency rate differences between various platforms. This arbitrage bot was acquired by downloading <strong>Cross-Platform Bridges.zip<\/strong>. Malicious links are hosted on a google drive. The malicious app\u2019s Main.py script imports <strong>Watcher.py<\/strong>.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Stage 1: <\/strong>Watcher.py checks the Python version and then runs testSpeed.py and acquires FinderTools<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>TestSpeed.pydownloads and executes FinderTools. Once execution is complete, testSpeed.py is removed. The <strong>FinderTools<\/strong> are saved as \/Users\/Shared\/FinderTools.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Stage 2: <\/strong>FinderTools now run SUGARLOADER<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>After a series of complex activities the Cyber Kill Chain is well underway. <strong>SUGARLOADER <\/strong>is an executable that finds and identifies a config file required for KandyKorn execution. After successfully acquiring the config file, the FinderTool connects to the <strong>C2 malicious domain tp-globa[.]xyz<\/strong>.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center; color: #00e2ec;\"><strong>C2 Malicious DNS Domain: <\/strong>tp-globa[.]xyz identified and blocked by Infoblox within 3 days of the WHOIS date<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This malicious C2 domain <strong>tp-globa[.]xyz<\/strong> is a key component of the KandyKorn Cyber Kill Chain. This malicious domain, when researched in Infoblox Dossier, shows a WHOIS date of August 13, 2023 and being identified and blocked by Infoblox as a suspicious domain on August 15, 2023. The estimated release via OSINT is October 31, 2023.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Stage 3: <\/strong>SUGARLOADER downloads HLOADER<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Assuming that the C2 malicious DNS domain <strong>tp-globa[.]xyz was not blocked<\/strong> the complex Kill Chain continues to unfold with the inclusion of a clever and stealthy persistence mechanism. Apple\u2019s login item monitoring remains unaware of the techniques being used.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Stage 4: <\/strong>KandyKorn Payload is delivered &#8211; Game Over!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>SUGARLOADER fetches and runs KandyKorn. KandyKorn is the final step in the Kill Chain and can now access and exfiltrate targeted data from the victim\u2019s computer. GAME OVER! Your organization may suffer financial loss, the theft and exposure of valuable intellectual property, or worse.<\/p>\n<p>KandyKorn has a wide variety of ways to monitor and avoid detection which make it even more dangerous. In one observed technique, KandyKorn uses reflective loading which is a direct-memory form of execution that may bypass detections. Reflective loading allows threat actors to deliver malicious payloads and malware on victim\u2019s systems, without leaving behind critical forensic artifacts such as files on disk.<\/p>\n<p>Note that Infoblox threat intelligence identified the critical malicious domain<strong> tp-globa[.]xyz<\/strong>, essential to execution of the Kill Chain, as suspicious 76 days or well over 2 months ahead of its identification and release as malicious in OSINT. This malicious domain is an essential component of the KandyKorn Kill Chain. The identification and subsequent blocking by the Infoblox ecosystem of this one (1) domain would stop the KandyKorn Kill Chain immediately.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Infoblox identified the KandyKorn C2 tp-globa[.]xyz malicious domain as suspicious 76 days or well over 2 months ahead of the identification and release of this domain as malicious in OSINT. This enabled our customers to block it and stop execution of the KandyKorn Kill Chain.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>There have been many malicious domains attributed to Lazarus Group over time. The domains highlighted in this blog include most of those identified in recent OSINT analysis published approximately on October 31, 2023.<\/p>\n<h3>Supporting Analysis and Methodology<\/h3>\n<p>On October 31, 2023, data on newly identified KandyKorn kill chain and critical domains was published in OSINT. The Infoblox team analyzed them to determine if they were identified earlier by our suspicious domain feeds.<\/p>\n<p>The critical domain in the KandyKorn Cyber Kill Chain, <strong>tp-globa[.]xyz<\/strong>, which was identified in OSINT was researched in the Infoblox Dossier portal by our team. We reviewed our timeline feature to extract the earliest dates associated with Infoblox suspicious designation. We also extracted the WHOIS information for additional context.<\/p>\n<p>The conclusions of our analysis were definitive. <strong>The C2 domain which is a critical path component of the KandyKorn Kill Chain<\/strong> was identified as suspicious by Infoblox threat intelligence <strong>76 days<\/strong> prior to the availability of the OSINT designation as malicious.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9234\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-pic-1.png\" alt=\"\" width=\"641\" height=\"392\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-pic-1.png 641w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-pic-1-300x183.png 300w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/p>\n<p>It is often the case that OSINT publication dates may sometimes be unclear or lack precision. The dates of published articles by reputable 3rd parties may not always accurately reflect the OSINT availability of each individual domain as identified by their threat researchers.<\/p>\n<p>To provide context on the performance of our suspicious threat intel feeds we extracted the WHOIS date and found that <strong>the same KandyKorn domain was blocked as suspicious within 3 days after the WHOIS domain registration date<\/strong>. The WHOIS dates are almost always precise and provide another perspective on the high value of suspicious threat intel feed content.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9235\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-pic-2.png\" alt=\"\" width=\"639\" height=\"394\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-pic-2.png 639w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-lazarus-kandykorn-pic-2-300x185.png 300w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Infoblox finds potentially malicious DNS domains faster. Infoblox identified the KandyKorn C2 tp-globa[.]xyz malicious domain as suspicious within 3 days of the domain\u2019s registration date in WHOIS. <\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Per the U.S. National Security Agency (NSA), Protective DNS, such as that offered by Infoblox, would reduce the ability for 92% of malware attacks both from command and control perspective, deploying malware on a given network.<\/p>\n<p>So, if you rapidly identify and block access to the C2 domain <strong>tp-globa[.]xyz<\/strong> then the KandyKorn Kill Chain is shut down. This can happen days, weeks, or even months before information on KandyKorn is publicly available in OSINT sources.<\/p>\n<p>There were quite a few related domains and campaign intersections identified within OSINT. This may be based upon data on the TLS certificate which is then used as a pivot point to learn more about these related, and often malicious domains. For example, we found this as used in a related Lazarus campaign:<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center; color: #00e2ec;\"><strong>Related C2 Malicious DNS Domain: pro-tokyo[.]top <\/strong>identified and blocked by Infoblox on July 23, 2023.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The WHOIS date for the malicious <strong>pro-tokyo[.]top<\/strong> domain was July 18, 2023 and it showed up in Twitter posting in OSINT on July 30, 2023<sup>5<\/sup>. This source on Twitter might have been announced, but still unobserved, by many threat researchers and defenders.<\/p>\n<p>Recognize that attack groups like Lazarus are continually creating and changing the domains they use to camouflage their attacks. All of the key domains used in delivering the KandyKorn RAT may be shut down in just a few days and replaced with something new. You can see the tangible advantages Infoblox early DNS Detection threat intelligence can bring to your organization.<\/p>\n<h3>Risk Reduction and Return on Investment<\/h3>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>Infoblox\u2019s suspicious domain data can help our customers avoid a potentially devastating data breach by the Lazarus Group leveraging tools such as KandyKorn. Suspicious domain data can reduce risk and increase the return on investment for your threat intelligence program.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The use of our proprietary technology to identify suspicious domains is a major \u201cShift Left\u201d to normal processes used across the industry to develop and leverage DNS threat intelligence information. Infoblox suspicious domain data helps security operations teams gain the timely information they need to better address and defeat the barrage of new threats before they can cause harm.<\/p>\n<h3>For Additional Information<\/h3>\n<p>The Infoblox Threat Intelligence Group provides fast access to accurate, contextual threat alerts and reports sourced from our own real-time research teams. Suspicious Domains feeds were introduced as an Infoblox proprietary product on November 10, 2022 and, since then, have successfully provided many thousands of customers with the advanced information to block domains which ultimately become malicious long before most other threat intelligence sources identify them as malicious. Infoblox allows your team to leverage the high value of suspicious domain threat intelligence while ensuring unified security policy across your entire security infrastructure. Infoblox threat data minimizes false positives, so you can be confident in what you are blocking.<\/p>\n<p>To learn more about suspicious domains and DNS early detection:<br \/>\n<a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.infoblox.com\/threat-intel\/<\/a><\/p>\n<p>To learn more about BloxOne Threat Defense:<br \/>\n<a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/ <\/a><\/p>\n<p>To learn more about Advanced DNS Protection:<br \/>\n<a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/ <\/a><\/p>\n<p>To learn more about the National Security Agency (NSA) and Cybersecurity &amp; Infrastructure Security Agency (CISA) guidance on Protective DNS:<br \/>\n<a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF\" target=\"_blank\" rel=\"noopener\">https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF<\/a><\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2017\/06\/13\/hidden-cobra-north-koreas-ddos-botnet-infrastructure\" target=\"_blank\" rel=\"noopener\"><b>https:\/\/www.cisa.gov\/news-events\/alerts\/2017\/06\/13\/hidden-cobra-north-koreas-ddos-botnet-infrastructure<\/b><\/a><\/li>\n<li><a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/sm774\" target=\"_blank\" rel=\"noopener\"><b>https:\/\/home.treasury.gov\/news\/press-releases\/sm774<\/b><\/a><\/li>\n<li><a href=\"https:\/\/www.elastic.co\/security-labs\/elastic-catches-dprk-passing-out-kandykorn\" target=\"_blank\" rel=\"noopener\"><b>https:\/\/www.elastic.co\/security-labs\/elastic-catches-dprk-passing-out-kandykorn<\/b><\/a><\/li>\n<li><a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\" target=\"_blank\" rel=\"noopener\"><b>https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html<\/b><\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/TLP_R3D\/status\/1685581711139102720\" target=\"_blank\" rel=\"noopener\"><b>https:\/\/twitter.com\/TLP_R3D\/status\/1685581711139102720<\/b><\/a><\/li>\n<\/ol>\n<style>\n.calloutbox, .domainbox {\n    margin-bottom: 20px;\n}\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Infoblox\u2019s DNS Early Detection Program utilizes proprietary techniques to identify potentially malicious domains at the earliest opportunity. The program shares our recent analysis of malicious domains disclosed through public OSINT, contrasting it with our preliminary identification of these domains as suspicious. The need for speed is real. Threat actors have refined their techniques, causing most [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":9938,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[958,959,40,780,940,941,30,32,307,189,942,943,838],"class_list":{"0":"post-9227","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-kandykorn","9":"tag-lazarus","10":"tag-threat-intelligence","11":"tag-threat-intel","12":"tag-osint","13":"tag-threat-hunting","14":"tag-dns","15":"tag-malware","16":"tag-phishing","17":"tag-cybersecurity","18":"tag-threat-assessment","19":"tag-digital-investigation","20":"tag-security-operations","21":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox<\/title>\n<meta name=\"description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T18:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:57:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"DNS for Early Detection &#8211; LAZARUS KANDYKORN\",\"datePublished\":\"2023-12-14T18:00:27+00:00\",\"dateModified\":\"2024-04-26T20:57:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/\"},\"wordCount\":1788,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg\",\"keywords\":[\"KandyKorn\",\"Lazarus\",\"Threat Intelligence\",\"Threat Intel\",\"OSINT\",\"Threat hunting\",\"DNS\",\"Malware\",\"Phishing\",\"Cybersecurity\",\"Threat assessment\",\"Digital Investigation\",\"Security Operations\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/\",\"name\":\"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg\",\"datePublished\":\"2023-12-14T18:00:27+00:00\",\"dateModified\":\"2024-04-26T20:57:31+00:00\",\"description\":\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg\",\"width\":612,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-for-early-detection-lazarus-kandykorn\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS for Early Detection &#8211; LAZARUS KANDYKORN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox","description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/","og_locale":"en_US","og_type":"article","og_title":"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox","og_description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/","og_site_name":"Infoblox Blog","article_published_time":"2023-12-14T18:00:27+00:00","article_modified_time":"2024-04-26T20:57:31+00:00","og_image":[{"width":612,"height":405,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_title":"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox","twitter_description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"DNS for Early Detection &#8211; LAZARUS KANDYKORN","datePublished":"2023-12-14T18:00:27+00:00","dateModified":"2024-04-26T20:57:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/"},"wordCount":1788,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg","keywords":["KandyKorn","Lazarus","Threat Intelligence","Threat Intel","OSINT","Threat hunting","DNS","Malware","Phishing","Cybersecurity","Threat assessment","Digital Investigation","Security Operations"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/","name":"DNS Early Detection - Lazarus KandyKorn - Malicious DNS in the News | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg","datePublished":"2023-12-14T18:00:27+00:00","dateModified":"2024-04-26T20:57:31+00:00","description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-for-early-detection-lazarus-kandykorn-thumbnail.jpg","width":612,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-for-early-detection-lazarus-kandykorn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"DNS for Early Detection &#8211; LAZARUS KANDYKORN"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9227"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9227\/revisions"}],"predecessor-version":[{"id":9962,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9227\/revisions\/9962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9938"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}