{"id":84373,"date":"2018-02-12T07:30:32","date_gmt":"2018-02-12T15:30:32","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84373"},"modified":"2025-06-02T18:43:12","modified_gmt":"2025-06-03T01:43:12","slug":"lazarus-resurfaces-targets-global-banks-bitcoin-users","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/","title":{"rendered":"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users"},"content":{"rendered":"<p><em>This blog was written with support and contributions provided by Asheer Maholtra, Jessica Saavedra Morales, and Thomas Roccia.<\/em><\/p>\n<p>McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.<\/p>\n<p>This new campaign, dubbed HaoBao, resumes Lazarus\u2019 previous phishing emails, posed as employee recruitment, but now targets Bitcoin users and global financial organizations. When victims open malicious documents attached to the emails, the malware scans for Bitcoin activity and then establishes an implant for long-term data-gathering.<\/p>\n<p>HaoBao targets and never-before-seen implants signal to McAfee ATR an ambitious campaign by Lazarus to establish cryptocurrency cybercrime at a sophisticated level.<\/p>\n<h2><strong>Background<\/strong><\/h2>\n<p>Beginning in 2017, the Lazarus group heavily targeted individuals with spear phishing emails impersonating job recruiters which contained malicious documents. The campaign lasted from April to October and used job descriptions relevant to target organizations, in both English and Korean language. The objective was to gain access to the target\u2019s environment and obtain key military program insight or steal money. The 2017 campaign targets ranged from defense contractors to financial institutions, including crypto currency exchanges, however; much of this fake job recruitment activity ceased months later, with the last activity observed October 22, 2017.<\/p>\n<h2><strong>Analysis<\/strong><\/h2>\n<p>On January 15<sup>th<\/sup> , McAfee ATR discovered a malicious document masquerading as a job recruitment for a Business Development Executive located in Hong Kong for a large multi-national bank. The document was distributed via a Dropbox account at the following URL:<\/p>\n<p style=\"overflow-x: scroll;\">hxxps:\/\/www.dropbox.com\/s\/qje0yrz03au66d0\/JobDescription.doc?dl=1<\/p>\n<p>This is the mark of a new campaign, though it utilizes techniques, tactics and procedures observed in 2017. This document had the last author \u2018Windows User\u2019 and was created January 16, 2018 with Korean language resources. Several additional malicious documents with the same author appeared between January 16 though January 24, 2018.<\/p>\n<figure id=\"attachment_84375\" aria-describedby=\"caption-attachment-84375\" style=\"width: 387px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84375\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png\" alt=\"\" width=\"387\" height=\"316\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Lazarus.png 387w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Lazarus-300x245.png 300w\" sizes=\"auto, (max-width: 387px) 100vw, 387px\" \/><figcaption id=\"caption-attachment-84375\" class=\"wp-caption-text\">Document summary from Virus Total<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84397\" aria-describedby=\"caption-attachment-84397\" style=\"width: 715px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84397\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.54.28-AM.png\" alt=\"\" width=\"715\" height=\"271\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.54.28-AM.png 517w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.54.28-AM-300x114.png 300w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><figcaption id=\"caption-attachment-84397\" class=\"wp-caption-text\">Malicious job recruitment documents<\/figcaption><\/figure>\n<p style=\"text-align: center;\"><em><br \/>\n<\/em>Victims are persuaded to enable content through a notification claiming the document was created in an earlier version of Microsoft Word. The malicious documents then launch an implant on the victim\u2019s system via a Visual Basic macro.<\/p>\n<figure id=\"attachment_84377\" aria-describedby=\"caption-attachment-84377\" style=\"width: 1074px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84377\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture1.png\" alt=\"\" width=\"1074\" height=\"444\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture1.png 1074w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture1-300x124.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture1-768x317.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture1-1024x423.png 1024w\" sizes=\"auto, (max-width: 1074px) 100vw, 1074px\" \/><figcaption id=\"caption-attachment-84377\" class=\"wp-caption-text\">Malicious Microsoft Word document<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84399\" aria-describedby=\"caption-attachment-84399\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84399\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.55.36-AM.png\" alt=\"\" width=\"830\" height=\"173\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.55.36-AM.png 570w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.55.36-AM-300x63.png 300w\" sizes=\"auto, (max-width: 830px) 100vw, 830px\" \/><figcaption id=\"caption-attachment-84399\" class=\"wp-caption-text\">Implants dropped in campaign<\/figcaption><\/figure>\n<p style=\"text-align: left; overflow-x: scroll;\">The document (7e70793c1ca82006775a0cac2bd75cc9ada37d7c) created January 24, 2018 drops and executes an implant compiled January 22, 2018 with the name lsm.exe (535f212b320df049ae8b8ebe0a4f93e3bd25ed79). The implant lsm.exe contacted 210.122.7.129 which also resolves to worker.co.kr.<em>Implants dropped in campaign<\/em><\/p>\n<p style=\"text-align: left; overflow-x: scroll;\">The other malicious document ( a79488b114f57bd3d8a7fa29e7647e2281ce21f6) created January 19, 2018 drops the implant (afb2595ce1ecf0fdb9631752e32f0e32be3d51bb); which is 99% similar-to the lsm.exe implant.<\/p>\n<p>This document was distributed from the following Dropbox URLs:<\/p>\n<ul style=\"overflow-x: scroll;\">\n<li>hxxps:\/\/dl.dropboxusercontent.com\/content_link\/AKqqkZsJRuxz5VkEgcguqNE7Th3iscMsSYvivwzAYuTZQWDBLsbUb7yBdbW2lHos\/file?dl=1<\/li>\n<li>hxxps:\/\/www.dropbox.com\/s\/q7w33sbdil0i1w5\/job description.doc?dl=1<\/li>\n<\/ul>\n<figure id=\"attachment_84378\" aria-describedby=\"caption-attachment-84378\" style=\"width: 1091px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84378\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture2.png\" alt=\"\" width=\"1091\" height=\"457\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture2.png 1091w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture2-300x126.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture2-768x322.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture2-1024x429.png 1024w\" sizes=\"auto, (max-width: 1091px) 100vw, 1091px\" \/><figcaption id=\"caption-attachment-84378\" class=\"wp-caption-text\">HTTP response for job description document<\/figcaption><\/figure>\n<p>This implant (csrss.exe) compiled January 15, 2018 contacts an IP address 70.42.52.80 which resolves to deltaemis.com. We identified that this domain was used to host a malicious document from a previous 2017 campaign targeting the Sikorsky program.<\/p>\n<ul style=\"overflow-x: scroll;\">\n<li>hxxp:\/\/deltaemis.com\/CRCForm\/3E_Company\/Sikorsky\/E4174\/JobDescription.doc<\/li>\n<\/ul>\n<p style=\"overflow-x: scroll;\">A third malicious document (dc06b737ce6ada23b4d179d81dc7d910a7dbfdde) created January 19, 2018 drops e8faa68daf62fbe2e10b3bac775cce5a3bb2999e which is compiled January 15, 2018. This implant communicates to a South Korean IP address 221.164.168.185 which resolves to palgong-cc.co.kr.<\/p>\n<p>McAfee ATR analysis finds the dropped implants have never been seen before in the wild and have not been used in previous Lazarus campaigns from 2017. Furthermore, this campaign deploys a one-time data gathering implant that relies upon downloading a second stage to gain persistence. The implants contain a hardcoded word \u201chaobao\u201d that is used as a switch when executing from the Visual Basic macro.<\/p>\n<h2><strong>Malicious Document Analysis<\/strong><\/h2>\n<p>The malicious document contains two payloads as encrypted string arrays embedded in Visual Basic macro code. The payloads are present as encrypted string arrays that are decrypted in memory, written to disk and launched in sequence (second stage malicious binary launched first and then the decoy document).<\/p>\n<p>The VBA Macro code is self-executing and configured to execute when the OLE document (MS Word doc) is opened (via \u201cSub AutoOpen()\u201d). The AutoOpen() function in the VBA Macro performs the following tasks in the sequence listed:<\/p>\n<ul>\n<li>Decodes the target file path of the second stage binary payload. This file path is calculated based on the current user\u2019s Temp folder location:<\/li>\n<\/ul>\n<p style=\"padding-left: 120px;\">&lt;temp_dir_path&gt;\\.\\lsm.exe<\/p>\n<figure id=\"attachment_84379\" aria-describedby=\"caption-attachment-84379\" style=\"width: 675px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84379\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture3.png\" alt=\"\" width=\"675\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture3.png 675w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture3-300x89.png 300w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><figcaption id=\"caption-attachment-84379\" class=\"wp-caption-text\">VB code to decrypt second stage filepath<\/figcaption><\/figure>\n<ul>\n<li>Decodes the second stage binary in memory and writes it to the %temp%\\.\\lsm.exe file location<\/li>\n<\/ul>\n<figure id=\"attachment_84380\" aria-describedby=\"caption-attachment-84380\" style=\"width: 974px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84380\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture4.png\" alt=\"\" width=\"974\" height=\"452\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture4.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture4-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture4-768x356.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><figcaption id=\"caption-attachment-84380\" class=\"wp-caption-text\">second stage binary (MZ) as an encrypted String Array in the VBA Macro<\/figcaption><\/figure>\n<figure id=\"attachment_84381\" aria-describedby=\"caption-attachment-84381\" style=\"width: 973px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84381\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture5.png\" alt=\"\" width=\"973\" height=\"319\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture5.png 973w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture5-300x98.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture5-768x252.png 768w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><figcaption id=\"caption-attachment-84381\" class=\"wp-caption-text\">second stage binary (MZ) decoded in memory by the VBA Macro<\/figcaption><\/figure>\n<ul>\n<li>After writing the second stage payload to disk the VBA code performs two important actions.\n<ul>\n<li>Runs the second stage payload using cmd.exe. This is done so that the cmd.exe process exists as soon as the payload is launched. This way a process enumeration tool cannot find the parent process =&gt; Smaller footprint.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 90px;\">cmdline for executing the second stage binary:<\/p>\n<p style=\"padding-left: 90px;\">cmd.exe \/c start \/b &lt;temp_dir_path&gt;\\.\\lsm.exe \/haobao<\/p>\n<ul>\n<li>Adds persistence on the system by creating a shortcut in the user\u2019s Startup folder with the correct cmdline arguments:<\/li>\n<\/ul>\n<p style=\"padding-left: 90px;\">Link file command line: &lt;temp_dir_path&gt;\\.\\lsm.exe \/haobao<\/p>\n<p style=\"padding-left: 90px;\">Link File Name: GoogleUpdate.lnk<\/p>\n<figure id=\"attachment_84382\" aria-describedby=\"caption-attachment-84382\" style=\"width: 975px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84382 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture6.png\" alt=\"\" width=\"975\" height=\"305\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture6.png 975w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture6-300x94.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture6-768x240.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><figcaption id=\"caption-attachment-84382\" class=\"wp-caption-text\">Trigger code for executing the second stage binary and establishing persistence<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84383\" aria-describedby=\"caption-attachment-84383\" style=\"width: 974px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84383\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture7.png\" alt=\"\" width=\"974\" height=\"117\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture7.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture7-300x36.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture7-768x92.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><figcaption id=\"caption-attachment-84383\" class=\"wp-caption-text\">LNK file configuration for establishing persistence<\/figcaption><\/figure>\n<ul>\n<li>Once the second stage payload has been launched, the VBA Macro proceeds to display a decoy document to the end user. This decoy document is also stored in the VBA Macro as an encrypted string array (similar to the second stage payload). The decoy document is again written to the user\u2019s temp directory to the following filename\/path:<\/li>\n<\/ul>\n<p style=\"padding-left: 90px;\">&lt;temp_dir_path&gt;\\.\\Job Description.doc<\/p>\n<figure id=\"attachment_84384\" aria-describedby=\"caption-attachment-84384\" style=\"width: 973px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84384\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture8.png\" alt=\"\" width=\"973\" height=\"314\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture8.png 973w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture8-300x97.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture8-768x248.png 768w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><figcaption id=\"caption-attachment-84384\" class=\"wp-caption-text\">Decoy Document decoded in memory by the VBA Macro<\/figcaption><\/figure>\n<ul>\n<li>Once the decoy document has been written to disk, the VBA Macro sets its file attributes to System + Hidden<\/li>\n<li>The decoy document is then opened by the malicious VBA Macro and the original malicious document\u2019s caption is copied over to the decoy document to trick the end user into mistaking the decoy document for the original (malicious) document.<\/li>\n<li>This activity, combined with the fact that the VBA Macro then closes the current (malicious) document, indicates that the VBA Macro aims to trick an unsuspecting user into thinking that the decoy document currently open is the original (malicious) document opened by the user.<\/li>\n<li>Since the decoy document is a benign file and does not contain any macros the victim does not suspect any malicious behavior.<\/li>\n<\/ul>\n<h2><strong>Implant Analysis<\/strong><\/h2>\n<p>As part of the implant initialization activities the implant does the following;<\/p>\n<ul>\n<li>Checks the string passed to it through command line\n<ul style=\"overflow-x: scroll;\">\n<li>\u201c\/haobao\u201d in case of 535f212b320df049ae8b8ebe0a4f93e3bd25ed79<\/li>\n<li>\u201c\/pumpingcore\u201d in case of e8faa68daf62fbe2e10b3bac775cce5a3bb2999e<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If the malware does not find this string in its cmdline arguments, it simply quits without going any further.<\/p>\n<ul>\n<li>Unwraps a DLL into memory and calls its one-and-only import using Reflective DLL injection. DLL information.<\/li>\n<\/ul>\n<p>During our research, we discovered additional variants of the DLL file.<\/p>\n<figure id=\"attachment_84400\" aria-describedby=\"caption-attachment-84400\" style=\"width: 827px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84400\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-10.27.27-AM.png\" alt=\"\" width=\"827\" height=\"123\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-10.27.27-AM.png 612w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-10.27.27-AM-300x45.png 300w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\" \/><figcaption id=\"caption-attachment-84400\" class=\"wp-caption-text\"><br \/>DLL information<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<ul>\n<li>As part of Reflective DLL loading the malware performs the following tasks on the DLL it has unwrapped in memory:\n<ul>\n<li>Copy the unwrapped DLL into new locations in its own memory space.<\/li>\n<li>Build imports required by the DLL (based on the IAT of the DLL)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<figure id=\"attachment_84385\" aria-describedby=\"caption-attachment-84385\" style=\"width: 781px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84385\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture9.png\" alt=\"\" width=\"781\" height=\"1228\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture9.png 781w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture9-191x300.png 191w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture9-768x1208.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture9-651x1024.png 651w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture9-318x500.png 318w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><figcaption id=\"caption-attachment-84385\" class=\"wp-caption-text\">Imports builder code in malware for the DLL imports<\/figcaption><\/figure>\n<ul>\n<li>Call the newly loaded DLL image\u2019s Entry Point (DllMain) with DLL_PROCESS_ATTACH to complete successful loading of the DLL in the malware process.<\/li>\n<\/ul>\n<figure id=\"attachment_84386\" aria-describedby=\"caption-attachment-84386\" style=\"width: 975px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84386\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture10.png\" alt=\"\" width=\"975\" height=\"327\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture10.png 975w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture10-300x101.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture10-768x258.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><figcaption id=\"caption-attachment-84386\" class=\"wp-caption-text\">DLL Entry Point Call from malware to finish loading of the DLL in memory<\/figcaption><\/figure>\n<ul>\n<li>Call the actual malicious export in the DLL named \u201cCoreDn\u201d<\/li>\n<\/ul>\n<figure id=\"attachment_84387\" aria-describedby=\"caption-attachment-84387\" style=\"width: 545px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture11.png\" alt=\"\" width=\"545\" height=\"67\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture11.png 545w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture11-300x37.png 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><figcaption id=\"caption-attachment-84387\" class=\"wp-caption-text\">Hardcoded DLL export name \u201cCoreDn\u201d in malware<\/figcaption><\/figure>\n<p>All the malicious activities described below are performed by the DLL unless specified otherwise.<\/p>\n<h2><strong>Data Reconnaissance<\/strong><\/h2>\n<p>The implant has the capability of gathering data from the victim\u2019s system. The following information will be gathered and sent to the command and control server.<\/p>\n<ul>\n<li>Computer name and currently logged on user\u2019s name, stored in the format<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">&lt;ComputerName&gt; \\ &lt;Username&gt;<\/p>\n<figure id=\"attachment_84388\" aria-describedby=\"caption-attachment-84388\" style=\"width: 619px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84388\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture12.png\" alt=\"\" width=\"619\" height=\"411\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture12.png 619w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture12-300x199.png 300w\" sizes=\"auto, (max-width: 619px) 100vw, 619px\" \/><figcaption id=\"caption-attachment-84388\" class=\"wp-caption-text\">Malware obtaining the computer name and user name<\/figcaption><\/figure>\n<ul>\n<li>List of all processes currently running on the system arranged in format<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">&lt;Process Name&gt;\\r\\n<\/p>\n<p style=\"padding-left: 60px;\">&lt;Process Name&gt;\\r\\n<\/p>\n<p style=\"padding-left: 60px;\">&lt;Process Name&gt;\\r\\n<\/p>\n<p style=\"padding-left: 60px;\">&lt;Process Name&gt;\\r\\n<\/p>\n<figure id=\"attachment_84389\" aria-describedby=\"caption-attachment-84389\" style=\"width: 741px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84389\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture13.png\" alt=\"\" width=\"741\" height=\"1001\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture13.png 741w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture13-222x300.png 222w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture13-370x500.png 370w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><figcaption id=\"caption-attachment-84389\" class=\"wp-caption-text\">Malware collecting process information from endpoint<\/figcaption><\/figure>\n<ul>\n<li>The presence of a specific registry key on the system<\/li>\n<\/ul>\n<p style=\"padding-left: 60px; overflow-x: scroll;\">HKEY_CURRENT_USER\\Software\\Bitcoin\\Bitcoin-Qt<\/p>\n<ul>\n<li>The malware appends an indicator (flag) specifying whether the above registry key was found in the user\u2019s registry:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84390\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture14.png\" alt=\"\" width=\"628\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture14.png 628w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture14-300x138.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p>This key is checked again as part of the command and control communication and is sent as a duplicate value to the command and control in the HTTP POST request as well (explained in the below).<\/p>\n<figure id=\"attachment_84391\" aria-describedby=\"caption-attachment-84391\" style=\"width: 792px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84391\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture15.png\" alt=\"\" width=\"792\" height=\"421\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture15.png 792w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture15-300x159.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture15-768x408.png 768w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><figcaption id=\"caption-attachment-84391\" class=\"wp-caption-text\">Malware checking for the presence of the registry key<\/figcaption><\/figure>\n<h2><strong>Exfiltration<\/strong><\/h2>\n<h4><strong>Preparation<\/strong><\/h4>\n<p>In preparation of the exfiltration of information collected from the endpoint, the malware performs the following activities:<\/p>\n<ul>\n<li>Encode the collected information using a simple byte based XOR operation using the byte key: 0x34.<\/li>\n<li>Base64 encode (standard) the XORed data.<\/li>\n<li>Again, check for the presence of the Registry Key: HKCU\\Software\\Bitcoin\\Bitcoin-Qt<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<h4><strong>Command and Control Server Communication<\/strong><\/h4>\n<p>Once the malware has performed all these activities it sends an HTTP POST request to the CnC server:<\/p>\n<ul>\n<li>www[dot]worker.co.kr for md5 BDAEDB14723C6C8A4688CC8FC1CFE668<\/li>\n<li>www[dot]palgong-cc.co.kr for md5 D4C93B85FFE88DDD552860B148831026<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>In the format:<\/p>\n<p style=\"padding-left: 60px;\">HTTP POST to www[dot]worker.co.kr<\/p>\n<p style=\"padding-left: 60px;\">\/board2004\/Upload\/files\/main.asp?idx=%d&amp;no=%s&amp;mode=%s<\/p>\n<p>OR<\/p>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 60px;\">HTTP POST to www[dot]palgong-cc.co.kr<\/p>\n<p style=\"padding-left: 60px;\">\/html\/course\/course05.asp?idx=%d&amp;no=%s&amp;mode=%s<\/p>\n<p>where<\/p>\n<p style=\"padding-left: 60px;\">idx= 20 (14h) if the Registry key does not exist; 24 (18h) if the key exists.<\/p>\n<p style=\"padding-left: 60px;\">no= XORed + base64 encoded \u201c&lt;Computername&gt; \\ &lt;username&gt;\u201d<\/p>\n<p style=\"padding-left: 60px;\">mode= XORed + base64 encoded Process listing + Registry key flag<\/p>\n<figure id=\"attachment_84392\" aria-describedby=\"caption-attachment-84392\" style=\"width: 825px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84392\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture16.png\" alt=\"\" width=\"825\" height=\"127\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture16.png 825w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture16-300x46.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture16-768x118.png 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><figcaption id=\"caption-attachment-84392\" class=\"wp-caption-text\">Command and control server domain<\/figcaption><\/figure>\n<h4><strong>Persistence<\/strong><\/h4>\n<p>The persistence mechanism of the malware is performed only for the downloaded implant. Persistence is established for the implant via the visual basic macro code initially executed upon document loading by the victim. This persistence is also performed ONLY if the malware successfully executes the downloaded implant. The malware first tries to update the HKEY_LOCAL_MACHINE registry key.<\/p>\n<p>If the update is unsuccessful then it also tries to update the HKEY_CURRENT_USER registry key. Value written to registry to achieve persistence on the endpoint:<\/p>\n<p style=\"overflow-x: scroll;\">Registry Subkey = Software\\Microsoft\\Windows\\CurrentVersion\\Run<\/p>\n<p>Value Name = AdobeFlash<\/p>\n<p style=\"overflow-x: scroll;\">Value Content = &#8220;C:\\DOCUME~1\\&lt;username&gt;\\LOCALS~1\\Temp\\OneDrive.exe&#8221; kLZXlyJelgqUpKzP<\/p>\n<figure id=\"attachment_84393\" aria-describedby=\"caption-attachment-84393\" style=\"width: 975px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84393\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Picture17.png\" alt=\"\" width=\"975\" height=\"1148\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture17.png 975w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture17-255x300.png 255w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture17-768x904.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture17-870x1024.png 870w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Picture17-425x500.png 425w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><figcaption id=\"caption-attachment-84393\" class=\"wp-caption-text\">Registry based persistence of the second stage payload<\/figcaption><\/figure>\n<h3><strong>Connections to 2017 campaigns<\/strong><\/h3>\n<p>The techniques, tactics and procedures are very similar to the campaigns that targeted US Defense contractors, US Energy sector, financial organizations and crypto currency exchanges in 2017.<\/p>\n<p>The same Windows User author appeared back in 2017 in two malicious documents \ube44\ud2b8\ucf54\uc778_\uc9c0\uac11\uc8fc\uc18c_\ubc0f_\uac70\ub798\ubc88\ud638.doc and \ube44\ud2b8\ucf54\uc778 \uac70\ub798\ub0b4\uc5ed.xls which were involved in crypto currency targeting. Furthermore, one of the implants communicates to an IP address that was involved in hosting malicious job description documents in 2017 involving the Sikorsky military program.<\/p>\n<p>McAfee Advanced Threat research determines with confidence that Lazarus is the threat group behind this attack for the following reasons:<\/p>\n<ul>\n<li>Contacts an IP address \/ domain that was used to host a malicious document from a Lazarus previous campaign in 2017<\/li>\n<li>Same author appeared in these recent malicious documents that also appeared back in Lazarus 2017 campaigns<\/li>\n<li>Uses the same malicious document structure and similar job recruitment ads as what we observed in past Lazarus campaigns<\/li>\n<li>The techniques, tactics and procedures align with Lazarus group\u2019s interest in crypto currency theft<\/li>\n<\/ul>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>In this latest discovery by McAfee ATR, despite a short pause in similar operations, the Lazarus group targets crypto currency and financial organizations. Furthermore, we have observed an increased usage of limited data gathering modules to quickly identify targets for further attacks. This campaign is tailored to identifying those who are running Bitcoin related software through specific system scans.<\/p>\n<h2><em>\u00a0<\/em><strong>Indicators of Compromise<\/strong><\/h2>\n<h4><strong>MITRE ATT&amp;CK techniques<\/strong><\/h4>\n<ul>\n<li>Data encoding<\/li>\n<li>Data encrypted<\/li>\n<li>Command-Line Interface<\/li>\n<li>Account discovery<\/li>\n<li>Process Discovery<\/li>\n<li>Query registry<\/li>\n<li>Hidden files and directories<\/li>\n<li>Custom cryptographic protocol<\/li>\n<li>Registry Run Keys \/ Start Folder<\/li>\n<li>Startup Items<\/li>\n<li>Commonly used port<\/li>\n<li>Exfiltration Over Command and Control Channel<\/li>\n<\/ul>\n<h4><strong>IPs<\/strong><\/h4>\n<ul>\n<li>210.122.7.129<\/li>\n<li>70.42.52.80<\/li>\n<li>221.164.168.185<\/li>\n<\/ul>\n<h4><strong>URLs<\/strong><\/h4>\n<ul style=\"overflow-x: scroll;\">\n<li>hxxps:\/\/dl.dropboxusercontent.com\/content_link\/AKqkZsJRuxz5VkEgcguqNE7Th3iscMsSYvivwzAYuTZQWDBLsbUb7yBdbW2lHos\/file?dl=1<\/li>\n<li>hxxps:\/\/www.dropbox.com\/s\/q7w33sbdil0i1w5\/job description.doc?dl=1<\/li>\n<\/ul>\n<h4><strong>Hashes<\/strong><\/h4>\n<ul style=\"overflow-x: scroll;\">\n<li>dc06b737ce6ada23b4d179d81dc7d910a7dbfdde<\/li>\n<li>a79488b114f57bd3d8a7fa29e7647e2281ce21f6<\/li>\n<li>7e70793c1ca82006775a0cac2bd75cc9ada37d7c<\/li>\n<li>535f212b320df049ae8b8ebe0a4f93e3bd25ed79<\/li>\n<li>1dd8eba55b16b90f7e8055edca6f4957efb3e1cd<\/li>\n<li>afb2595ce1ecf0fdb9631752e32f0e32be3d51bb<\/li>\n<li>e8faa68daf62fbe2e10b3bac775cce5a3bb2999e<\/li>\n<\/ul>\n<h4><strong>McAfee Detection<\/strong><\/h4>\n<ul>\n<li>BackDoor-FDRO!<\/li>\n<li>Trojan-FPCQ!<\/li>\n<li>RDN\/Generic Downloader.x<\/li>\n<li>RDN\/Generic Dropper<\/li>\n<li>RDN\/Generic.dx<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84394\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.47.21-AM.png\" alt=\"\" width=\"892\" height=\"1158\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.47.21-AM.png 647w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.47.21-AM-231x300.png 231w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-09-at-9.47.21-AM-385x500.png 385w\" sizes=\"auto, (max-width: 892px) 100vw, 892px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.<\/p>\n","protected":false},"author":911,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,5219,4452,4749,5394],"coauthors":[2544],"class_list":["post-84373","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-bitcoin","tag-cybersecurity","tag-financial-services","tag-lazarus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-12T15:30:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T01:43:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Lazarus.png\" \/>\n\t<meta property=\"og:image:width\" content=\"387\" \/>\n\t<meta property=\"og:image:height\" content=\"316\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ryan Sherstobitoff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@r_sherstobitoff\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Sherstobitoff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/\"},\"author\":{\"name\":\"Ryan Sherstobitoff\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\"},\"headline\":\"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users\",\"datePublished\":\"2018-02-12T15:30:32+00:00\",\"dateModified\":\"2025-06-03T01:43:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/\"},\"wordCount\":2393,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png\",\"keywords\":[\"Advanced Threat Research\",\"Bitcoin\",\"cybersecurity\",\"financial services\",\"Lazarus\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/\",\"name\":\"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png\",\"datePublished\":\"2018-02-12T15:30:32+00:00\",\"dateModified\":\"2025-06-03T01:43:12+00:00\",\"description\":\"McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\",\"name\":\"Ryan Sherstobitoff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"caption\":\"Ryan Sherstobitoff\"},\"description\":\"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/\",\"https:\/\/x.com\/r_sherstobitoff\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | McAfee Blog","description":"McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | McAfee Blog","og_description":"McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-02-12T15:30:32+00:00","article_modified_time":"2025-06-03T01:43:12+00:00","og_image":[{"width":387,"height":316,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/Lazarus.png","type":"image\/png"}],"author":"Ryan Sherstobitoff","twitter_card":"summary_large_image","twitter_creator":"@r_sherstobitoff","twitter_site":"@McAfee","twitter_misc":{"Written by":"Ryan Sherstobitoff","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/"},"author":{"name":"Ryan Sherstobitoff","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035"},"headline":"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users","datePublished":"2018-02-12T15:30:32+00:00","dateModified":"2025-06-03T01:43:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/"},"wordCount":2393,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png","keywords":["Advanced Threat Research","Bitcoin","cybersecurity","financial services","Lazarus"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/","name":"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png","datePublished":"2018-02-12T15:30:32+00:00","dateModified":"2025-06-03T01:43:12+00:00","description":"McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/Lazarus.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lazarus-resurfaces-targets-global-banks-bitcoin-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Lazarus Resurfaces, Targets Global Banks and Bitcoin Users"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035","name":"Ryan Sherstobitoff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","caption":"Ryan Sherstobitoff"},"description":"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.","sameAs":["https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/","https:\/\/x.com\/r_sherstobitoff"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/911"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84373"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84373\/revisions"}],"predecessor-version":[{"id":214915,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84373\/revisions\/214915"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84373"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}