large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Behind The Second Stone

The Lazarus Group used compromised websites as command and control servers to host a second-stage ASP page. The operation used various techniques for defense evasion including obfuscation, encoding, and non-standard ports.
Name Modified Date Sources
Operation Behind The Second Stone 2019-12-16