Thursday, April 17, 2025
HomeBackdoorLazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the...

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

Published on

SIEM as a Service

Follow Us on Google News

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and far-reaching operation of the Lazarus Group, a North Korean advanced persistent threat (APT) group.

Dubbed “Operation Phantom Circuit,” the campaign highlights a deliberate and sophisticated effort to infiltrate global systems through compromised software supply chains and advanced Command-and-Control (C2) infrastructure.

The operation primarily targeted developers and the cryptocurrency sector, with critical data being siphoned back to Pyongyang.

- Advertisement - Google News

The investigation revealed that Lazarus employed multiple C2 servers, which became active in September 2024 and featured an additional hidden operational layer.

The servers housed a React-based web-admin interface integrated with Node.js APIs, enabling centralized control.

Through these interfaces, attackers could systematically manage exfiltrated data, oversee infected systems, and execute payload delivery.

This consistent design was evident across all analyzed C2 servers, suggesting a high degree of operational maturity and standardization.

Supply Chain Intrusion and Global Impact

Lazarus exploited legitimate software packages by embedding obfuscated backdoors, tricking developers into deploying compromised applications.

These supply chain attacks targeted a broad audience, especially in the cryptocurrency domain, leading to the execution of malicious payloads on host systems.

STRIKE’s analysis identified hundreds of victims across multiple campaigns, with data traces pointing back to Lazarus’s infrastructure in North Korea.

The operation, which spanned from November 2024 to January 2025, utilized obfuscation tactics and layered infrastructure to evade detection.

Key elements of the infrastructure included Astrill VPNs, intermediate proxies registered to Russian entities, and C2 servers managed through ports like 1224 and 1245.

NetFlow analysis and connection logs allowed STRIKE to confidently trace these activities back to North Korean IPs, including the limited range of addresses assigned to Pyongyang.

Advanced Obfuscation Techniques

Lazarus’s operations epitomized strategic obfuscation. Traffic was anonymized through VPNs and proxies, blending malicious activity with legitimate network traffic to complicate detection.

For example, traffic initiated from Pyongyang was routed through Astrill VPN exit points and subsequently masked via intermediate proxies in Russia.

The C2 servers, hosted on infrastructure provided by entities like Stark Industries, were used to exfiltrate sensitive data, including credentials and system information.

Key findings include the use of a hidden web-admin panel on C2 servers, accessible only through a secured login.

This panel provided attackers with granular control over exfiltrated data, displaying victim details and facilitating data manipulation through custom-built interfaces.

Additionally, the Lazarus Group’s reliance on commercial services such as Dropbox for data transfer further emphasized their robust operational security measures.

The findings from Operation Phantom Circuit underscore the urgent need for intensified cybersecurity measures, particularly in the software supply chain.

Organizations are advised to implement rigorous code signing and verification processes, enhance monitoring of network traffic, and deploy proactive defenses against evolving tactics employed by APT groups like Lazarus.

With over 233 victims identified globally in the campaign’s latest phase, including a significant concentration in India and Brazil, the operation serves as a stark reminder of the vulnerabilities that sophisticated actors can exploit.

Industries, especially those handling sensitive or financial data, must prioritize collaborative threat intelligence sharing and adopt advanced detection tools to counter such persistent threats.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...