lazarusholic

a big fan of lazarus. You can find me on t.me/lazarusholic , lazarus.day.

2025-12-16
2025-12-16

"QR 코드를 이용해 악성 모바일 앱을 유포하는 Kimsuky" published by ENKI. #DocSwap, #Kimsuky, #Mobile, #DPRK, #CTI enki.co.kr/media-center/blog/k

2025-12-15

"DPRK threat actors are still rekting way too many of you via their fake Zoom / fake Teams meets" published by Tay. #DPRK, #CTI archive.md/vi3Pg

2025-12-13

"The Infostealer to APT Pipeline: How Lazarus Group Hijacked a Yemen Disinformation Network" published by HudsonRock. #Lazarus, #DPRK, #CTI hudsonrock.com/blog/5710

2025-12-13

"APT-C-26(Lazarus)组织利用WinRAR漏洞部署Blank Grabber木马的技术分析" published by Qihoo360. #APT-C-26, #BlankGrabber, #CVE-2025-8088, #DPRK, #CTI mp.weixin.qq.com/s?__biz=MzUyM

2025-12-13

"2025년 11월 APT 공격 동향 보고서(국내)" published by Ahnlab. #LNK, #Trend, #DPRK, #CTI asec.ahnlab.com/ko/91529/

2025-12-13

"2025년 11월 APT 그룹 동향 보고서" published by Ahnlab. #FamousChollima, #Kimsuky, #Konni, #Trend, #DPRK, #CTI asec.ahnlab.com/ko/91524/

2025-12-11

"Beyond the Malware: Inside the Digital Empire of a North Korean Threat Actor" published by Flashpoint. #ContagiousInterview, #DPRK, #CTI flashpoint.io/blog/beyond-the-

2025-12-11

"Monthly Threat Actor Group Intelligence Report, November 2025" published by NSHC. #SectorA, #Trend, #DPRK, #CTI medium.com/@nshcthreatrecon/mo

2025-12-09

"EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks" published by Sysdig. #CVE-2025-55182, #EtherRAT, #React2Shell, #DPRK, #CTI sysdig.com/blog/etherrat-dprk-

2025-12-09

"Hunting For North Korean Fiber Optic Cables" published by NKInternet. #DPRK, #CTI nkinternet.com/2025/12/08/hunt

2025-12-05

"Exclusive Look Inside a Compromised North Korean APT Machine Linked to The Biggest Heist in History" published by HudsonRock. #Bybit, #Lazarus, #DPRK, #CTI hudsonrock.com/blog/5692

2025-12-04

"How We Caught Lazarus's IT Workers Scheme Live on Camera" published by AnyRun. #ITWorker, #FamousChollima, #DPRK, #CTI any.run/cybersecurity-blog/laz

2025-12-04

"North Korean hackers are pushing fake Microsoft Teams Update to macOS users" published by Moonlock. #macOS, #DPRK, #CTI archive.md/8xDxT

2025-12-03

"Latest Contagious Interview malware campaign abuses Microsoft VSCode Tasks" published by OSM. #ContagiousInterview, #Lazarus, #DPRK, #CTI opensourcemalware.com/blog/con

2025-12-01

".hta 파일로 유포중인 KimJongRAT 주의!" published by ESTSecurity. #KimjongRAT, #Kimsuky, #DPRK, #CTI blog.alyac.co.kr/5682

2025-11-30

"Unmasking a new DPRK Front Company DredSoftLabs" published by Wickeren. #Wagemole, #DPRK, #CTI medium.com/@meeswicky1100/unma

2025-11-27

"Inside the GitHub Infrastructure Powering North Korea’s Contagious Interview npm Attacks" published by Socket. #ContagiousInterview, #NPM, #OtterCookie, #DPRK, #CTI socket.dev/blog/north-korea-co

2025-11-27

"The Korean Leaks – Analyzing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services With Qilin RaaS" published by Bitdefender. #MoonstoneSleet, #Ransomware, #DPRK, #CTI bitdefender.com/en-us/blog/bus

2025-11-25

"FlexibleFerret: macOS Malware Deploys in Fake Job Scams" published by Jamf. #FlexibleFerret, #ContagiousInterview, #DPRK, #CTI jamf.com/blog/flexibleferret-m

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst