cybersecurity

Researchers Unveil Lazarus Recruitment Tactics In Live Honeypot Operation

ANYRUN and NorthScan have exposed the inner workings of North Korea’s Lazarus Group through a bold honeypot operation.

Researchers captured live video of attackers using fake corporate laptops, revealing their full recruitment and attack pipeline.

This marks the first time Lazarus operators linked to the notorious Chollima subgroup were recorded mid-operation against Western targets.

The operation highlights how Lazarus blends social engineering with technical stealth, turning job offers into network breaches.

The Bait: Fake Jobs and Sandboxed Laptops

It started with a LinkedIn message from “Aaron,” alias “Blaze,” a known Lazarus recruiter.

He offered remote workers 35% of a full salary for “laptop access” to perform tasks code for installing malware and exfiltrating data from real companies.

Instead of declining, researchers from Mauro Eldritch at BCA LTD supplied ANYRUN sandbox environments.

These virtual machines mimicked Windows and macOS workstations with realistic peripherals, network interfaces, and idle processes to evade detection.

Tools like ANYRUN’s behavioral analysis logged every keystroke, screenshot, and process spawn without alerting the attackers.

Over the course of months, “hired” operators logged in via RDP and VPN tunnels.

They ran custom PowerShell scripts for persistence, including obfuscated loaders that injected shellcode into legitimate processes such as explorer.exe.

Videos showed them scanning for endpoints with nmap equivalents and deploying Cobalt Strike beacons disguised as PDF readers.

Inside Chollima: Tools, OPSEC, and Evolution

The honeypot unveiled the complete Chollima attack cycle: reconnaissance, initial access via recruited insiders, lateral movement, and C2 staging.

Attackers used living-off-the-land binaries (LOLBins), such as certutil.exe for downloads and bitsadmin for staging payloads.

They targeted npm packages for supply chain footholds, echoing past attacks.

OPSEC was advanced: operators rotated user agents, chained proxies through bulletproof hosting in Russia and China, and checked for sandbox artifacts like low RAM or missing hardware sensors.

Despite this, the honeypots held, capturing malware samples with AES-encrypted configs pointing to Firebase C2 servers.

This shifts Lazarus from zero-days to insider recruitment, bypassing firewalls via trusted VPN logins.

Defenders must vet job applicants in tech roles, scan for anomalous RDP from high-risk IPs, and deploy endpoint detection for LOLBins.

Led by @0xfigo at NorthScan, the findings will be released with IOCs soon. Enterprises face a new reality: threats hide in HR inboxes.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago