A groundbreaking investigation has provided an unprecedented, live look into a social engineering and infiltration campaign run by North Korea's notorious Lazarus Group. Researchers successfully lured operatives from the Famous Chollima subdivision into a controlled sandbox environment, observing them as they executed a scheme to place fraudulent IT workers inside Western companies. This social engineering-first approach relies on identity theft and deception to bypass traditional security controls, allowing the DPRK-backed actors to gain insider access for espionage and revenue generation.
The scheme is a sophisticated, multi-stage operation:
The research, a collaboration between BCA LTD, NorthScan, and ANY.RUN, involved creating a honeypot that simulated a developer's workstation environment. This allowed the team to monitor the actor's every move without risk.
This campaign is notable for its reliance on social engineering over malware. The primary tools are not sophisticated exploits but legitimate software used for malicious purposes.
T1566 - Phishing), not of the target company directly, but of individuals whose identities they could steal or rent.T1078 - Valid Accounts: The ultimate goal of the scheme is to obtain legitimate employee credentials for network access.T1589.002 - Gather Victim Identity Information: Email Addresses: The initial phase involves harvesting identities of real developers.T1219 - Remote Access Software: Use of AnyDesk and Google Remote Desktop for hands-on-keyboard access to the compromised endpoint.This threat poses a severe risk to organizations, effectively planting a state-sponsored insider within the network. The potential impacts include:
D3-EDL - Executable Denylisting: Block unauthorized remote access tools like AnyDesk and TeamViewer on all corporate endpoints.Train HR and hiring managers to recognize the tactics of fraudulent applicants.
Enforce strict identity verification and background checks during the hiring process.
Apply the principle of least privilege, especially for new and remote employees, to contain potential insider threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats