Geopolitical Shift: Russian and North Korean State Hackers Found Sharing Attack Infrastructure

Researchers Uncover Unprecedented Collaboration Between Russian Gamaredon and North Korean Lazarus APTs

HIGH
November 26, 2025
6m read
Threat ActorThreat IntelligenceCyberattack

Related Entities

Organizations

Gen Threat Labs

Other

InvisibleFerret

Full Report

Executive Summary

Security researchers at Gen Threat Labs have identified a highly unusual and concerning instance of operational collaboration between the Russian state-sponsored Gamaredon group (also known as Pitty Tiger, linked to Russia's FSB) and North Korea's infamous Lazarus Group. The discovery points to the two distinct Advanced Persistent Threat (APT) groups using the same command-and-control (C2) infrastructure to distribute malware, suggesting a deliberate sharing of resources or a coordinated campaign. This finding is significant as it indicates that the deepening real-world geopolitical alliance between Russia and North Korea is translating into the cyber domain. Such collaboration could lead to the creation of more complex, hybrid threats that combine the espionage focus of Gamaredon with the financially motivated, destructive capabilities of Lazarus, posing a formidable challenge to global security.


Threat Overview

The core evidence of this collaboration is a shared C2 server IP address: 144.172.112.106. On July 28, 2025, this IP was identified as part of Gamaredon's known C2 infrastructure. Just four days later, on August 1, 2025, the same IP address began distributing an obfuscated variant of InvisibleFerret, a malware family attributed to the Lazarus Group. The delivery mechanism for the Lazarus payload used an identical server path structure (/payload/99/81) to one previously seen in Lazarus's "ContagiousInterview" campaign.

While the possibility of a shared proxy or compromised VPN service cannot be entirely ruled out, the combination of the same IP, the extremely close timing, and the identical delivery structure provides strong evidence of intentional infrastructure sharing or a joint operation. Gamaredon is known for its relentless cyber-espionage campaigns against Ukrainian entities, while Lazarus is notorious for its dual-focus on espionage and large-scale financial theft, including major cryptocurrency heists.

Technical Analysis

The shared C2 server acts as a central hub for the malware to receive instructions and exfiltrate data. The reuse of this critical infrastructure component by two separate, state-sponsored groups is a major operational security failure for the actors, but a significant intelligence gain for defenders.

MITRE ATT&CK Techniques Inferred:

Impact Assessment

The potential impact of this collaboration is substantial. It could lead to a dangerous synergy of capabilities. Gamaredon's high-volume, widespread access operations could be used to create footholds in networks that are then handed off to the more destructive and financially motivated Lazarus Group. This could expand Lazarus's target pool and enable them to bypass initial access challenges. For defenders, this development complicates attribution and threat modeling. An intrusion that initially appears to be Russian espionage could quickly pivot to a North Korean ransomware attack or data wiper event. This forces security teams to prepare for a wider range of potential outcomes from a single incident and raises the overall threat level posed by both nations' cyber programs.

IOCs

Type Value Description
ip_address_v4 144.172.112.106 Shared C2 server IP used by both Gamaredon and Lazarus.
url_pattern /payload/99/81 Specific server path used to deliver the Lazarus InvisibleFerret malware.

Cyber Observables for Detection

Organizations should immediately add the identified IOCs to their blocklists and threat hunting queries.

Type Value Description
network_traffic_pattern Any communication to or from IP 144.172.112.106. High-confidence indicator of compromise.
url_pattern */payload/99/81 Hunting for this URL pattern in web proxy or firewall logs could identify Lazarus activity.
log_source DNS Logs Monitor for queries related to known Gamaredon or Lazarus C2 domains.
process_name wscript.exe, cscript.exe Gamaredon frequently uses VBScripts for execution. Unusual execution of these processes should be investigated.

Detection & Response

  • Threat Intelligence Integration: Ensure that threat intelligence feeds are automatically ingested into SIEM, firewall, and EDR platforms. The IP 144.172.112.106 should trigger an immediate high-priority alert.
  • Network Traffic Analysis: Implement D3-NTA: Network Traffic Analysis to look for C2 beaconing activity. Even if IPs change, patterns such as regular callbacks to a single host over a specific port can be detected.
  • Behavioral Blocking: Since both groups use malware, endpoint protection (EPP) and EDR solutions should be configured to block malicious behaviors, such as a Word document spawning a PowerShell script (D3-PA: Process Analysis), regardless of the specific malware hash.
  • Geofencing: For organizations that do not conduct business with Russia or North Korea, consider implementing geofencing rules to block all traffic to and from these countries as a broad but effective measure (D3-ITF: Inbound Traffic Filtering).

Mitigation

  • Block Known IOCs: Immediately block the IP address 144.172.112.106 at the network perimeter.
  • User Training: Both Gamaredon and Lazarus frequently use spear-phishing as an initial access vector. Continuous user training on identifying and reporting phishing emails is a critical first line of defense.
  • Application Whitelisting: Implement application control policies (D3-EAL: Executable Allowlisting) to prevent unauthorized executables, such as the InvisibleFerret payload, from running on endpoints.
  • Network Segmentation: A well-segmented network can limit the blast radius of an intrusion. If Gamaredon gains access to one segment, proper segmentation can prevent them from handing off that access to Lazarus to attack a more critical part of the network.

Timeline of Events

1
July 28, 2025
Researchers identify IP 144.172.112.106 as a Gamaredon C2 server.
2
August 1, 2025
The same IP, 144.172.112.106, begins hosting a malware payload attributed to the Lazarus Group.
3
November 26, 2025
This article was published

MITRE ATT&CK Mitigations

Block known malicious IPs like the shared C2 server and filter egress traffic to prevent C2 communications.

Mapped D3FEND Techniques:

Use web filters and DNS sinkholing to block access to known malicious domains used by Gamaredon and Lazarus.

Mapped D3FEND Techniques:

Implement application whitelisting to prevent unauthorized malware payloads from being executed.

Mapped D3FEND Techniques:

Since both groups rely on phishing, training users to identify and report suspicious emails is a crucial preventative measure.

D3FEND Defensive Countermeasures

The collaboration between Gamaredon and Lazarus, centered on a shared C2 IP, makes Network Traffic Analysis a primary detection strategy. Organizations must immediately add 144.172.112.106 to their SIEM and firewall watchlists for high-priority alerting. Beyond this specific IOC, security teams should use NTA tools to baseline normal egress traffic and hunt for anomalies. For example, look for periodic, 'heartbeat' connections from internal hosts to a single external IP, which is characteristic of C2 beaconing. Since Gamaredon uses Telegram, any API calls to api.telegram.org from servers or systems outside of standard user workstations should be investigated. Similarly, traffic patterns matching the Lazarus /payload/99/81 structure should be a focus for custom detection rules in web proxy and IDS/IPS systems. This proactive analysis can uncover new C2 infrastructure even after the known IP is taken down.

To defend against the malware payloads delivered by this APT alliance, such as Lazarus's InvisibleFerret, Executable Allowlisting is a powerful hardening measure. Instead of trying to block a near-infinite list of known-bad files, this technique defines a list of known-good applications and prevents anything else from running. This should be deployed on critical servers and workstations of high-value employees. For example, on a database server, the allowlist might only permit the database executable, OS processes, and specific management tools. An attempt by a phishing document to drop and run the InvisibleFerret payload would be blocked by default because the malware's hash is not on the allowlist. While this requires a significant initial investment in baselining and maintenance, it is one of the most effective ways to prevent the execution of novel or obfuscated malware.

Given the complexity and potential for hybrid threats from a Gamaredon/Lazarus collaboration, deploying a decoy environment (honeynet) can provide invaluable early warning and intelligence. This involves setting up systems that mimic the organization's real production environment, complete with decoy documents, fake credentials, and simulated user activity. These systems are heavily instrumented for monitoring. If a Gamaredon phishing campaign is successful against a decoy user, security teams can observe their TTPs in a safe, contained environment. If the attackers then attempt to pivot or hand off access to Lazarus, this entire process can be recorded. This provides high-fidelity intelligence on their collaborative methods, new tools like InvisibleFerret, and any new C2 infrastructure they establish, allowing defenders to build proactive defenses before their real network is targeted.

Sources & References

Rare APT Collaboration Emerges Between Russia and North Korea
eSecurity Planet (esecurityplanet.com) November 25, 2025
Russian and North Korean Hackers Forge Global Cyberattack Alliance
GBHackers on Security (gbhackers.com) November 25, 2025
Russian and North Korean Hackers Form Alliances to Attack Organizations Worldwide
Cyber Security News (cybersecuritynews.com) November 25, 2025
Russia’s Gamaredon and North Korea’s Lazarus observed using shared servers and tools
The Cyber Express (thecyberexpress.com) November 24, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Threat ActorAPTGamaredonLazarusRussiaNorth KoreaThreat IntelligenceC2

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading