Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors
This talk analyzes the evolving tactics of North Korean threat actors, specifically the Lazarus and Kimsuky groups, focusing on their use of multi-cluster operations and supply-chain attacks. It demonstrates how these actors share infrastructure, tools, and personnel to complicate attribution and achieve diverse objectives, ranging from financial theft to espionage. The presentation highlights the necessity of full-chain analysis over simple indicator-based detection to accurately identify and attribute these sophisticated, multi-stage campaigns. The speaker provides detailed infection chains involving tools like Donut Loader, Quasar RAT, and various custom backdoors.
Beyond the Label: Why North Korean Threat Actors Are Winning the Attribution Game
TLDR: North Korean threat actors like Lazarus and Kimsuky are shifting from monolithic operations to a complex, multi-cluster model that shares infrastructure and tools to evade detection. By analyzing full infection chains rather than relying on isolated indicators of compromise, researchers can cut through the noise of intentional false flags. Pentesters and hunters must prioritize behavioral analysis and supply-chain integrity to identify these sophisticated, multi-stage campaigns before they escalate.
Attribution in the current threat landscape is often treated as a binary exercise: you find a specific malware sample, you map it to a known actor, and you close the ticket. This approach is failing. Recent research into North Korean threat actors demonstrates that these groups have moved far beyond the "one group, one toolset" model. They are now operating as a fluid, interconnected network of specialized sub-clusters that share infrastructure, code, and personnel to achieve diverse objectives. If you are still relying on static indicators to track these actors, you are likely missing the actual scope of their operations.
The Shift to Multi-Cluster Operations
Historically, security teams tracked the Lazarus group as a single, high-profile entity. Today, that label is insufficient. These actors have adopted a structure that mirrors modern, agile development teams. They have splintered into specialized sub-clusters—such as Diamond Sleet, Moonstone Sleet, and Jade Sleet—each with distinct targeting profiles and operational focuses.
This is not just an organizational change; it is a tactical evolution designed to complicate attribution. While these sub-clusters maintain distinct tactics, techniques, and procedures (TTPs), they frequently operate within the same victim environments. They share command-and-control (C2) infrastructure and reuse code across campaigns. For a researcher, this creates a massive blind spot. If you identify a specific backdoor but fail to map the full infection chain, you might attribute an entire campaign to the wrong cluster, or worse, miss the presence of a second, more dangerous actor operating in parallel.
Deconstructing the Supply-Chain Infection Chain
The most effective way to track these actors is to stop looking at the "what" and start looking at the "how." A recent campaign targeting a cryptocurrency exchange in South Korea provides a masterclass in this approach. The attackers compromised a legitimate software update mechanism, a classic supply-chain attack that bypasses traditional perimeter defenses.
The infection flow is deceptively simple but technically dense. Once the victim executes the trojanized installer, the malware performs side-loading to drop a secondary payload. The actors then deploy a series of preliminary tools to maintain persistence and bypass security controls. Specifically, they use Ngrok to tunnel traffic and bypass firewall restrictions, and they implant Quasar RAT to gain full remote control over the host.
The use of Donut Loader is particularly telling. This tool allows the attackers to generate position-independent shellcode that executes payloads directly in memory. By avoiding disk-based execution, they significantly reduce their footprint.
# Example of a typical post-exploitation command sequence
# Bypassing firewall and NAT with Ngrok
ngrok tcp 3389
# Adding a high-privilege account for RDP access
net localgroup "Remote Desktop Users" /add /user:attacker_account
Why Static Indicators Fail
The danger of relying on static indicators is best illustrated by the emergence of new, seemingly "unlinked" malware. In one instance, researchers identified a new backdoor that shared high structural similarity with older Lazarus tools. However, the C2 infrastructure used a free domain hosting service—a tactic historically favored by the Kimsuky group, not Lazarus.
This is the "blurred line" of attribution. Is this a new group? Is it a collaboration? Or is it a deliberate attempt to sow confusion? The answer lies in the full-chain analysis. When you map the entire lifecycle—from the initial social engineering lure to the final C2 communication—the patterns of behavior become clear. These actors are not just reusing tools; they are reallocating personnel and resources across units to maximize their effectiveness.
Actionable Intelligence for Pentesters
For those of us on the offensive side, this research changes how we should approach our engagements. When you are testing a client, do not just look for known CVEs. Look for the "glue" that holds these campaigns together. Are there unusual RDP configurations? Is there evidence of side-loading in legitimate software directories? Are there signs of memory-resident shellcode execution?
Defenders are increasingly moving toward MITRE ATT&CK mapping to track these behaviors, but that is only the first step. You need to understand the context of the environment. If you see a tool like Bandizip being used in an environment where it has no business being, that is not just a "potentially unwanted program"—it is a potential indicator of a side-loading attack.
The era of simple, indicator-based attribution is over. These actors are evolving faster than our detection signatures. If you want to stay ahead, you have to stop chasing the malware and start hunting the behavior. The next time you find a suspicious binary, don't just run it through a sandbox. Map the entire chain, look for the shared infrastructure, and ask yourself: what is the actual objective here? The answer is rarely found in the file hash.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Hacking Apple's USB-C Port Controller




