The Lazarus Group is a notorious North Korean state-sponsored hacking organization known for:-
They have been implicated in high-profile incidents, including the 2014 Sony Pictures hack and the 2017 WannaCry ransomware outbreak.
Cybersecurity researchers at Cisco Talos recently found Lazarus Group’s “Operation Blacksmith” using new DLang-based malware to attack organizations across the globe.
Blacksmith operation exploits Log4Shell (CVE-2021-44228) and deploys a new DLang RAT via Telegram for C2 communication.
Three families were discovered, including:-
NineRAT operates through Telegram for C2, including commands and file transfers. Lazarus uses Telegram for stealth.
It comprises a dropper with two embedded components:-
NineRAT, the main interaction method on infected hosts, coexists with previous tools like HazyLoad for sameness. Lazarus ensures persistent access with overlapping backdoor entries.
Telegram C2 channels led to the discovery of a public bot, “[at]StudyJ001Bot,” which was later replaced by Lazarus-owned bots. Despite the switch, older NineRAT samples still use open channels, reads the report.
Anadriel, active since 2022, employs two API tokens, one publicly listed, interacting with Telegram via DLang-based libraries.
Besides this, the NineRAT tests authentication and handles file upload/download through Telegram methods. Not only that but even from the system using a BAT file, the NineRAT can also uninstall itself.
NineRAT led to the discovery of two more Lazarus DLang-based malware families. BottomLoader, a downloader, downloads payloads via a PowerShell command and creates persistence.
DLRAT, a downloader, and RAT that executes commands, performs system reconnaissance, and communicates with C2 using a hardcoded session ID.
The attack exploits CVE-2021-44228 (Log4Shell) on public-facing VMWare Horizon servers for initial access, deploying a custom implant after reconnaissance.
HazyLoad
NineRAT
BottomLoader
DLRAT
Network IOCs
Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing…
CISOs face a paradox in their SOCs every day: more data and detections than ever…
BK Technologies Corporation, a provider of communications equipment for public safety and government agencies, has…
Raleigh, United States, October 7th, 2025, CyberNewsWire Report Shows Cross-Training as Strategic Solution to Operational…
Ransomware operators have shifted from opportunistic malware distribution to highly targeted campaigns that exploit legitimate…
A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a…