Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Analysis of APT-C-26 (Lazarus) Group's Attack Campaign Using Remote IT Disguise to Deploy Monitoring Software

0
Medium
Published: Fri Nov 21 2025 (11/21/2025, 22:11:40 UTC)
Source: AlienVault OTX General

Description

APT-C-26 (Lazarus) has conducted a sophisticated attack campaign deploying customized monitoring software disguised as remote IT tools. The malware includes a registration program, daemon process, and DLL, leveraging Windows Shell extensions for persistence and creating a covert remote desktop environment. It employs advanced evasion techniques such as disabling Windows Defender and manipulating firewall rules. The monitoring software captures screen data and uploads it to a remote server, enabling persistent surveillance and remote control. This campaign targets various industries globally and is attributed to the North Korean Lazarus group. The attack does not require known exploits but uses stealthy persistence and privilege escalation tactics. European organizations face risks of espionage, data leakage, and operational disruption. Mitigation requires targeted detection of the specific malware components, strict control of remote IT access, and enhanced endpoint monitoring. Countries with high adoption of Windows enterprise environments and strategic industries are most at risk, including Germany, France, the UK, and the Netherlands.

AI-Powered Analysis

AILast updated: 11/21/2025, 22:31:49 UTC

Technical Analysis

The reported campaign by APT-C-26, also known as Lazarus, involves deploying a customized monitoring software suite designed to masquerade as legitimate remote IT tools within targeted organizations. The malware package consists of three main components: a registration program, a daemon process, and a DLL file responsible for core monitoring functions. Persistence is achieved through the use of Windows Shell extensions, specifically by injecting or registering systemuiext.dll, allowing the malware to maintain a foothold even after system reboots. The malware establishes a covert remote desktop environment, enabling attackers to remotely control infected machines under the guise of legitimate IT support. To evade detection, the malware disables Windows Defender and manipulates firewall rules to prevent blocking or alerting on its network activities. The monitoring software captures screen data continuously and uploads it to a command and control server, facilitating real-time surveillance. The campaign employs multiple MITRE ATT&CK techniques including T1547 (Boot or Logon Autostart Execution), T1140 (Deobfuscate/Decode Files or Information), T1562 (Impair Defenses), T1036 (Masquerading), T1055 (Process Injection), T1112 (Modify Registry), T1059 (Command and Scripting Interpreter), T1070 (Indicator Removal), T1204 (User Execution), T1559 (Inter-Process Communication), T1078 (Valid Accounts), T1553 (Subvert Trust Controls), T1197 (BYPASS User Account Control), and T1134 (Access Token Manipulation). No known public exploits are associated with this campaign, indicating the attackers rely on social engineering or credential compromise to gain initial access. Attribution to Lazarus is based on the malware’s code similarities, tactics, and infrastructure. The campaign targets multiple industries globally, with a focus on stealthy long-term monitoring and data exfiltration.

Potential Impact

European organizations targeted by this campaign face significant risks including unauthorized surveillance, data exfiltration, and potential operational disruption. The covert remote desktop capability allows attackers to manipulate systems in real time, potentially leading to intellectual property theft, exposure of sensitive corporate or governmental information, and undermining of trust in IT infrastructure. Disabling endpoint defenses and firewall manipulation increases the difficulty of detection and remediation, prolonging attacker presence and increasing damage potential. Industries with critical infrastructure, finance, technology, and government sectors are particularly vulnerable due to the strategic value of the information and systems targeted. The campaign’s stealth and persistence mechanisms can lead to prolonged espionage campaigns, impacting confidentiality and integrity of data. Additionally, the presence of such malware can erode stakeholder confidence and lead to regulatory penalties under GDPR if personal or sensitive data is compromised. The medium severity rating reflects the sophisticated nature of the attack and the potential for significant impact, although it requires initial access and user interaction or credential compromise to deploy.

Mitigation Recommendations

To mitigate this threat, European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting suspicious Windows Shell extension registrations and anomalous DLL injections such as systemuiext.dll. Network monitoring should focus on identifying unusual outbound traffic patterns consistent with screen capture data uploads. Strict access controls and multi-factor authentication (MFA) must be enforced for all remote IT and administrative accounts to prevent unauthorized use of valid credentials. Regular audits of firewall rules and Windows Defender configurations can help detect unauthorized modifications. Employ application whitelisting to restrict execution of unknown or unauthorized binaries like monitorinstaller_update1.exe and winupdateservice.exe. User training to recognize social engineering attempts and suspicious IT support requests is critical. Incident response plans should include procedures for isolating infected hosts and forensic analysis of persistence mechanisms. Organizations should also leverage threat intelligence feeds to monitor for the provided malware hashes and indicators of compromise. Finally, segmenting critical networks and limiting remote desktop protocol (RDP) access can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://mp.weixin.qq.com/s/YzDg8MXiV6FhsiF7HWth4A?poc_token=HCzjIGmjFYvbkuW9wrpXCkYm_Yh3Ojib9Gv6B97t"]
Adversary
APT-C-26 (Lazarus)
Pulse Id
6920e39c52bbf117c94af4ba
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0c54b86bc8ce4017fe2375f77d004020
hash3214097b251625b5b6bb1dd8cf535248
hash462d434aabc3954076480ff61f299f05
hash54ef01d1074f91e1959a8269743d869e
hash62565204478f0ef679aafd7c2f5ceae5
hash6ceaedac54a5763829dc193927ccecd8
hash87cb1482285329e744c16481738e1579
hash8ad4d981594e40620dc179b39312de91
hasha52210763540abeda00f6923f02f7e33
hashb13906367428aaf869ac74054116d1f3
hashc9a71a3443156591131faff7b980e475
hashe3bd8d4a7eda1cafcbc3c898d86ccb0c
hashf3fcff392f44a3b7f0c49b7205c253ea

Threat ID: 6920e4b627835fd566e3a2ea

Added to database: 11/21/2025, 10:16:22 PM

Last enriched: 11/21/2025, 10:31:49 PM

Last updated: 11/22/2025, 2:55:29 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats