The group reused its infrastructure in attacks against internet infrastructure and healthcare organizations in the U.S. and UK, allowing researchers to unearth details about its newest malware tools.
EarlyRAT serves as another example of the Lazarus Group APT’s ability to quickly build new malware to target organizations worldwide.
A new backdoor called WinorDLL that is potentially the work of the Lazarus Group has been found onn victim machines in several countries.