Lazarus Group Enhances Malware Toolkit with PondRAT, ThemeForestRAT, and RemotePE

Sep 02, 2025
Malware / Threat Intelligence

The North Korea-linked threat actor, Lazarus Group, has been linked to a social engineering campaign that distributes three new cross-platform malware variants: PondRAT, ThemeForestRAT, and RemotePE. This attack, observed by NCC Group’s Fox-IT in 2024, specifically targeted an organization within the decentralized finance (DeFi) sector, resulting in the breach of an employee’s system.

“As the actor accessed the internal network, they utilized various RATs along with other tools to collect credentials and establish proxy connections,” noted Yun Zheng Hu and Mick Koomen. “Subsequently, the attacker transitioned to a more stealthy RAT, indicating a potential progression in their attack strategy.”

The attack began with the threat actor impersonating a current employee of a trading firm via Telegram and using counterfeit websites resembling Calendly and Picktime to arrange a meeting with the target. Although the initial steps were…

Lazarus Group Enhances Malware Capabilities with New Tools: PondRAT, ThemeForestRAT, and RemotePE

On September 2, 2025, cybersecurity researchers revealed that the Lazarus Group, a North Korean-affiliated threat actor, has expanded its malware toolkit. This development includes the introduction of three distinct pieces of cross-platform malware: PondRAT, ThemeForestRAT, and RemotePE. The attack vector, uncovered by NCC Group’s Fox-IT analysts in 2024, primarily targeted an organization within the decentralized finance (DeFi) sector, illustrating a significant risk profile for companies operating in this volatile market.

The operation commenced when the Lazarus Group impersonated an employee from a trading firm through Telegram. Utilizing phishing techniques, the attackers created counterfeit websites resembling legitimate scheduling platforms such as Calendly and Picktime to arrange a meeting with their intended victim. This method of social engineering underscores the increasing sophistication of threat actors who prioritize psychological manipulation to breach security perimeters.

Once the attackers gained initial access, they compromised an employee’s system, allowing them to explore the network extensively. Utilizing a combination of Remote Access Trojans (RATs) and various tools, the advanced persistent threat actor could harvest sensitive credentials and establish proxy connections. According to cybersecurity experts Yun Zheng Hu and Mick Koomen, this stage of the attack demonstrates a calculated approach to network reconnaissance, leveraging different RATs for enhanced operational efficiency.

Following the initial phase, the group transitioned to a more stealthy RAT, indicating a strategic evolution within the attack cycle. With this shift, it is likely that the attackers aimed to further entrench themselves within the victim’s network while minimizing detection risks. Each phase illustrates a careful orchestration that aligns with several tactics identified in the MITRE ATT&CK framework, including initial access, persistence, and privilege escalation.

The incident serves as a reminder of the persistent threat posed by well-funded and organized cybercriminal groups like Lazarus. Companies in the DeFi space, and indeed any sector reliant on digital infrastructure, must remain vigilant to the evolving nature of these attacks, implementing robust cybersecurity measures. As the threat landscape continues to proliferate, understanding these tactics and the tools employed can aid in bolstering defenses and mitigating potential damage.

In summary, the expansion of the Lazarus Group’s malware arsenal underscores an alarming trend in cybercrime, one that presents specific challenges for business owners. With the sophistication of tactics deployed in contemporary breaches, a proactive and informed approach to cybersecurity remains essential in safeguarding organizational assets against such formidable adversaries.

Source link