Astrill VPN: New IPs Publicly Released on VPN Service Heavily Used by North Korean Threat Actors

March 3, 2025, 3:33 p.m.

Description

North Korean threat actors, particularly from the Lazarus Group, continue to utilize Astrill VPN to conceal their IP addresses during attacks. Recent infrastructure and logs from the 'Contagious Interview' subgroup confirmed ongoing use of Astrill VPN in their operations. Google's Mandiant and Recorded Future's Insikt Group have also reported on DPRK threat actors' preference for this VPN service. Silent Push analysts have developed a 'Bulk Data Feed' of Astrill VPN IPs, updated in real-time, to help protect against threats. The research includes confirmation of Astrill VPN usage in recent attacks, including the $1.4 billion ByBit heist. A sample list of active Astrill VPN IP addresses is provided, with more comprehensive data available to enterprise users.

Date

  • Created: March 1, 2025, 6:36 p.m.
  • Published: March 1, 2025, 6:36 p.m.
  • Modified: March 3, 2025, 3:33 p.m.

Indicators

  • 185.108.128.54
  • 172.96.141.172
  • 172.93.100.166
  • 169.57.129.31
  • 169.38.132.135
  • 167.88.61.250
  • 134.195.197.175
  • 113.20.30.139
  • 104.129.22.2

Attack Patterns

  • Lazarus Group
  • T1568
  • T1608
  • T1571
  • T1573
  • T1102
  • T1133
  • T1090