Lazarus Group targets Aerospace and Defense with new Comebacker variant

Nov. 10, 2025, 11:50 a.m.

Description

This analysis details a recent espionage campaign by the DPRK-nexus threat actor Lazarus Group targeting the aerospace and defense sectors. The campaign employs a new variant of the Comebacker backdoor, showcasing the actor's ongoing refinement of their malware arsenal. The attackers use highly specific lure documents, indicating a targeted spear phishing campaign. The malware's infection chain involves multiple stages, including custom decryption algorithms and encrypted C2 communications. The campaign's infrastructure remains active, suggesting potential ongoing operations. Organizations in the targeted sectors should remain vigilant against phishing attempts and strengthen their defenses against macro-based threats.

Date

  • Created: Nov. 10, 2025, 11:12 a.m.
  • Published: Nov. 10, 2025, 11:12 a.m.
  • Modified: Nov. 10, 2025, 11:50 a.m.

Indicators

  • f2b3867aa06fb38d1505b3c2b9e523d83f906995dcdd1bb384a1087b385bfc50
  • c4a5179a42d9ff2774f7f1f937086c88c4bc7c098963b82cc28a2d41c4449f9e
  • b7d625679fbcc86510119920ffdd6d21005427bf49c015697c69ae1ee27e6bab
  • b357b3882cf8107b1cb59015c4be3e0b8b4de80fd7b80ce3cd05081cd3f6a8ff
  • ad9c5aca9977d04c73be579199a827049b6dd9840091ffe8e23acc05e1d4a657
  • a75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855
  • 96b973e577458e5b912715171070c0a0171a3e02154eff487a2dcea4da9fb149
  • 7e61c884ce5207839e0df7a22f08f0ab7d483bfa1828090aa260a2f14a0c942c
  • 14213c013d79ea4bc8309f730e26d52ff23c10654197b8d2d10c82bbbcd88382
  • 046caa2db6cd14509741890e971ddc8c64ef4cc0e369bd5ba039c40c907d1a1f
  • https://hiremployee.com
  • https://birancearea.com/adminv2
  • office-theme.com
  • birancearea.com
  • hiremployee.com

Attack Patterns

Additional Informations

  • Aerospace
  • Defense