#1703185: Webinar - How Lazarus Group Uses Open Source to Attack Developers
Description: |
The Lazarus Group — an advanced persistent threat (APT) linked to North Korea — is weaponizing the trust inherent in open source ecosystems like npm and PyPI. Sonatype’s latest research uncovered 234 unique malware packages attributed to Lazarus in the first half of 2025 alone, representing 36,000 potential victims. This on-demand webinar exposes how Lazarus Group is turning open source into a delivery mechanism for cyberespionage. Learn how these malicious actors exploit developers’ trust, deploy multi-stage malware, and use sophisticated obfuscation to evade detection. Key takeaways include: Insights into Lazarus’ exfiltration-focused malware, targeting developer credentials, cloud keys, and production secrets. An examination of their advanced strategies, including two novel techniques, for long-term persistence and wide-scale impact on software supply chains. Actionable recommendations to safeguard your development pipelines and proactively defend against similar threats. This webinar equips you with the knowledge and strategies needed to mitigate the rising threat of supply chain attacks. Enable your teams to stay secure without sacrificing speed or innovation. |
---|---|
More info: | https://webinars.sonatype.com/wcc/eh/5011667/lp/5056569/how-lazarus-group-uses-open-source-to-attack-developers |
Date added | Sept. 17, 2025, 12:28 p.m. |
---|---|
Source | sonatype |
Subjects |
|