Threat Actor Profile
Description
LAPSUS$ is cyber criminal threat group that has been active since at least mid-2021. LAPSUS$ specializes in large-scale social engineering and extortion operations, including destructive attacks without the use of ransomware. The group has targeted organizations globally, including in the government, manufacturing, higher education, energy, healthcare, technology, telecommunications, and media sectors.(Citation: BBC LAPSUS Apr 2022)(Citation: MSTIC DEV-0537 Mar 2022)(Citation: UNIT 42 LAPSUS Mar 2022)
Confidence Score
Known Aliases
Tags
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
MITRE ATT&CK Techniques (43)
Indicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
[{'aliases': ['LAPSUS$', 'DEV-0537', 'Strawberry Tempest'],
'created': '2022-06-09T19:14:31.327Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': '[LAPSUS$](https://attack.mitre.org/groups/G1004) is cyber '
'criminal threat group that has been active since at least '
'mid-2021. [LAPSUS$](https://attack.mitre.org/groups/G1004) '
'specializes in large-scale social engineering and extortion '
'operations, including destructive attacks without the use of '
'ransomware. The group has targeted organizations globally, '
'including in the government, manufacturing, higher '
'education, energy, healthcare, technology, '
'telecommunications, and media sectors.(Citation: BBC LAPSUS '
'Apr 2022)(Citation: MSTIC DEV-0537 Mar 2022)(Citation: UNIT '
'42 LAPSUS Mar 2022)',
'external_references': [{'external_id': 'G1004',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/groups/G1004'},
{'description': '(Citation: Microsoft Threat Actor '
'Naming July 2023)',
'source_name': 'Strawberry Tempest'},
{'description': '(Citation: MSTIC DEV-0537 Mar 2022)',
'source_name': 'DEV-0537'},
{'description': 'BBC. (2022, April 1). LAPSUS: Two '
'UK Teenagers Charged with Hacking '
'for Gang. Retrieved June 9, 2022.',
'source_name': 'BBC LAPSUS Apr 2022',
'url': 'https://www.bbc.com/news/technology-60953527'},
{'description': 'Microsoft . (2023, July 12). How '
'Microsoft names threat actors. '
'Retrieved November 17, 2023.',
'source_name': 'Microsoft Threat Actor Naming July '
'2023',
'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'},
{'description': 'MSTIC, DART, M365 Defender. (2022, '
'March 24). DEV-0537 Criminal Actor '
'Targeting Organizations for Data '
'Exfiltration and Destruction. '
'Retrieved May 17, 2022.',
'source_name': 'MSTIC DEV-0537 Mar 2022',
'url': 'https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/'},
{'description': 'UNIT 42. (2022, March 24). Threat '
'Brief: Lapsus$ Group. Retrieved May '
'17, 2022.',
'source_name': 'UNIT 42 LAPSUS Mar 2022',
'url': 'https://unit42.paloaltonetworks.com/lapsus-group/'}],
'id': 'intrusion-set--d8bc9788-4f7d-41a9-9e9d-ee1ea18a8cf7',
'modified': '2025-04-21T19:40:47.538Z',
'name': 'LAPSUS$',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'intrusion-set',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_contributors': ['David Hughes, BT Security',
'Matt Brenton, Zurich Insurance Group',
'Flávio Costa, @Segurança Descomplicada',
'Caio Silva'],
'x_mitre_deprecated': False,
'x_mitre_domains': ['enterprise-attack', 'mobile-attack'],
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_version': '2.1'},
{'added_date': '2026-03-01',
'client': '2003264@sit.singaporetech.edu.sg',
'description': None,
'firstseen': '2021-12-10T00:00:00+00:00',
'group': 'lapsus$',
'has_negotiations': False,
'has_ransomnote': False,
'lastseen': '2026-04-24T00:00:00+00:00',
'locations': [{'available': False,
'fqdn': 'lapsus.cz',
'slug': 'https://lapsus.cz/',
'title': 'Origin DNS error | lapsus.cz | Cloudflare',
'type': 'DLS'},
{'available': True,
'fqdn': 'lapsus.by',
'slug': 'https://lapsus.by',
'title': 'LAPSUS$ | DATA REPOSITORY',
'type': 'DLS'}],
'negotiation_count': 0,
'ransomnotes_count': 0,
'tiaras_metadata': {'has_negotiations': False,
'has_ransomnote': False,
'locations': [{'available': False,
'fqdn': 'lapsus.cz',
'slug': 'https://lapsus.cz/',
'title': 'Origin DNS error | lapsus.cz | '
'Cloudflare',
'type': 'DLS'},
{'available': True,
'fqdn': 'lapsus.by',
'slug': 'https://lapsus.by',
'title': 'LAPSUS$ | DATA REPOSITORY',
'type': 'DLS'}],
'negotiation_count': 0,
'ransomnotes_count': 0,
'ransomware_live_group': 'lapsus$',
'tools': {'CredentialTheft': ['Mimikatz'],
'DefenseEvasion': [],
'DiscoveryEnum': ['ADExplorer'],
'Exfiltration': [],
'LOLBAS': ['NTDS Utility (ntdsutil)'],
'Networking': [],
'Offsec': [],
'RMM-Tools': ['AnyDesk']},
'url': 'https://www.ransomware.live/group/lapsus$',
'victims': 18,
'vulnerabilities': []},
'tiaras_source': 'ransomware.live',
'tools': {'CredentialTheft': ['Mimikatz'],
'DefenseEvasion': [],
'DiscoveryEnum': ['ADExplorer'],
'Exfiltration': [],
'LOLBAS': ['NTDS Utility (ntdsutil)'],
'Networking': [],
'Offsec': [],
'RMM-Tools': ['AnyDesk']},
'ttps': [],
'url': 'https://www.ransomware.live/group/lapsus$',
'victims': 18,
'vulnerabilities': []}]