![Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems](https://www.nextron-systems.com/wp-content/uploads/2023/03/Screenshot-2023-03-31-at-15.18.55.png)
Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems
![How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium](https://miro.medium.com/v2/resize:fit:1400/1*tTxbUq4-aRcwzlPKYCoi2g.png)
How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium
![Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems](https://www.nextron-systems.com/wp-content/uploads/2023/03/Screenshot-2023-03-31-at-14.42.20.png)
Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems
![Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems](https://www.nextron-systems.com/wp-content/uploads/2023/03/Screenshot-2023-03-31-at-18.08.31.png)
Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems
![Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems](https://www.nextron-systems.com/wp-content/uploads/2023/03/Screenshot-2023-03-31-at-15.15.03.png)