Lazarus Group (also known by other monikers such as Guardians of Peace or Whois Team
[
]) is a
cybercrime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
group made up of an unknown number of individuals run by the government of
North Korea
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korean Peninsula and shares borders with China and Russia to the north, at the Yalu (Amnok) and ...
. While not much is known about the Lazarus Group, researchers have attributed many
cyberattacks
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an
advanced persistent threat
An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term m ...
due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include Hidden Cobra (used by the
United States Department of Homeland Security
The United States Department of Homeland Security (DHS) is the Federal government of the United States, U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the I ...
to refer to malicious cyber activity by the North Korean government in general)
and Zinc (by
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
).
The Lazarus Group has strong links to
North Korea
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korean Peninsula and shares borders with China and Russia to the north, at the Yalu (Amnok) and ...
. The
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
says that the Lazarus Group is a North Korean "state-sponsored hacking organization". According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.
North Korea benefits from conducting cyber operations because it can present an
asymmetric threat with a small group of operators, especially to South Korea.
History
The earliest known attack that the group is responsible for is known as "Operation Troy", which took place from 2009 to 2012. This was a cyber-espionage campaign that utilized unsophisticated
distributed denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connect ...
(DDoS) techniques to target the South Korean government in Seoul. They were also responsible for attacks in 2011 and 2013. It is possible that they were also behind a 2007 attack targeting South Korea, but that is still uncertain. A notable attack that the group is known for is the
2014 attack on Sony Pictures. The Sony attack used more sophisticated techniques and highlighted how advanced the group has become over time.

The Lazarus Group were reported to have stolen US$12 million from the Banco del Austro in Ecuador and US$1 million from Vietnam's
Tien Phong Bank in 2015. They have also targeted banks in Poland and Mexico.
The
2016 bank heist included an attack on the
Bangladesh Bank
Bangladesh Bank ( bn, বাংলাদেশ ব্যাংক) is the central bank of Bangladesh and is a member of the Asian Clearing Union. It is fully owned by the Government of Bangladesh.
The bank is active in developing green ba ...
, successfully stealing US$81 million and was attributed to the group. In 2017, the Lazarus group was reported to have stolen US$60 million from the Far Eastern International Bank of Taiwan although the actual amount stolen was unclear, and most of the funds were recovered.
It is not clear who is really behind the group, but media reports have suggested the group has links to
North Korea
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korean Peninsula and shares borders with China and Russia to the north, at the Yalu (Amnok) and ...
.
Kaspersky Lab
Kaspersky Lab (; Russian language, Russian: Лаборатория Касперского, Romanization of Russian, tr. ''Laboratoriya Kasperskogo'') is a Russian Multinational corporation, multinational cybersecurity and anti-virus provider head ...
reported in 2017 that Lazarus tended to concentrate on spying and infiltration cyberattacks whereas a sub-group within their organisation, which Kaspersky called Bluenoroff, specialised in financial cyberattacks. Kaspersky found multiple attacks worldwide and a direct link (
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
) between Bluenoroff and North Korea.
However, Kaspersky also acknowledged that the repetition of the code could be a “false flag” meant to mislead investigators and pin the attack on North Korea, given that the worldwide
WannaCry worm cyber attack copied techniques from the NSA as well. This ransomware leverages an NSA exploit known as
EternalBlue
EternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability.
On May 12, 2017, the ...
that a hacker group known as
Shadow Brokers
The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the " Equation Group" who are widely suspected to be a branch of ...
made public in April 2017.
Symantec Symantec may refer to:
*An American consumer software company now known as Gen Digital Inc.
*A brand of enterprise security software purchased by Broadcom Inc.
Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
reported in 2017 that it was "highly likely" that Lazarus was behind the WannaCry attack.
2009 Operation Troy
The next incident took place on July 4, 2009 and sparked the beginning of "Operation Troy". This attack utilized the
Mydoom and Dozer malware to launch a large-scale, but quite unsophisticated, DDoS attack against US and South Korean websites. The volley of attacks struck about three dozen websites and placed the text "Memory of Independence Day" in the
master boot record
A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MB ...
(MBR).
2013 South Korea Cyberattack (Operation 1Mission/ DarkSeoul)
Over time, attacks from this group have grown more sophisticated; their techniques and tools have become better developed and more effective. The March 2011 attack known as "Ten Days of Rain" targeted South Korean media, financial, and critical infrastructure, and consisted of more sophisticated DDoS attacks that originated from compromised computers within South Korea. The attacks continued on March 20, 2013 with DarkSeoul, a wiper attack that targeted three South Korean broadcast companies, financial institutes, and an ISP. At the time, two other groups going by the personas ″NewRomanic Cyber Army Team and WhoIs Team″, took credit for that attack but researchers did not know the Lazarus Group was behind it at the time. Researchers today know the Lazarus Group as a supergroup behind the disruptive attacks.
Late 2014: Sony breach
The Lazarus Group attacks culminated on November 24, 2014. On that day, a Reddit post appeared stating that
Sony Pictures
Sony Pictures Entertainment Inc. (commonly known as Sony Pictures or SPE, and formerly known as Columbia Pictures Entertainment, Inc.) is an American diversified multinational mass media and entertainment studio conglomerate that produces, acq ...
had been hacked via unknown means; the perpetrators identified themselves as the "Guardians of Peace". Large amounts of data were stolen and slowly leaked in the days following the attack. An interview with someone claiming to be part of the group stated that they had been siphoning Sony's data for over a year.
The hackers were able to access previously unreleased films, emails, and the personal information of around 4,000 employees.
Early 2016 Investigation: Operation Blockbuster
Under the name ″Operation Blockbuster″, a coalition of security companies, led by
Novetta, was able to analyse malware samples found in different cyber-security incidents. Using that data, the team was able to analyse the methods used by the hackers. They linked the Lazarus Group to a number of attacks through a pattern of code re-usage.
2016 Bangladesh Bank cyber heist
Bangladesh Bank cyber heist, was a theft that took place in February 2016. Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally transfer close to US$1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central bank of Bangladesh. Five of the thirty-five fraudulent instructions were successful in transferring US$101 million, with US$20 million traced to Sri Lanka and US$81 million to the Philippines. The Federal Reserve Bank of New York blocked the remaining thirty transactions, amounting to US$850 million, due to suspicions raised by a misspelled instruction. Cybersecurity experts claimed that the North Korea-based Lazarus Group was behind the attack.
May 2017 WannaCry ransomware attack
The
WannaCry attack was a massive ransomware cyberattack that hit institutions across the globe ranging all the way from the NHS in Britain, to Boeing, and even to Universities in China on the 12th of May, 2017. The attack lasted 7 hours and 19 minutes.
Europol estimates it affected nearly 200,000 computers in 150 countries, primarily affecting Russia, India, Ukraine, and Taiwan. This was one of the first attacks to travel via a cryptoworm. Cryptoworms are a recent form of computer virus that can travel between computers using networks, exploiting TCP port 445). To be infected, there is no need to click on a bad link - the malware can spread autonomously, from a computer to a connected printer, and then beyond to adjacent computers, perhaps connected to the wifi, etc. The port 445 vulnerability allowed the malware to move freely across intranets, and infect thousands of computers rapidly. The Wannacry attack was one of the first large scale uses of a cryptoworm.
Attack
The virus exploited a vulnerability in the Windows operating system, then encrypted the computer's data in return for a sum of Bitcoin worth roughly $300 to get the key. In order to encourage payment, the ransom demand doubled after three days, and if not paid in a week, the malware deletes the encrypted data files. The malware used a legitimate piece of software called Windows Crypto, made by Microsoft to scramble the files. Once the encryption is completed, the filename has "Wincry" appended, which is the root of the Wannacry name. Wincry was the base of the encryption, but two additional exploits, ''EternalBlue'' and ''DoublePulsar'', were used by the malware to make it a cryptoworm. ''
EternalBlue
EternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability.
On May 12, 2017, the ...
'' automatically spreads the virus through networks, while ''DoublePulsar'' triggered it to activate on a victim's computer. In other words, ''EternalBlue'' got the infected link to your computer, and ''DoublePulsar'' clicked it for you.
Marcus Hutchins brought the attack to an end, when he received a copy of the virus from a friend at a security research company and discovered a ''kill switch'' hardcoded into the virus. The malware included a periodic check to see if a specific website was running, and would only proceed with encryption if that website didn't exist. Hutchins identified this check, then promptly registered the relevant domain at 3:03 pm UTC. The malware immediately stopped propagating itself and infecting new machines. This was very interesting, and is a clue as to who created the virus. Usually stopping malware takes months of back and forth fighting between the hackers and security experts, so this easy win was unexpected. Another very interesting and unusual aspect of the attack was that the files were not recoverable after paying the ransom: only $160,000 was collected, leading many to believe that the hackers weren't after the money.
The easy kill switch and lack of revenue led many to believe that the attack was state-sponsored; the motive was not financial compensation, but just to cause chaos. After the attack security experts traced the ''DoublePulsar'' exploit back to the
United States NSA where the exploit had been developed as a
cyberweapon. The exploit was then stolen by a Russian backed hacking group, ''Shadowbrokers'', who first tried to auction it off, but after failing to do that simply gave it away for free.
The NSA subsequently revealed the vulnerability to Microsoft who issued an update on March 14, 2017,a little under a month before the attack occurred. It wasn't enough. The update wasn't mandatory and the majority of computers with the vulnerability had not resolved the issue by the time May 12 rolled around, leading to the astonishing effectiveness of the attack.
Aftermath
The
US Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
and British authorities later attributed the WannaCry attack on the North Korean hacking gang, the Lazarus group.
2017 cryptocurrency attacks
In 2018,
Recorded Future
Recorded Future is a privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.
The company specializes in the collection, processing, analysis, and dissemination of threat intelligence. Recorded Future ...
issued a report linking the Lazarus Group to attacks on cryptocurrency
Bitcoin
Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public di ...
and
Monero users mostly in South Korea.
These attacks were reported to be technically similar to previous attacks using the WannaCry ransomware and the attacks on Sony Pictures.
One of the tactics used by Lazarus hackers was to exploit vulnerabilities in
Hancom
Hancom (KOSDAQ: HAANSOFT) is an office suite software developer in South Korea. Established in 1990, the company created Hangul, a native word processing program for the Korean language.
In May 2017 Hancom lost a lawsuit in US Federal Court for ...
's
Hangul
The Korean alphabet, known as Hangul, . Hangul may also be written as following South Korea's standard Romanization. ( ) in South Korea and Chosŏn'gŭl in North Korea, is the modern official writing system for the Korean language. The ...
, a South Korean word processing software.
Another tactic was to use
spear-phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
lures containing malware and which were sent to South Korean students and users of cryptocurrency exchanges like
Coinlink. If the user opened the malware it stole email addresses and passwords.
Coinlink denied their site or users emails and passwords had been hacked.
The report concluded that “This late-2017 campaign is a continuation of North Korea’s interest in cryptocurrency, which we now know encompasses a broad range of activities including mining, ransomware, and outright theft...”
The report also said that North Korea was using these cryptocurrency attacks to avoid international financial sanctions. North Korean hackers stole US$7 million from
Bithumb
Bithumb is a South Korean cryptocurrency exchange. Founded in 2014, Bithumb Korea has 8 million registered users, 1 million mobile app users, and a current cumulative transaction volume has exceeded USD $1 trillion.
History
In October 2018, BK ...
, a South Korean exchange in February 2017. Youbit, another South Korean Bitcoin exchange company, filed for bankruptcy in December 2017 after 17% of its assets were stolen by cyberattacks following an earlier attack in April 2017. Lazarus and North Korean hackers were blamed for the attacks.
Nicehash, a cryptocurrency cloud mining marketplace lost over 4,500 Bitcoin in December 2017. An update about the investigations claimed that the attack is linked to Lazarus Group.
September 2019 attacks
In mid-September 2019, the USA issued a public alert about a new version of malware dubbed ''
ELECTRICFISH''.
Since the beginning of 2019, North Korean agents have attempted five major cyber-thefts world-wide, including a successful $49 million theft from an institution in Kuwait.
Late 2020 pharmaceutical company attacks
Due to the ongoing
COVID-19 pandemic
The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing global pandemic of coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The novel virus was first identified ...
, pharmaceutical companies became major targets for the Lazarus Group. Using spear-phishing techniques, Lazarus Group members posed as health officials and contacted pharmaceutical company employees with malicious links. It is thought that multiple major pharma organizations were targeted, but the only one that has been confirmed was the Angloswedish-owned
AstraZeneca
AstraZeneca plc () is a British-Swedish multinational pharmaceutical and biotechnology company with its headquarters at the Cambridge Biomedical Campus in Cambridge, England. It has a portfolio of products for major diseases in areas includ ...
. According to a report by Reuters, a wide range of employees were targeted, including many involved in COVID-19 vaccine research. It is unknown what the Lazarus Group's goal was in these attacks, but the likely possibilities include:
* Stealing sensitive information to be sold for profit.
* Extortion schemes.
* Giving foreign regimes access to proprietary COVID-19 research.
AstraZeneca has not commented on the incident and experts do not believe any sensitive data has been compromised as of yet.
March 2022 online game Axie Infinity attack
The FBI said "Through our investigations we were able to confirm Lazarus Group and APT38, cyber actors associated with
orth Korea Orth can refer to:
Places
* Orth, Minnesota, an unincorporated community in Nore Township, Minnesota, United States
* Orth an der Donau, a town in Gänserndorf, Lower Austria, Austria
* Orth House, a historic house in Winnetka, Illinois, United St ...
are responsible for the theft".
U.S. Sanctions
On 14 April 2022, the
US Treasury
The Department of the Treasury (USDT) is the national treasury and finance department of the federal government of the United States, where it serves as an executive department. The department oversees the Bureau of Engraving and Printing and t ...
's
OFAC
The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the U.S. Treasury Department. It administers and enforces economic and trade sanctions in support of U.S. national security and foreign policy ob ...
placed Lazarus on the
SDN List
The Specially Designated Nationals and Blocked Persons List, also known as the SDN List, is a United States government sanctions/embargo measure targeting U.S.-designated terrorists, officials and beneficiaries of certain authoritarian regimes, a ...
under North Korea Sanctions Regulations section 510.214.
Education
North Korean hackers are sent vocationally to Shenyang, China for special training. They are trained to deploy
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
of all types onto computers, computer networks, and servers. Education domestically includes the
Kim Chaek University of Technology
Kim Chaek University of Technology is a university in North Korea, on the banks of the Taedong River in Pyongyang. It is named after General Kim Chaek.
The university's programs in nuclear reactors, nuclear electronics, nuclear fuel and nuclear ...
,
Kim Il-sung University
Kim Il-sung University, founded on 1 October 1946, is the first university built in North Korea. It is located on a campus in Pyongyang, the nation's capital. Along with the main academic buildings, the campus contains 10 separate offices, 50 l ...
and Moranbong University, which picks the brightest students from across the country and puts them through six years of special education.
Units
Lazarus is believed to have two units.
BlueNorOff
BlueNorOff (also known as: APT38, Stardust Chollima, BeagleBoyz, NICKEL GLADSTONE
) is a financially motivated group that is responsible for the illegal transfers of money via forging orders from
SWIFT
Swift or SWIFT most commonly refers to:
* SWIFT, an international organization facilitating transactions between banks
** SWIFT code
* Swift (programming language)
* Swift (bird), a family of birds
It may also refer to:
Organizations
* SWIFT ...
. BlueNorOff is also called APT38 (by
Mandiant
Mandiant is an American cybersecurity firm and a subsidiary of Google. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013, Mandiant was acquired by FireEye for $1 b ...
) and Stardust Chollima (by
Crowdstrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
).
According to a 2020 report by the U.S. Army, Bluenoroff has about 1,700 members carrying out financial cybercrime by concentrating on long-term assessment and exploiting enemy network vulnerabilities and systems for financial gain for the regime or to take control of the system.
They target financial institutions and cryptocurrency exchanges, including over 16 organizations in at least 13 countries between 2014 and 2021 Bangladesh, India, Mexico, Pakistan, Philippines, South Korea, Taiwan, Turkey, Chile, and Vietnam. The revenue is believed to go towards the development of missile and nuclear technology.
BlueNorOff's most infamous attack was the 2016
Bangladesh Bank robbery in which they tried to use the
SWIFT network to illegally transfer close to US$1 billion from the
Federal Reserve Bank of New York account belonging to
Bangladesh Bank
Bangladesh Bank ( bn, বাংলাদেশ ব্যাংক) is the central bank of Bangladesh and is a member of the Asian Clearing Union. It is fully owned by the Government of Bangladesh.
The bank is active in developing green ba ...
, the central bank of Bangladesh. After several of the transactions went through (US$20 million traced to
Sri Lanka
Sri Lanka (, ; si, ශ්රී ලංකා, Śrī Laṅkā, translit-std=ISO (); ta, இலங்கை, Ilaṅkai, translit-std=ISO ()), formerly known as Ceylon and officially the Democratic Socialist Republic of Sri Lanka, is an ...
and US$81 million to the
Philippines
The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no),
* bik, Republika kan Filipinas
* ceb, Republika sa Pilipinas
* cbk, República de Filipinas
* hil, Republ ...
), The Federal Reserve Bank of New York blocked the remaining transactions, due to suspicions raised by a misspelling.
Malware associated with BlueNorOff include: "
DarkComet,
Mimikatz, Net, NESTEGG, MACKTRUCK,
WANNACRY, WHITEOUT, QUICKCAFE, RAWHIDE, SMOOTHRIDE, TightVNC, SORRYBRUTE, KEYLIME, SNAPSHOT, MAPMAKER, net.exe, sysmon, BOOTWRECK, CLEANTOAD, CLOSESHAVE, DYEPACK, Hermes, TwoPence, ELECTRICFISH, PowerRatankba, PowerSpritz"
Tactics commonly used by BlueNorOff include: phishing, backdoors,
Drive-by compromise,
Watering hole attack
Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hack ...
, exploitation of insecure out-of-date versions of
Apache Struts 2 to execute code on a system, strategic web compromise, and accessing Linux servers.
It's reported that they sometimes work together with criminal hackers.
AndAriel
AndAriel (also spelled Andarial,
and also known as: Silent Chollima, Dark Seoul, Rifle, and Wassonite
) is logistically characterized by its targeting of
South Korea
South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korea, Korean Peninsula and sharing a Korean Demilitarized Zone, land border with North Korea. Its western border is formed ...
. AndAriel's alternative name is called Silent Chollima due to the stealthy nature of the subgroup. Any organization in South Korea is vulnerable to AndAriel. Targets include government, defense, and any economic symbol.
According to a 2020 report by the U.S. Army, Andarial has about 1,600 members whose mission reconnaissance, assessment of the network vulnerabilities, and mapping the enemy network for potential attack.
In addition to South Korea, they also target other governments, infrastructure, and businesses. Attack vectors include: ActiveX, vulnerabilities in South Korean software,
watering hole attack
Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hack ...
s,
spear phishing (macro), IT management products (antivirus, PMS), and
supply chain
In commerce, a supply chain is a network of facilities that procure raw materials, transform them into intermediate goods and then final products to customers through a distribution system. It refers to the network of organizations, people, activ ...
(installers and updaters). Malware used include: Aryan,
Gh0st RAT
Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into many sensitive computer networks. It is a cyber spying computer program. The "RAT" part of the name refers to the software's ability to operate ...
, Rifdoor, Phandoor, and Andarat.
Indictments
In February 2021, the
US Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
indicted three members of the
Reconnaissance General Bureau
The Reconnaissance General Bureau ( ko, 정찰총국; RGB, Reconnaissance Bureau of the General Staff Department) is a North Korean intelligence agency that manages the state's clandestine operations. Most of their operations have a specific foc ...
, a North Korean military intelligence agency, for having participated in several Lazarus hacking campaigns: Jin Hyok, Jon Chang Hyok and Kim Il. Park Jin Hyok had already been indicted earlier in September 2018. The individuals are not in U.S. custody. A Canadian and two Chinese individuals have also been charged with having acted as
money mule
Money is any item or verifiable record that is generally accepted as payment for goods and services and repayment of debts, such as taxes, in a particular country or socio-economic context. The primary functions which distinguish money are as ...
s and money launderers for the Lazarus group.
Coverage
The group was the subject of a
BBC World Service
The BBC World Service is an international broadcasting, international broadcaster owned and operated by the BBC, with funding from the Government of the United Kingdom, British Government through the Foreign Secretary, Foreign Secretary's o ...
podcast ''The Lazarus Heist'' broadcast in 2021. The second season is coming out in mid 2022.
See also
*
North Korea–United States relations
*
Ricochet Chollima
Ricochet Chollima (also known as APT 37, Reaper, and ScarCruft) is a North Korean state backed hacker group that is believed to have created sometime before 2016 and is typically involved in operations against financial institutions to generate ass ...
*
Kimsuky
Kimsuky (also known as Velvet Chollima and Black Banshee) is a North Korean state backed hacker group that targets South Korean think tanks, industry, nuclear power operators, and the South Korean Ministry of Unification for espionage purposes. In ...
*
Park Jin Hyok
*
unit 121
Bureau 121 is a North Korean cyberwarfare agency, and the main unit of the Reconnaissance General Bureau of North Korea's military.
It conducts offensive cyber operations, including espionage and cyber-enabled finance crime. According to Amer ...
Notes
References
Sources
* Virus News (2016). "Kaspersky Lab Helps to Disrupt the Activity of the Lazarus Group Responsible for Multiple Devastating Cyber-Attacks", ''Kaspersky Lab''.
* RBS (2014). "A Breakdown and Analysis of the December 2014 Sony Hack". ''RiskBased Security.''
* Cameron, Dell (2016). "Security Researchers Say Mysterious 'Lazarus Group' Hacked Sony in 2014", ''The Daily Dot.''
* Zetter, Kim (2014). "Sony Got Hacked Hard: What We Know and Don't Know So Far", ''Wired.''
* Zetter, Kim (2016). "Sony Hackers Were Causing Mayhem Years Before They Hit The Company", ''Wired.''
External links
Indictment of Park Jin Hyok, September 2018Indictment of Park Jin Hyok, Jon Chang Hyok and Kim Il, January 2020*
The Lazarus Heist' 10 part podcast from
BBC World Service
The BBC World Service is an international broadcasting, international broadcaster owned and operated by the BBC, with funding from the Government of the United Kingdom, British Government through the Foreign Secretary, Foreign Secretary's o ...
.
{{Hacking in the 2010s
Cyberattacks
North Korean advanced persistent threat groups
Hacking in the 2000s
Hacking in the 2010s
Cyberattack gangs
North Korean entities subject to the U.S. Department of the Treasury sanctions
Cybercrime in India
Specially Designated Nationals and Blocked Persons List