Lazarus Group: Difference between revisions
→Education: citation |
HiMyNameJack (talk | contribs) Added in new information about Lazarus Group's internal name and education process. |
||
Line 25: | Line 25: | ||
'''Lazarus Group''' (also known by other monikers such as '''Guardians of Peace''' or '''Whois Team''') is a [[cybercrime]] group made up of an unknown number of individuals. While not much is known about the Lazarus Group, researchers have attributed many [[cyberattacks]] to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an [[advanced persistent threat]] due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity firms include '''HIDDEN COBRA''' (by the [[United States Intelligence Community]])<ref>{{Cite web |last=Volz |date=September 16, 2019 |title=U.S. Targets North Korean Hacking as National-Security Threat |url=https://www.msn.com/en-us/news/world/us-targets-north-korean-hacking-as-national-security-threat/ar-AAHkAGU?ocid=ientp |website=MSN}}</ref> and '''Zinc''' (by [[Microsoft]]).<ref>{{Cite web |date=2017-12-19 |title=Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats |url=https://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/ |access-date=2019-08-16 |website=Microsoft on the Issues |language=en-US}}</ref><ref>{{Cite web |title=FBI thwarts Lazarus-linked North Korean surveillance malware |url=https://www.itpro.co.uk/go/33609 |access-date=2019-08-16 |website=IT PRO |language=en}}</ref><ref name="recorded">{{Cite news |last=Guerrero-Saade |first=Juan Andres |last2=Moriuchi |first2=Priscilla |date=January 16, 2018 |title=North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign |publisher=[[Recorded Future]] |url=https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/ |archive-url=https://web.archive.org/web/20180116170903/https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/ |archive-date=January 16, 2018}}</ref> |
'''Lazarus Group''' (also known by other monikers such as '''Guardians of Peace''' or '''Whois Team''') is a [[cybercrime]] group made up of an unknown number of individuals. While not much is known about the Lazarus Group, researchers have attributed many [[cyberattacks]] to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an [[advanced persistent threat]] due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity firms include '''HIDDEN COBRA''' (by the [[United States Intelligence Community]])<ref>{{Cite web |last=Volz |date=September 16, 2019 |title=U.S. Targets North Korean Hacking as National-Security Threat |url=https://www.msn.com/en-us/news/world/us-targets-north-korean-hacking-as-national-security-threat/ar-AAHkAGU?ocid=ientp |website=MSN}}</ref> and '''Zinc''' (by [[Microsoft]]).<ref>{{Cite web |date=2017-12-19 |title=Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats |url=https://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/ |access-date=2019-08-16 |website=Microsoft on the Issues |language=en-US}}</ref><ref>{{Cite web |title=FBI thwarts Lazarus-linked North Korean surveillance malware |url=https://www.itpro.co.uk/go/33609 |access-date=2019-08-16 |website=IT PRO |language=en}}</ref><ref name="recorded">{{Cite news |last=Guerrero-Saade |first=Juan Andres |last2=Moriuchi |first2=Priscilla |date=January 16, 2018 |title=North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign |publisher=[[Recorded Future]] |url=https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/ |archive-url=https://web.archive.org/web/20180116170903/https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/ |archive-date=January 16, 2018}}</ref> |
||
The Lazarus Group has strong links to [[North Korea]].<ref>{{Cite web |title=Who is Lazarus? North Korea's Newest Cybercrime Collective |url=https://www.cyberpolicy.com/cybersecurity-education/who-is-lazarus-north-koreas-newest-cybercrime-collective |access-date=2020-08-26 |website=www.cyberpolicy.com}}</ref><ref>{{Cite web |last=Beedham |first=Matthew |date=2020-01-09 |title=North Korean hacker group Lazarus is using Telegram to steal cryptocurrency |url=https://thenextweb.com/hardfork/2020/01/09/north-korea-hacker-group-lazarus-telegram-steal-cryptocurrency-bitcoin/ |access-date=2020-08-26 |website=Hard Fork {{!}} The Next Web |language=en-us}}</ref> The [[United States]] [[Federal Bureau of Investigation]] says that the Lazarus Group is a North Korean "state-sponsored hacking organization".<ref>{{Cite web |title=PARK JIN HYOK |url=https://www.fbi.gov/wanted/cyber/park-jin-hyok |access-date=2020-08-26 |website=Federal Bureau of Investigation |language=en-us}}</ref> |
The Lazarus Group has strong links to [[North Korea]].<ref>{{Cite web |title=Who is Lazarus? North Korea's Newest Cybercrime Collective |url=https://www.cyberpolicy.com/cybersecurity-education/who-is-lazarus-north-koreas-newest-cybercrime-collective |access-date=2020-08-26 |website=www.cyberpolicy.com}}</ref><ref>{{Cite web |last=Beedham |first=Matthew |date=2020-01-09 |title=North Korean hacker group Lazarus is using Telegram to steal cryptocurrency |url=https://thenextweb.com/hardfork/2020/01/09/north-korea-hacker-group-lazarus-telegram-steal-cryptocurrency-bitcoin/ |access-date=2020-08-26 |website=Hard Fork {{!}} The Next Web |language=en-us}}</ref> The [[United States]] [[Federal Bureau of Investigation]] says that the Lazarus Group is a North Korean "state-sponsored hacking organization".<ref>{{Cite web |title=PARK JIN HYOK |url=https://www.fbi.gov/wanted/cyber/park-jin-hyok |access-date=2020-08-26 |website=Federal Bureau of Investigation |language=en-us}}</ref>According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.<ref name=":6">{{Cite news|date=2021-10-10|title=Drugs, arms, and terror: A high-profile defector on Kim's North Korea|language=en-GB|work=BBC News|url=https://www.bbc.com/news/world-asia-58838834|access-date=2021-10-11}}</ref> |
||
== History == |
== History == |
||
Line 84: | Line 84: | ||
== Education == |
== Education == |
||
North Korean hackers are sent vocationally to Shenyang, China for special training. They are trained to deploy [[malware]] of all types onto computers, computer networks, and servers. Education domestically includes the [[Kim Chaek University of Technology]] |
North Korean hackers are sent vocationally to Shenyang, China for special training. They are trained to deploy [[malware]] of all types onto computers, computer networks, and servers. Education domestically includes the [[Kim Chaek University of Technology]], [[Kim Il-sung University]] and Moranbong University, which picks the brightest students from across the country and puts them through six years of special education.<ref name=":6" /><ref>{{cite news |title=How barely connected North Korea became a hacking superpower |url=https://www.scmp.com/news/world/article/2131470/north-korea-barely-wired-so-how-did-it-become-global-hacking-power |access-date=10 October 2021 |work=South China Morning Post |date=1 February 2018 |language=en}}</ref> |
||
== Units == |
== Units == |
Revision as of 05:52, 11 October 2021
나사로 그룹 | |
Formation | c. 2009[1] |
---|---|
Type | Advanced persistent threat |
Purpose | Cyberespionage, cyberwarfare |
Region | Pyongyang, North Korea |
Methods | Zero-days, spearphishing, malware, disinformation, backdoors, droppers |
Official language | Korean |
Parent organization | Reconnaissance General Bureau Korea Computer Center |
Affiliations | Unit 180, AndAriel |
Formerly called | APT38 Gods Apostles Gods Disciples Guardians of Peace ZINC Whois Team Hidden Cobra |
Lazarus Group (also known by other monikers such as Guardians of Peace or Whois Team) is a cybercrime group made up of an unknown number of individuals. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity firms include HIDDEN COBRA (by the United States Intelligence Community)[1] and Zinc (by Microsoft).[2][3][4]
The Lazarus Group has strong links to North Korea.[5][6] The United States Federal Bureau of Investigation says that the Lazarus Group is a North Korean "state-sponsored hacking organization".[7]According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.[8]
History
The earliest known attack that the group is responsible for is known as "Operation Troy", which took place from 2009 to 2012. This was a cyber-espionage campaign that utilized unsophisticated distributed denial-of-service attack (DDoS) techniques to target the South Korean government in Seoul. They were also responsible for attacks in 2011 and 2013. It is possible that they were also behind a 2007 attack targeting South Korea, but that is still uncertain.[9] A notable attack that the group is known for is the 2014 attack on Sony Pictures. The Sony attack used more sophisticated techniques and highlighted how advanced the group has become over time.
The Lazarus Group were reported to have stolen US$12 million from the Banco del Austro in Ecuador and US$1 million from Vietnam's Tien Phong Bank in 2015.[10] They have also targeted banks in Poland and Mexico.[11] The 2016 bank heist[12] included an attack on the Bangladesh Bank, successfully stealing US$81 million and was attributed to the group. In 2017, the Lazarus group was reported to have stolen US$60 million from the Far Eastern International Bank of Taiwan although the actual amount stolen was unclear, and most of the funds were recovered.[11]
It is not clear who is really behind the group, but media reports have suggested the group has links to North Korea.[13] [14][11] Kaspersky Lab reported in 2017 that Lazarus tended to concentrate on spying and infiltration cyberattacks whereas a sub-group within their organisation, which Kaspersky called Bluenoroff, specialised in financial cyberattacks. Kaspersky found multiple attacks worldwide and a direct link (IP address) between Bluenoroff and North Korea.[15]
However, Kaspersky also acknowledged that the repetition of the code could be a “false flag” meant to mislead investigators and pin the attack on North Korea, given that the worldwide WannaCry worm cyber attack copied techniques from the NSA as well. This ransomware leverages an NSA exploit known as EternalBlue that a hacker group known as Shadow Brokers made public in April 2017. [16] Symantec reported in 2017 that it was "highly likely" that Lazarus was behind the WannaCry attack.[17]
2009 Operation Troy
The next incident took place on July 4, 2009 and sparked the beginning of "Operation Troy." This attack utilized the Mydoom and Dozer malware to launch a large-scale, but quite unsophisticated, DDoS attack against US and South Korean websites. The volley of attacks struck about three dozen websites and placed the text "Memory of Independence Day" in the master boot record (MBR).
2013 South Korea Cyberattack (Operation 1Mission/ DarkSeoul)
Over time, attacks from this group have grown more sophisticated; their techniques and tools have become better developed and more effective. The March 2011 attack known as "Ten Days of Rain" targeted South Korean media, financial, and critical infrastructure, and consisted of more sophisticated DDoS attacks that originated from compromised computers within South Korea. The attacks continued on March 20, 2013 with DarkSeoul, a wiper attack that targeted three South Korean broadcast companies, financial institutes, and an ISP. At the time, two other groups going by the personas ″NewRomanic Cyber Army Team and WhoIs Team″, took credit for that attack but researchers did not know the Lazarus Group was behind it at the time. Researchers today know the Lazarus Group as a supergroup behind the disruptive attacks.[18]
Late 2014: Sony breach
The Lazarus Group attacks culminated on November 24, 2014. On that day, a Reddit post appeared stating that Sony Pictures had been hacked via unknown means; the perpetrators identified themselves as the "Guardians of Peace". Large amounts of data were stolen and slowly leaked in the days following the attack. An interview with someone claiming to be part of the group stated that they had been siphoning Sony's data for over a year. [19]
The hackers were able to access previously unreleased films, emails, and the personal information of around 4,000 employees. [20]
Early 2016 Investigation: Operation Blockbuster
Under the name ″Operation Blockbuster″, a coalition of security companies, led by Novetta,[21][22] was able to analyse malware samples found in different cyber-security incidents. Using that data, the team was able to analyse the methods used by the hackers. They linked the Lazarus Group to a number of attacks through a pattern of code re-usage.[23]
2016 Bangladesh Bank cyber heist
Bangladesh Bank cyber heist, was a theft that took place in February 2016. Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally transfer close to US$1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central bank of Bangladesh. Five of the thirty-five fraudulent instructions were successful in transferring US$101 million, with US$20 million traced to Sri Lanka and US$81 million to the Philippines. The Federal Reserve Bank of New York blocked the remaining thirty transactions, amounting to US$850 million, due to suspicions raised by a misspelled instruction.[24] Cybersecurity experts claimed that the North Korea-based Lazarus Group was behind the attack.[25][26]
Mid 2017 WannaCry Attack
The WannaCry malware that affected as many as 300,000 computers worldwide are likely authored by hackers from southern China, Hong Kong, Taiwan or Singapore, said a US intelligence company.[27] The president of Microsoft attributed the WannaCry attack to North Korea.[28]
2017 cryptocurrency attacks
In 2018, Recorded Future issued a report linking the Lazarus Group to attacks on cryptocurrency Bitcoin and Monero users mostly in South Korea.[29] These attacks were reported to be technically similar to previous attacks using the WannaCry ransomware and the attacks on Sony Pictures.[30] One of the tactics used by Lazarus hackers was to exploit vulnerabilities in Hancom's Hangul, a South Korean word processing software.[30] Another tactic was to use spear-phishing lures containing malware and which were sent to South Korean students and users of cryptocurrency exchanges like Coinlink. If the user opened the malware it stole email addresses and passwords.[31] Coinlink denied their site or users emails and passwords had been hacked.[31] The report concluded that “This late-2017 campaign is a continuation of North Korea’s interest in cryptocurrency, which we now know encompasses a broad range of activities including mining, ransomware, and outright theft...” [29] The report also said that North Korea was using these cryptocurrency attacks to get round international financial sanctions.[32] North Korean hackers stole US$7 million from Bithumb, a South Korean exchange in February 2017.[33] Youbit, another South Korean Bitcoin exchange company, filed for bankruptcy in December 2017 after 17% of its assets were stolen by cyberattacks following an earlier attack in April 2017.[34] Lazarus and North Korean hackers were blamed for the attacks.[35][29] Nicehash, a cryptocurrency cloud mining marketplace lost over 4,500 Bitcoin in December 2017. An update about the investigations claimed that the attack is linked to Lazarus Group.[36]
September 2019 attacks
In mid-September 2019, the USA issued a public alert about a new version of malware dubbed ELECTRICFISH.[37] Since the beginning of 2019, North Korean agents have attempted five major cyber-thefts world-wide, including a successful $49 million theft from an institution in Kuwait.[37]
Late 2020 pharmaceutical company attacks
Due to the ongoing COVID-19 pandemic, pharmaceutical companies became major targets for the Lazarus Group. Using spear-phishing techniques, Lazarus Group members posed as health officials and contacted pharmaceutical company employees with malicious links. It is thought that multiple major pharma organizations were targeted, but the only one that has been confirmed was the Angloswedish-owned AstraZeneca. According to a report by Reuters,[38] a wide range of employees were targeted, including many involved in COVID-19 vaccine research. It is unknown what the Lazarus Group's goal was in these attacks, but the likely possibilities include:
- Stealing sensitive information to be sold for profit.
- Extortion schemes.
- Giving foreign regimes access to proprietary COVID-19 research.
AstraZeneca has not commented on the incident and experts do not believe any sensitive data has been compromised as of yet.[as of?]
Education
North Korean hackers are sent vocationally to Shenyang, China for special training. They are trained to deploy malware of all types onto computers, computer networks, and servers. Education domestically includes the Kim Chaek University of Technology, Kim Il-sung University and Moranbong University, which picks the brightest students from across the country and puts them through six years of special education.[8][39]
Units
Lazarus is believed to have two units.[40]
BlueNorOff
BlueNorOff is a financially motivated group that is responsible for the illegal transfers of money via forging orders from SWIFT. BlueNorOff is also called APT38 (by Mandiant) and Stardust Chollima (by Crowdstrike).[41][42]
AndAriel
AndAriel is logistically characterized by its targeting of South Korea. AndAriel's alternative name is called Silent Chollima due to the stealthy nature of the subgroup.[43] Any organization in South Korea is vulnerable to AndAriel. Targets include government, defense, and any economic symbol.[44][45]
Indictments
In February 2021, the US Department of Justice indicted three members of the Reconnaissance General Bureau, a North Korean military intelligence agency, for having participated in several Lazarus hacking campaigns: Jin Hyok, Jon Chang Hyok and Kim Il. Park Jin Hyok had already been indicted earlier in September 2018. The individuals are not in U.S. custody. A Canadian and two Chinese individuals have also been charged with having acted as money mules and money launderers for the Lazarus group.[46]
See also
References
- ^ Volz (September 16, 2019). "U.S. Targets North Korean Hacking as National-Security Threat". MSN.
- ^ "Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats". Microsoft on the Issues. 2017-12-19. Retrieved 2019-08-16.
- ^ "FBI thwarts Lazarus-linked North Korean surveillance malware". IT PRO. Retrieved 2019-08-16.
- ^ Guerrero-Saade, Juan Andres; Moriuchi, Priscilla (January 16, 2018). "North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign". Recorded Future. Archived from the original on January 16, 2018.
- ^ "Who is Lazarus? North Korea's Newest Cybercrime Collective". www.cyberpolicy.com. Retrieved 2020-08-26.
- ^ Beedham, Matthew (2020-01-09). "North Korean hacker group Lazarus is using Telegram to steal cryptocurrency". Hard Fork | The Next Web. Retrieved 2020-08-26.
- ^ "PARK JIN HYOK". Federal Bureau of Investigation. Retrieved 2020-08-26.
- ^ a b "Drugs, arms, and terror: A high-profile defector on Kim's North Korea". BBC News. 2021-10-10. Retrieved 2021-10-11.
- ^ "Security researchers say mysterious 'Lazarus Group' hacked Sony in 2014". The Daily Dot. Retrieved 2016-02-29.
- ^ "SWIFT attackers' malware linked to more financial attacks". Symantec. 2016-05-26. Retrieved 2017-10-19.
- ^ a b c Ashok, India (2017-10-17). "Lazarus: North Korean hackers suspected to have stolen millions in Taiwan bank cyberheist". International Business Times UK. Retrieved 2017-10-19.
- ^ "Two bytes to $951m". baesystemsai.blogspot.co.uk. Retrieved 2017-05-15.
- ^ "Cyber attacks linked to North Korea, security experts claim". The Telegraph. 2017-05-16. Retrieved 2017-05-16.
- ^ Solon, Olivia (2017-05-15). "WannaCry ransomware has links to North Korea, cybersecurity experts say". The Guardian. ISSN 0261-3077. Retrieved 2017-05-16.
- ^ GReAT - Kaspersky Lab's Global Research & Analysis Team (2017-03-03). "Lazarus Under The Hood". Securelist. Retrieved 2017-05-16.
- ^ The WannaCry Ransomware Has a Link to Suspected North Korean Hackers (2017-03-03). "The Wired". Securelist. Retrieved 2017-05-16.
- ^ "More evidence for WannaCry 'link' to North Korean hackers". BBC News. 2017-05-23. Retrieved 2017-05-23.
- ^ "The Sony Hackers Were Causing Mayhem Years Before They Hit the Company". WIRED. Retrieved 2016-03-01.
- ^ "Sony Got Hacked Hard: What We Know and Don't Know So Far". WIRED. Retrieved 2016-03-01.
- ^ "A Breakdown and Analysis of the December, 2014 Sony Hack". www.riskbasedsecurity.com. Retrieved 2016-03-01.
- ^ Van Buskirk, Peter (2016-03-01). "Five Reasons Why Operation Blockbuster Matters". Novetta. Retrieved 2017-05-16.
- ^ "Novetta Exposes Depth of Sony Pictures Attack — Novetta". 24 February 2016.
- ^ "Kaspersky Lab helps to disrupt the activity of the Lazarus Group responsible for multiple devastating cyber-attacks | Kaspersky Lab". www.kaspersky.com. Archived from the original on 2016-09-01. Retrieved 2016-02-29.
- ^ Schram, Jamie (22 March 2016). "Congresswoman wants probe of 'brazen' $81M theft from New York Fed". New York Post.
- ^ "Cybercriminal Lazarus group hacked Bangladesh Bank". thedailystar.net. April 20, 2017. Retrieved 13 May 2021.
- ^ "US charges North Korean over Bangladesh Bank hack". finextra.com. 6 September 2018. Retrieved 13 May 2021.
- ^ Linguistic analysis shows WannaCry ransom notes written by southern Chinese, says US intelligence firm (2017-05-15). "The Straits times". Securelist. Retrieved 2017-05-16.
- ^ Harley, Nicola (2017-10-14). "North Korea behind WannaCry attack which crippled the NHS after stealing US cyber weapons, Microsoft chief claims". The Telegraph. ISSN 0307-1235. Retrieved 2017-10-14.
- ^ a b c Al Ali, Nour (2018-01-16). "North Korean Hacker Group Seen Behind Crypto Attack in South". Bloomberg.com. Retrieved 2018-01-17.
- ^ a b Kharpal, Arjun (2018-01-17). "North Korea government-backed hackers are trying to steal cryptocurrency from South Korean users". CNBC. Retrieved 2018-01-17.
- ^ a b Mascarenhas, Hyacinth (2018-01-17). "Lazarus: North Korean hackers linked to Sony hack were behind cryptocurrency attacks in South Korea". International Business Times UK. Retrieved 2018-01-17.
- ^ Limitone, Julia (2018-01-17). "Bitcoin, cryptocurrencies targeted by North Korean hackers, report reveals". Fox Business. Retrieved 2018-01-17.
- ^ Ashford, Warwick (2018-01-17). "North Korean hackers tied to cryptocurrency attacks in South Korea". Computer Weekly. Retrieved 2018-01-17.
- ^ "South Korean crypto exchange files for bankruptcy after hack". The Straits Times. 2017-12-20. Retrieved 2018-01-17.
- ^ "Bitcoin exchanges targeted by North Korean hackers, analysts say". MSN Money. 2017-12-21. Archived from the original on 2018-01-18. Retrieved 2018-01-17.
- ^ "NiceHash security breach investigation update - NiceHash". NiceHash. Retrieved 2018-11-13.
- ^ a b Volz (September 16, 2019). "U.S. Targets North Korean Hacking as National-Security Threat". MSN. Retrieved September 16, 2019.
- ^ Stubbs, Jack (November 27, 2020). "Exclusive: Suspected North Korean hackers targeted COVID vaccine maker AstraZeneca - sources". Reuters.
- ^ "How barely connected North Korea became a hacking superpower". South China Morning Post. 1 February 2018. Retrieved 10 October 2021.
- ^ EST, Jason Murdock On 3/9/18 at 9:54 AM (2018-03-09). "As Trump cozies up to Kim Jong-un, North Korean hackers target major banks". Newsweek. Retrieved 2019-08-16.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ Meyers, Adam (2018-04-06). "STARDUST CHOLLIMA | Threat Actor Profile | CrowdStrike". Retrieved 2019-08-16.
- ^ https://threatpost.com/lazarus-apt-spinoff-linked-to-banking-hacks/124746/
- ^ Alperovitch, Dmitri (2014-12-19). "FBI Implicates North Korea in Destructive Attacks". Retrieved 2019-08-16.
- ^ Sang-Hun, Choe (2017-10-10). "North Korean Hackers Stole U.S.-South Korean Military Plans, Lawmaker Says". The New York Times. ISSN 0362-4331. Retrieved 2019-08-16.
- ^ Huss, Darien. "North Korea Bitten by Bitcoin Bug" (PDF). proofpoint.com. Retrieved 2019-08-16.
- ^ Cimpanu, Catalin (February 17, 2021). "US charges two more members of the 'Lazarus' North Korean hacking group". ZDNet. Retrieved 2021-02-20.
{{cite web}}
: CS1 maint: url-status (link)
Sources
- Virus News (2016). "Kaspersky Lab Helps to Disrupt the Activity of the Lazarus Group Responsible for Multiple Devastating Cyber-Attacks", Kaspersky Lab.
- RBS (2014). "A Breakdown and Analysis of the December, 2014 Sony Hack". RiskBased Security.
- Cameron, Dell (2016). "Security Researchers Say Mysterious 'Lazarus Group' Hacked Sony in 2014", The Daily Dot.
- Zetter, Kim (2014). "Sony Got Hacked Hard: What We Know and Don't Know So Far", Wired.
- Zetter, Kim (2016). "Sony Hackers Were Causing Mayhem Years Before They Hit The Company", Wired.
External links
- Indictment of Park Jin Hyok, September 2018
- Indictment of Park Jin Hyok, Jon Chang Hyok and Kim Il, January 2020