

ICS Layer download view Techniques Used DomainĪccess Token Manipulation: Create Process with Token Virtualization/Sandbox Evasion: System Checks, Virtualization/Sandbox Evasion: Time Based Evasion, System Location Discovery: System Language Discovery,
Lazarus group software#
Server Software Component: IIS Components, Search Open Websites/Domains: Social Media,
Lazarus group code#
Obtain Capabilities: Code Signing Certificates, Obfuscated Files or Information: Software Packing, Gather Victim Org Information: Identify Roles,
Lazarus group archive#
Īpplication Layer Protocol: Web Protocols,Īrchive Collected Data: Archive via Utility,īoot or Logon Autostart Execution: Registry Run Keys / Startup Folder,Ĭommand and Scripting Interpreter: PowerShell,Ĭommand and Scripting Interpreter: Windows Command Shell,Ĭommand and Scripting Interpreter: Visual Basic,ĭevelop Capabilities: Code Signing Certificates,Įncrypted Channel: Symmetric Cryptography,Įstablish Accounts: Social Media Accounts,Įxfiltration Over Web Service: Exfiltration to Cloud Storage, Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. “It seems to be an ongoing strategy for them to supplement and make money through this activity,” Huntley told CNN.Live Version Associated Group Descriptions Name Shane Huntley, who leads Google’s Threat Analysis Group, said that if a Google user has “any link to being involved in Bitcoin or cryptocurrency” and they get a warning about state-backed hacking from Google, it almost always ends up being North Korean activity. Google has a policy of notifying users who are targeted by state-sponsored hackers. Researchers at Google last month disclosed two different alleged North Korean hacking campaigns targeting US media and IT organizations, and cryptocurrency and financial technology sectors. While many cybersecurity analysts’ attention has been on Russian hacking in light of the war in Ukraine, suspected North Korean hackers have been far from quiet. “As long as they are successful and profitable, they will not stop.” “A hack of a cryptocurrency business, unlike a retailer, for example, is essentially bank robbery at the speed of the internet and funds North Korea’s destabilizing activity and weapons proliferation,” said Ari Redbord, head of legal affairs at TRM Labs, a firm that investigates financial crime. Lazarus Group has stolen an estimated $1.75 billion worth of cryptocurrency in recent years, according to Chainalysis, a firm that tracks digital currency transactions. North Korea last month fired what is believed to be its first intercontinental ballistic missile in more than four years. Treasury sanctioned the specific “wallet,” or cryptocurrency address, that was used to cash out on the Axie Infinity hack.Ĭyberattacks have been an important source of revenue for the North Korean regime for years as its leader, Kim Jong Un, has continued to pursue nuclear weapons, according to a United Nations panel and outside cybersecurity experts. The US Treasury Department on Thursday sanctioned Lazarus Group, a wide swath of hackers believed to work on behalf of the North Korean government.

Sky Mavis, the company that created Axie Infinity, announced on March 29 that unidentified hackers had stolen the equivalent of roughly $600 million – valued at the time of the hack’s discovery – on March 23 from a “bridge,” or network that allows users to send cryptocurrency from one blockchain to another. The FBI was referring to the recent hack of a computer network used by Axie Infinity, a video game that allows players to earn cryptocurrency.

“DPRK” is an abbreviation for North Korea’s official name, the Democratic People’s Republic of Korea, and Ethereum is a technology platform associated with a type of cryptocurrency. “Through our investigation we were able to confirm Lazarus Group and APT38, cyber actors associated with the DPRK, are responsible for the theft of $620 million in Ethereum reported on March 29th,” the FBI said in a statement. The FBI on Thursday blamed hackers associated with the North Korean government for stealing more than $600 million in cryptocurrency last month from a video gaming company – the latest in a string of audacious cyber heists tied to Pyongyang.
