Lazarus group fireeye11/23/2023 "North Korea appears to be confident about hacking South Korea and now wants to look beyond," said Shin Jin, a professor of political science at South Korea's Chungnam National University. Its targets have included a Middle Eastern telecommunications company doing business in North Korea, a Japan-based entity associated with a United Nations group on sanctions and the general director of a Vietnamese trading company, FireEye said, declining to name the victims. Reaper has been active since at least 2012, and typically sends its targets emails laced with malware to steal confidential information. "They are probably not getting their due, considering this is a tool of the regime that can be used in all the same ways that Lazarus is being used." "They've laid low on the radar for a long time," John Hultquist, director of FireEye's intelligence unit, said by phone. North Korea has been widening its cyber-operations in pursuit of cash and intelligence in an attempt to cushion the impact of international sanctions, and Reaper underscores the challenge in fending them off. Reaper joins a growing list of hacking units linked to Kim Jong Un's regime, including "Lazarus," which the US blamed for a 2014 data theft at Sony Pictures Entertainment. The hacking group - traced to an IP address in North Korea - now infiltrates a range of industries from electronics and aerospace to automotive and health care, the cybersecurity firm said. The group, known also as APT37, in 2017 began attacking targets in Japan, Vietnam and the Middle East after having focused on its southern neighbour for years, FireEye said in a report. SEOUL - North Korean cyber-spy group "Reaper" is emerging as a global threat, conducting espionage well beyond the Korean peninsula in support of Pyongyang's military and economic interests, cyber security firm FireEye said.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |