On February 29 and March 1, 2016, a North Korean IP Address connected to that IP address. That IP address was also a command-and-control address for a sample of malware obtained by the FBI that drops a malware payload in a similar way to how other malware that private cyber security companies have attributed to the Lazarus Group, as well as malware that the subjects used to target Lockheed Martin. An example: Both a WannaCry sample and Trojan.Alphanc used IP address 84.92.36.96 as a command-and-control IP address. The DOJ indictment breaks down several of these connections in their indictment. The company had offices in North Korea and China, and Park was sent to work for many years in the company's Chinese office in the city of Dalian. South Korean officials pulled out of the deal, but the North Korean government continued to manage the company through various individuals, branching out in different online services, such as online gaming and gambling. Investigators say that Chosun Expo was founded as a joint venture between the South and North Korean governments, and was meant to be an e-commerce and lottery website. The DOJ says Park was an active member of a government-sponsored hacking team known in the private cyber-security sector as the Lazarus Group.īut in reality, officials say, he was also a government employee working for a government-owned company named Chosun Expo Joint Venture (Chosun Expo hereinafter). Hacks of banks all over the world from 2015 through 2018.Īlso: Free, easy to use, and available to anyone: The powerful malware hiding in plain sight on the open web.A long string of hacks of South Korean news media organizations, banks, and military entities across several years, and.Breaches at US movie theatre chains AMC Theatres and Mammoth Screen in 2014.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |