Lazarus Group: North Korea's Cybercrime Strike Force

The Lazarus Group, an organization of hackers sponsored by the North Korean state, has been responsible for billions of dollars of crypto thefts.

Lazarus Group: North Korea's Cybercrime Strike Force

In the ever-evolving landscape of cyber warfare, few entities have proven as formidable and financially successful as North Korea's Lazarus Group, or "Hidden Cobra". With well-established ties to the North Korean regime, this group represents the intersection of cybercrime and statecraft: A strike force tasked by North Korea's secretive regime to generate revenues for Pyongyang by robbing and extorting high-value online targets.

Shrouded In Mystery

The Lazarus Group's origins remain unclear. However, global intelligence agencies, from the US to South Korea, are unanimous that the organization is affiliated with the North Korean regime. In a world of stringent sanctions and economic checks, its cyber capabilities have provided Pyongyang with a covert avenue to further its interests. The group has been responsible for a number of major hacks and exploits, including:

  1. Sony Pictures, 2014: Beyond the media frenzy around the hack—perceived retaliation for a film that painted North Korea in a poor light—there lay a clear financial motive. The cyber onslaught damaged Sony's assets and reputation, offering a chilling reminder of the economic repercussions of state-sponsored hacks.
  2. Bangladesh Bank, 2016: The Lazarus Group demonstrated its expertise when it exploited the SWIFT banking system, making off with $81 million from Bangladesh Bank. The foiled attempt at nearly $1 billion showcased both their ambition and emerging prowess in financial systems infiltration.
  3. Cryptocurrency Attacks: Recent years have seen the group pivot towards cryptocurrency exchanges—a transparent move to sidestep global financial restrictions. Their operations, often sophisticated, underline an attempt to amass unregulated and non-traceable assets.

The Lazarus Group has been responsible for billions of dollars worth of crypto thefts, including the Ronin and Harmony bridge hacks, and Atomic wallet hack.

Operational Techniques

The Lazarus Group often leverages spear-phishing—a targeted deception strategy. Their modus operandi often involves tailored emails that trick recipients into initiating malicious downloads, providing them the ingress they need. This was the case with the recent $35 million Atomic wallet hack.

However, they are also highly capable of using sophisticated smart contract exploits and more conventional attacks, such as compromising company servers. The Ronin bridge hack netted almost $600 million in this way.

Geopolitical Context

The Lazarus Group's undertakings resonate beyond the cyber realm. They reflect North Korea's adaptation to global financial ecosystems and their numerous strategies to counteract the effect of extensive economic sanctions. While overtly a tool for financial gain, their cyber activities implicitly underscore North Korea's political posturing in the digital age.

As the demarcation between cybercrime and state activities blurs, entities like the Lazarus Group will demand increased attention from the financial sectors they target. The stakes are not just monetary but also foundational, testing the resilience and security of global financial infrastructures.


Subscribe to our newsletter and follow us on Twitter.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to REX Wire.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.