🛡️
./Malfav.asm
Linkedin
  • 👋./Malfav.asm
    • 🕸️Malfav Agenda
  • 🕷️Malware Introduction
    • 💡What is Malware
      • 🌠FIN Malware
      • 🦘Cyber Gang Malware
        • 🕷️Spiders Malware
      • 🕵️‍♀️Cyber Espionage Malware
      • 🍘Cyber Sabotage Malware
      • 🛴Rootkit
        • 🫚Bootkit
    • 🦫Nations State APT
      • 🗯️APT
      • 🇮🇷Iran APT
      • 🇷🇺Russian APT
      • 🇨🇳Chines APT
      • 🇮🇳India APT
      • 🇵🇰Pakistan APT
      • 🇻🇳Vietnamese APT
      • 🇰🇵North Korean APT
    • 🥋Mobile Malware
      • 📲Android Malware
        • 💰Commerical Android Malware
          • Common Android Spyware
        • 🧧Common Android Exploits
          • 0️Common Android 0day
      • 📱IPHONE Malware
        • 🐚Common IPHONE Spyware
        • 💥Commerical IPHONE Malware
        • 💣Common IPHONE Exploits
    • 📃Malicious Documents
      • 📨Excel Spreadsheets
      • 🗼PowerPoint Presentations
      • 🤺Microsoft Office Documents
      • 📑PDF
      • 📄Other Document Formats
      • 🩼Common Techniques Used in Malicious Documents
    • 🏞️Advanced Persistence Threat - APT
      • 🥠APT Groups
        • 🇨🇳Mustang Panda
        • 🛕Mustard Tempest
        • 🇨🇳Naikon
        • 🪡NEODYMIUM
        • 🇷🇺Nomadic Octopus
        • 🇮🇷OilRig
        • 🍊Orangeworm
        • 🇮🇳Patchwork
        • 🇨🇳PittyTiger
        • 🌏PLATINUM
        • 🇱🇧POLONIUM
        • 🇵🇹Poseidon Group
        • 🇹🇲PROMETHIUM
        • 🇨🇳Putter Panda
        • 🦝Rancor
        • 🇨🇳Rocke
        • 🐢RTM
        • 🇷🇺Sandworm Team
        • 🃏Scarlet Mimic
        • 🇬🇱Scattered Spider
        • 🇵🇰SideCopy
        • 🇮🇳Sidewinder
        • 🔕Silence
        • 🇮🇷Silent Librarian
        • 🇳🇬SilverTerrier
        • 🐞Sowbug
        • 🔱Strider
        • 🇨🇳Suckfly
        • 🥃TA2541
        • 🇨🇳TA459
        • 💼TA505
        • 💰TA551
        • ☁️TeamTNT
        • 🇷🇺TEMP.Veles
        • 🦳The White Company
        • 💳Threat Group-1314
        • 🫓Threat Group-3390
        • 🇨🇳Threat Group-3390
        • 🦐Thrip
        • 🐈ToddyCat
        • 🐙Tonto Team
        • 🇵🇰Transparent Tribe
        • 🐠Tropic Trooper
        • 🐢Turla
        • 🇮🇷UNC788
        • 🇱🇧Volatile Cedar
        • 🇨🇳Volt Typhoon
        • 🕊️Whitefly
        • 🔘Windigo
        • 🪽Windshift
        • 🇨🇳Winnti Group
        • 🥀WIRTE
        • 🇷🇺Wizard Spider
        • 🎪ZIRCONIUM
      • 🏹APT's Software
        • 🐀3PARA RAT
        • 🐀4H RAT
        • ⚱️AADInternals
        • 🔻ABK
        • ⚗️AbstractEmu
        • 🪱ACAD/Medre.A
        • 🇲🇰AcidRain
        • 🐬Action RAT
  • 🐁OS Internal's
    • 🍩Suspicious API's
      • 🪨Process Information API's
      • 🧩Registry API's
      • 🔒Encryption API's
      • 📯Restore Point API's
      • 👾Exfiltration API's
      • 🦉Data Wiping API's
      • 📨Shadow Copy API's
      • 🪼What is Malicious API's Functions
      • 🌪️System Information API's
      • 🌀Network Information API's
  • 🪟Windows Internal
    • 📡Windows Internal
      • 🦐Why Windows Internal ?
        • 🏵️Process
        • 🧵Thread
        • 🪭Handle
        • 🌐Memory
        • ☢️Ram
        • 🤖ROM
  • 👁️‍🗨️Malware Technique
    • 📓Malware Technique
    • 💢Obfuscation
      • 🦾Anti-Debugging Techniques
      • 🏗️Instruction Substitution
      • 📔Code Obfuscation
      • 📦Code Packing
      • 💈Polymorphism
      • 🌬️Control Flow Obfuscation
      • 🪅Data Obfuscation
      • 💅Metadata Obfuscation
      • 🎣Metamorphism
      • ⛲Runtime Obfuscation
    • 🛌Persistence Mechanism
      • 🔰Registry Persistence Mechanism
      • 🗑️Task Sch Persistence Mechanism
      • 📂Startup Folder
      • 🎋AppData Folder
      • 🪹Temp Folder
  • ⚔️Malware Resources
    • 👻Malware Resources
    • 🎇Malware Sample Resources
      • 🌡️VirusShare
      • ♠️MalShare
      • 🚥MalwareTraffic
      • 🚏Malware Bazaar
  • Malware Analysis Toolkit
    • 🧌Windows Malware Analysis Toolkit
      • 💉Common Online Malware Analysis Toolkit
        • 💎Joe Sandbox
        • 🎪VT - VirusTotal
        • 👽Threat.Zone
        • 🐦Hybrid Analysis
        • 🦄Any.run
        • 🥫Filescan
      • 🥝Static Analysis Tools
        • 🍡Advance Static Analysis Tool
      • 💠Dynamic Analysis Tool
        • Advance Dynamic Analysis Tool
      • 🥜Network Analysis Tool
      • 🥟String Dumpers Toolkit
        • 📏Strings
        • 🦞Floss
    • 📱Android Malware Analysis Toolkit
      • 🕹️Static Analysis Toolkit
      • 💠Dynamic Analysis Toolkit
      • 🫒Online Analysis Toolkit
    • 📱IPHONE Malware Analysis Toolkit
      • 🥢Static Analysis Toolkit
      • ♦️Dynamic Analysis Toolkit
    • 💻MAC OSX Malware Analysis Toolkit
      • 📯Static Analysis Toolkit
      • 🍭Dynamic Analysis Toolkit
      • 🌬️Online Analysis Toolkit
  • Books and Guidelines
    • 🔋Books and Guidelines for Malware Analysis .
      • 🏋️‍♀️Android Malware Analysis 101
      • 🥖Common Anti-Forensics
      • 🦣Memory Forensics GUI
      • 📼Assembly for Malware Analyst
      • 💾Disk Image Forensics
      • ⚡Volatility Noob to Pro
  • 📋Malware Analysis Tips
    • 🖇️Malware Analysis Tips
      • 🏮Memory Malware Analysis
      • 🐜Technique to Investigate Process
      • 💥Process Lists 1
      • 💥Process Lists 2
      • 💥Process Lists 3
  • 🧽Incident Response
    • 🐳What is Incident Response
      • Incident Response Tools
      • Incident Response Toolkit
  • Technical Analysis Report
    • 🦎Technical Analysis Report
      • 🧲Stuxnet Memory Analysis
  • 🚨Rootkit Removal
    • 🤖Rootkit Removal
  • 🗜️Antivirus Artifact
    • 〽️Antivirus Artifact
      • 🀄Antivirus Process Name
  • 🧠Malware Author Mindset
    • 💽Malware Author Mindset
      • 🍫How Malware Author Terminate Antivirus Process during runtime ?
Powered by GitBook
On this page
  1. Malware Introduction
  2. Nations State APT

North Korean APT

North Korean Advanced Persistent Threat (APT) groups are known for their state-sponsored cyber operations, often characterized by a mix of cyber-espionage, disruptive attacks, and financially motivated crimes. Here is a list of notable North Korean APT groups:

Notable North Korean APT Groups

  1. Lazarus Group

    • Aliases: Hidden Cobra, Guardians of Peace (GOP), APT38

    • Affiliation: North Korean government

    • Targets: Financial institutions, critical infrastructure, entertainment industry, and government agencies.

    • Notable Activities:

      • WannaCry Ransomware: A global ransomware attack in 2017 that encrypted files on numerous systems and demanded ransom payments in Bitcoin.

      • Sony Pictures Hack: A 2014 attack that led to the leak of sensitive data and disrupted Sony Pictures Entertainment.

      • Bangladesh Bank Heist: A 2016 cyber heist where $81 million was stolen from the Bangladesh Central Bank using fraudulent SWIFT transactions.

  2. APT37 (Reaper, RedAlpha)

    • Aliases: Scarcruft, Black Heaven

    • Affiliation: North Korean government

    • Targets: South Korean government, military, and technology sectors; also targets individuals and organizations in other countries.

    • Notable Activities:

      • Espionage: Conducted cyber-espionage operations aimed at stealing sensitive information from South Korean and international targets.

  3. APT38 (BlueNoroff, Stardust Chollima)

    • Affiliation: North Korean government

    • Targets: Financial institutions, cryptocurrency exchanges, and other high-value targets.

    • Notable Activities:

      • Cryptocurrency Theft: Involved in high-profile attacks targeting cryptocurrency exchanges to steal millions in digital assets.

      • Bank Heists: Engaged in sophisticated attacks against financial institutions to steal funds.

  4. Kimsuky

    • Aliases: Thallium, Black Water

    • Affiliation: North Korean government

    • Targets: South Korean government officials, academic institutions, and political organizations.

    • Notable Activities:

      • Cyber-espionage: Focused on gathering intelligence on South Korean political and defense sectors, as well as on U.S. and South Korean policy issues.

  5. APT10 (Stone Panda, MenuPass)

    • Affiliation: Chinese interests but has occasionally been linked to North Korean operations.

    • Targets: Global technology, aerospace, and engineering sectors.

    • Notable Activities:

      • Intellectual Property Theft: Conducted espionage campaigns targeting intellectual property and proprietary information.

  6. APT34 (OilRig, Helix)

    • Affiliation: Iranian but has sometimes cooperated with North Korean interests.

    • Targets: Financial, energy, and telecommunications sectors.

    • Notable Activities:

      • Espionage and Data Theft: Conducted operations focused on gathering sensitive information related to financial and industrial sectors.

PreviousVietnamese APTNextMobile Malware

Last updated 10 months ago

🕷️
🦫
🇰🇵
Page cover image