Talk:Lazarus Group

From WikiProjectMed
Jump to navigation Jump to search

North Korea?

Is the group linked to North Korea? --Mats33 (talk) 22:17, 7 May 2017 (UTC)[reply]

It seems whichever "enemy du jour" is always listed as whom this group is linked to. It was not that long ago they were called Russian hackers. Downix (talk) 15:14, 16 May 2017 (UTC)[reply]
They may well be a group with funding from different sources.GliderMaven (talk) 18:29, 16 May 2017 (UTC)[reply]
It seems more likely to be disinformation.--Jack Upland (talk) 21:04, 27 June 2017 (UTC)[reply]
FBI provided evidence in their indictment of a person from North Korea working in China: https://www.justice.gov/opa/press-release/file/1092091/download. Basically they found an intersection of email addresses in contact lists between the operational infrastructure of Lazarus Group and the personal accounts of the indictee. PKalnai (talk) 20:37, 11 August 2019 (UTC)[reply]

The ( future ) Quality of this Lemma.

Currently, the overall quality is trash. Speculations presented as fact, a lack of ( credible ) sources; all textbook examples for what makes a bad quality lemma are there. The quality of the article is not likely to increase anytime soon due to the topic being in the news as i type this and state actors having a vested interest in the image and narrative surrounding the Lazarus group. Let´s all be extra vigilant & resist various counter intelligence groups who will read and alter this page. — Preceding unsigned comment added by Coretx (talkcontribs) 11:17, 23 May 2017 (UTC)[reply]

Name

Where does the name come from?--Jack Upland (talk) 21:04, 27 June 2017 (UTC)[reply]

an Email Address saying lazarex@outlook Personisgaming (Personisgaming (talk) 23:34, 7 August 2019 (UTC)). https://www.justice.gov/opa/press-release/file/1092091/download[reply]

Additional Articles

I think we should add new article names ElectricFish (malware) NestEgg (malware) 2018 Cryptocurrency Attacks Brambul (Computer Worm) I hope the names of the articles are right anyone willing to help. Note there is also another source that can help us https://qz.com/1199400/north-korea-is-suspected-in-the-530-million-coincheck-cryptocurrency-heist/</ref>

The number of related articles and the codenames as well is so huge that it seems not very productive to add to general confusion. Imagine just reports from US-CERT:

https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity PKalnai (talk) 20:31, 11 August 2019 (UTC)[reply]

@PKalnai I started the Brambul and ElectricFish (malware) already (Personisgaming (talk) 18:02, 31 August 2019 (UTC))}}[reply]

References

Does this research concluding that at least two main subgroups of the gang based on the used build environments deserve to be put in the Units section? [1] PKalnai (talk) 20:27, 11 August 2019 (UTC)[reply]

References

  1. ^ Kálnai P., Poslušný M. (October 2018). "Lazarus Group: a mahjong game played with different sets of tiles" (PDF).

Rogue Banking Software

Just like WinFixer, except it is worse than I thought.

Better sources for Poland and Mexican bank heists

I was doing a university assignment on this topic and found some better sources for the Poland and Mexican bank heists contained in the article. Listing the only source as an article that briefly mentions something is a bit weak. I might come back and edit this myself later but if someone wants to do it before me feel free.

Newman, Lily Hay. “How Hackers Pulled Off a $20 Million Mexican Bank Heist.” Wired, Condé Nast, 15 Mar. 2019, https://www.wired.com/story/mexico-bank-hack/.

“Several Polish Banks Hacked, Information Stolen by Unknown Attackers.” BadCyber, 3 Feb. 2017, https://badcyber.com/several-polish-banks-hacked-information-stolen-by-unknown-attackers/. Wombatpandaa (talk) 23:04, 6 April 2023 (UTC)[reply]