WannaCry Screenshot
A billion-dollar bank heist, the largest ransomware attack of all time, and the single largest crypto heist of all time. What do all these have in common? According to some in the cybersecurity industry there is one connecting factor –– The Lazarus Group.
In a journal article titled, The Lazarus Group: The Cybercrime Syndicate Financing the North Korea State, the author explains how hackers in North Korea have stolen north of two-billion dollars and have crippled thousands of computers. The Lazarus Group as described in the journal is –– “they are a collective of North Korean cybercriminals…they serve the North Korean state, mostly undertaking acts of espionage and hacking financial institutions” (Park, “Lazarus) These hackers are responsible for undertaking hacks on the behalf of the Democratic People’s Republic of Korea (DPRK) both for financial gains and political gains. Profits from the actions of these hackers are then used to fund the North Korean state as it is heavily sanctioned by the United States and its allies. Over the course of hacks committed by the Lazarus group they have targeted hundreds of foreign companies and have stolen intellectual property for vaccines, weapons, and technology as well as billions of dollars in cash assets. Some of these institutions include Sony Pictures, the Bangladesh Bank, Pfizer, KuCoin exchange, and AstraZeneca. For the DPRK these are the perfect heist as it is hard to seek attribution and retribution for cyber-attacks –– “Cybercrime is a low risk high reward enterprise. Millions can be stolen, and attribution is often difficult, with retribution highly delayed” (Park, “Lazarus) It seems that for the DPRK cybercrime is the perfect crime. Additionally, foreign countries often do not want to escalate tensions over an issue such as cybercrime, even if they are able to attribute it to North Korea. It seems that this is an issue that will be hard to fight given the current posture to foreign cybercrimes and the difficulty in attribution.
This leads to question what can be done and who is responsible? As this case is so multifaceted action should be as well. Both governments and private institutions need to work together to help prevent this threat. From the public side governments need to establish minimum guidelines for cybersecurity, compel companies to adopt them, and to apply some sort of retaliatory pressure. In terms of the private sector companies need to establish industry guidelines for security best practices and they need to prioritize security rather than treat it as an afterthought. This would be beneficial for both as it allows the government to support its stance on the issue, prevents financial damage to private companies, and increases the pressure and difficulty upon DPRK hackers.
I think that this is a very interesting issue as it is one that has a large impact but there is very little actions taken to remediate the issue. In addition, the current state of North Korea leaves little in the way of retribution of the United States and its allies, as it is already subject to some of the strictest sanctions. It seems that there is very little that any country can do to directly mitigate this issue. Perhaps there could be sanctions imposed on China for educating many of the hackers that make up the Lazarus Group, but that would be an endeavor that most politicians would not wish to undertake. As politicians admittedly fear escalating the issue as it could lead to physical conflict, most seem to ignore the issue all together. This is a scary prospect as the proceeds from these hacks are ultimately used to fund the North Korean government and in term their nuclear weapons program.
Park, Joshua. “The Lazarus Group: The Cybercrime Syndicate Financing the North Korea State.” Harvard International Review, vol. 42, no. 2, Spring 2021, pp. 34–39. EBSCOhost, https://search-ebscohost-com.dvc.idm.oclc.org/login.aspx?direct=true&AuthType=ip,shib,sso&db=a9h&AN=153886051&site=ehost-live.
By https://cdn.securelist.com/files/2017/05/wannacry_05.pngDownloaded from :https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/, Fair use, https://en.wikipedia.org/w/index.php?curid=54032765