280:
534:. The exploit was then stolen by the Shadow Brokers hacker group, who first tried to auction it off, but after failing to do that simply gave it away for free. The NSA subsequently revealed the vulnerability to Microsoft who issued an update on March 14, 2017, a little under a month before the attack occurred. It wasn't enough. The update wasn't mandatory and the majority of computers with the vulnerability had not resolved the issue by the time May 12 rolled around, leading to the astonishing effectiveness of the attack.
384:
attacks that originated from compromised computers within South Korea. The attacks continued on March 20, 2013, with DarkSeoul, a wiper attack that targeted three South Korean broadcast companies, financial institutes, and an ISP. At the time, two other groups going by the personas ā³NewRomanic Cyber Army Team and WhoIs Teamā³, took credit for that attack but researchers did not know the
Lazarus Group was behind it at the time. Researchers today know the Lazarus Group as a supergroup behind the disruptive attacks.
434:
bank of
Bangladesh. Five of the thirty-five fraudulent instructions were successful in transferring US$ 101 million, with US$ 20 million traced to Sri Lanka and US$ 81 million to the Philippines. The Federal Reserve Bank of New York blocked the remaining thirty transactions, amounting to US$ 850 million, due to suspicions raised by a misspelled instruction. Cybersecurity experts claimed that the North Korea-based Lazarus Group was behind the attack.
465:). To be infected, there is no need to click on a bad link - the malware can spread autonomously, from a computer to a connected printer, and then beyond to adjacent computers, perhaps connected to the wifi, etc. The port 445 vulnerability allowed the malware to move freely across intranets, and infect thousands of computers rapidly. The Wannacry attack was one of the first large scale uses of a cryptoworm.
518:
clue as to who created the virus. Usually stopping malware takes months of back and forth fighting between the hackers and security experts, so this easy win was unexpected. Another very interesting and unusual aspect of the attack was that the files were not recoverable after paying the ransom: only $ 160,000 was collected, leading many to believe that the hackers weren't after the money.
616:, pharmaceutical companies became major targets for the Lazarus Group. Using spear-phishing techniques, Lazarus Group members posed as health officials and contacted pharmaceutical company employees with malicious links. It is thought that multiple major pharma organizations were targeted, but the only one that has been confirmed was the Anglo-Swedish-owned
831:
institutions and cryptocurrency exchanges, including over 16 organizations in at least 13 countries between 2014 and 2021: Bangladesh, Chile, India, Mexico, Pakistan, the
Philippines, South Korea, Taiwan, Turkey, and Vietnam. The revenue is believed to go towards the development of missile and nuclear technology.
580:
late-2017 campaign is a continuation of North Koreaās interest in cryptocurrency, which we now know encompasses a broad range of activities including mining, ransomware, and outright theft...ā The report also said that North Korea was using these cryptocurrency attacks to avoid international financial sanctions.
474:
encrypted data files. The malware used a legitimate piece of software called
Windows Crypto, made by Microsoft to scramble the files. Once the encryption is completed, the filename has "Wincry" appended, which is the root of the Wannacry name. Wincry was the base of the encryption, but two additional exploits,
994:
According to a 2020 report by the U.S. Army, Andarial has about 1,600 members whose mission is reconnaissance, assessment of the network vulnerabilities, and mapping the enemy network for potential attack. In addition to South Korea, they also target other governments, infrastructure, and businesses.
830:
According to a 2020 report by the U.S. Army, Bluenoroff has about 1,700 members carrying out financial cybercrime by concentrating on long-term assessment and exploiting enemy network vulnerabilities and systems for financial gain for the regime or to take control of the system. They target financial
433:
Bangladesh Bank cyber heist, was a theft that took place in
February 2016. Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally transfer close to US$ 1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central
383:
Over time, attacks from this group have grown more sophisticated; their techniques and tools have become better developed and more effective. The March 2011 attack known as "Ten Days of Rain" targeted South Korean media, financial, and critical infrastructure, and consisted of more sophisticated DDoS
673:
researchers, and used those profiles to interact with posts and content made by others in the security research community. The hackers would then target specific security researchers by contacting them directly with an offer to collaborate on research, with the goal of getting the victim to download
579:
lures containing malware and which were sent to South Korean students and users of cryptocurrency exchanges like
Coinlink. If the user opened the malware it stole email addresses and passwords. Coinlink denied their site or users emails and passwords had been hacked. The report concluded that āThis
517:
was registered, and would only proceed with encryption if that domain name did not exist. Hutchins identified this check, then promptly registered the relevant domain at 3:03 pm UTC. The malware immediately stopped propagating itself and infecting new machines. This was very interesting, and is a
473:
The virus exploited a vulnerability in the
Windows operating system, then encrypted the computer's data in return for a sum of Bitcoin worth roughly $ 300 to get the key. In order to encourage payment, the ransom demand doubled after three days, and if not paid in a week, the malware deletes the
405:
via unknown means; the perpetrators identified themselves as the "Guardians of Peace". Large amounts of data were stolen and slowly leaked in the days following the attack. An interview with someone claiming to be part of the group stated that they had been siphoning Sony's data for over a year.
418:
Under the name ā³Operation
Blockbusterā³, a coalition of security companies, led by Novetta, was able to analyse malware samples found in different cyber-security incidents. Using that data, the team was able to analyse the methods used by the hackers. They linked the Lazarus Group to a number of
1150:
Andariel, Appleworm, APT-C-26, APT38, Bluenoroff, Bureau 121, COVELLITE, Dark Seoul, GOP, Group 77, Guardian of Peace, Guardians of Peace, Hastati Group, HIDDEN COBRA, Labyrinth
Chollima, Lazarus, NewRomantic Cyber Army Team, NICKEL ACADEMY, Operation AppleJesus, Operation DarkSeoul, Operation
587:, a South Korean exchange in February 2017. Youbit, another South Korean Bitcoin exchange company, filed for bankruptcy in December 2017 after 17% of its assets were stolen by cyberattacks following an earlier attack in April 2017. Lazarus and North Korean hackers were blamed for the attacks.
1128:
LAZARUS GROUP (a.k.a. "APPLEWORM"; a.k.a. "APT-C-26"; a.k.a. "GROUP 77"; a.k.a. "GUARDIANS OF PEACE"; a.k.a. "HIDDEN COBRA"; a.k.a. "OFFICE 91"; a.k.a. "RED DOT"; a.k.a. "TEMP.HERMIT"; a.k.a. "THE NEW ROMANTIC CYBER ARMY TEAM"; a.k.a. "WHOIS HACKING TEAM"; a.k.a. "ZINC"), Potonggang
272:(DDoS) techniques to target the South Korean government in Seoul. They were also responsible for attacks in 2011 and 2013. It is possible that they were also behind a 2007 attack targeting South Korea, but that is still uncertain. A notable attack that the group is known for is the
305:, successfully stealing US$ 81 million and was attributed to the group. In 2017, the Lazarus group was reported to have stolen US$ 60 million from the Far Eastern International Bank of Taiwan although the actual amount stolen was unclear, and most of the funds were recovered.
316:
reported in 2017 that
Lazarus tended to concentrate on spying and infiltration cyberattacks whereas a sub-group within their organisation, which Kaspersky called Bluenoroff, specialised in financial cyberattacks. Kaspersky found multiple attacks worldwide and a direct link
599:
In mid-September 2019, the USA issued a public alert about a new version of malware dubbed ElectricFish. Since the beginning of 2019, North Korean agents have attempted five major cyber-thefts world-wide, including a successful $ 49 million theft from an institution in
1469:
1172:
Black Artemis (PWC), COVELLITE (Dragos), CTG-2460 (SCWX CTU), Dark Seoul, Guardians of Peace, HIDDEN COBRA (U.S. Government), High Anonymous, Labyrinth Chollima (CrowdStrike), New Romanic Cyber Army Team, NNPT Group, The Lazarus Group, Who Am I?, Whois Team, ZINC
255:
has claimed the group is part of the North Korean government's strategy to "undermine global cybersecurity ... and generate illicit revenue in violation of ... sanctions". North Korea benefits from conducting cyber operations because it can present an
566:
users mostly in South Korea. These attacks were reported to be technically similar to previous attacks using the WannaCry ransomware and the attacks on Sony Pictures. One of the tactics used by Lazarus hackers was to exploit vulnerabilities in
620:. According to a report by Reuters, a wide range of employees were targeted, including many involved in COVID-19 vaccine research. It is unknown what the Lazarus Group's goal was in these attacks, but the likely possibilities include:
452:
was a massive ransomware cyberattack that hit institutions across the globe ranging all the way from the NHS in Britain, to Boeing, and even to Universities in China on the 12th of May, 2017. The attack lasted 7 hours and 19 minutes.
1814:
358:
and Dozer malware to launch a large-scale, but quite unsophisticated, DDoS attack against US and South Korean websites. The volley of attacks struck about three dozen websites and placed the text "Memory of Independence Day" in the
409:
The hackers were able to access previously unreleased films, scripts for certain films, plans for future films, information about executive salaries at the company, emails, and the personal information of around 4,000 employees.
718:
A report published by blockchain security platform Immunefi, alleged that Lazarus was responsible for over $ 300 million in losses across crypto hacking incidents in 2023. The amount represents 17.6% of the year's total losses.
709:
The FBI confirmed that the North Korean malicious cyber actor group Lazarus (also known as APT38) was responsible for the theft of $ 100 million of virtual currency from Harmony's Horizon bridge reported on June 24, 2022.
1047:, Jon Chang Hyok and Kim Il Park. Jin Hyok had already been indicted earlier in September 2018. The individuals are not in U.S. custody. A Canadian and two Chinese individuals have also been charged with having acted as
4492:
2264:
521:
The easy kill switch and lack of revenue led many to believe that the attack was state-sponsored; the motive was not financial compensation, but just to cause chaos. After the attack security experts traced the
2181:
2550:
2892:
807:
BlueNorOff (also known as: APT38, Stardust Chollima, BeagleBoyz, NICKEL GLADSTONE) is a financially motivated group that is responsible for the illegal transfers of money via forging orders from
268:
The earliest known attack that the group is responsible for is known as "Operation Troy", which took place from 2009 to 2012. This was a cyber-espionage campaign that utilized unsophisticated
1822:
1099:"according to press reports, had successfully carried out such operations against banks in Bangladesh, India, Mexico, Pakistan, Philippines, South Korea, Taiwan, Turkey, Chile, and Vietnam"
324:
However, Kaspersky also acknowledged that the repetition of the code could be a āfalse flagā meant to mislead investigators and pin the attack on North Korea, given that the worldwide
1243:
4502:
1729:
735:
In September 2023 the FBI confirmed that a $ 41 million theft of cryptocurrency from Stake.com, an online casino and betting platform, was perpetrated by the Lazarus Group.
591:, a cryptocurrency cloud mining marketplace lost over 4,500 Bitcoin in December 2017. An update about the investigations claimed that the attack is linked to Lazarus Group.
2507:
2440:
839:
808:
3312:
991:
due to the stealthy nature of the subgroup. Any organization in South Korea is vulnerable to AndAriel. Targets include government, defense, and any economic symbol.
3332:
461:. Cryptoworms are a class of malware that travels between computers using networks, without requiring direct user action for infection ā in this case, exploiting
4472:
752:
2189:
2082:
457:
estimates it affected nearly 200,000 computers in 150 countries, primarily affecting Russia, India, Ukraine, and Taiwan. This was one of the first attacks of a
701:
game. The FBI said "Through our investigations we were able to confirm Lazarus Group and APT38, cyber actors associated with , are responsible for the theft".
2107:
1395:
1759:
1788:
972:
to execute code on a system, strategic web compromise, and accessing Linux servers. It's reported that they sometimes work together with criminal hackers.
946:
914:
910:
882:
2900:
2238:
906:
2465:
1548:
942:
1500:
2574:
1368:
1008:
697:
In March 2022, Lazarus Group was found responsible for stealing $ 620 million worth of cryptocurrencies from the Ronin Network, a bridge used by the
354:
The Lazarus Group's first major hacking incident took place on July 4, 2009, and sparked the beginning of "Operation Troy". This attack utilized the
2374:
689:
affecting Chrome for the attack; however, Google stated that they were unable to confirm the exact method of compromise at the time of the report.
2132:
2026:
3024:
2699:
2625:
1293:
954:
983:(also spelled Andarial, and also known as: Silent Chollima, Dark Seoul, Rifle, and Wassonite) is logistically characterized by its targeting of
224:
due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include
2998:
2054:
1343:
950:
727:
In June 2023 over $ 100 million in cryptocurrency was stolen from users of the Atomic Wallet service, and this was later confirmed by the FBI.
2786:
958:
229:
3946:
3484:
1890:
934:
902:
894:
791:
and Moranbong University, which picks the brightest students from across the country and puts them through six years of special education.
2916:
Virus News (2016). "Kaspersky Lab Helps to Disrupt the Activity of the Lazarus Group Responsible for Multiple Devastating Cyber-Attacks",
2156:
3302:
2840:
2714:
930:
926:
886:
874:
3292:
1942:
3246:
2868:
2601:
1020:
2350:
1221:
1151:
GhostSecret, Operation Troy, Silent Chollima, Subgroup: Andariel, Subgroup: Bluenoroff, Unit 121, Whois Hacking Team, WHOis Team, ZINC
1815:"Kaspersky Lab helps to disrupt the activity of the Lazarus Group responsible for multiple devastating cyber-attacks | Kaspersky Lab"
1737:
1024:
1016:
870:
293:
The Lazarus Group were reported to have stolen US$ 12 million from the Banco del Austro in Ecuador and US$ 1 million from Vietnam's
1574:
744:
2893:"Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe"
2391:
3880:
1844:
1070:
509:
brought the attack to an end when he received a copy of the virus from a friend at a security research company and discovered a
1967:
1916:
3061:
2489:
1874:
634:
AstraZeneca has not commented on the incident and experts do not believe any sensitive data has been compromised as of yet.
3416:
269:
3830:
3297:
2321:
1632:
1444:
1036:
543:
252:
3964:
3447:
3225:
2991:
1681:
858:), the Federal Reserve Bank of New York blocked the remaining transactions, due to suspicions raised by a misspelling.
784:
244:). According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.
17:
2525:
1119:
3970:
3496:
3457:
3092:
2392:"North Koreaālinked Lazarus Group responsible for nearly 20% of crypto lossesāmore than $ 300 million worthāin 2023"
2286:
1244:"Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats"
4030:
3976:
3551:
3442:
3271:
843:
748:
402:
273:
4024:
546:
and British authorities later attributed the WannaCry attack on the North Korean hacking gang, the Lazarus group.
276:. The Sony attack used more sophisticated techniques and highlighted how advanced the group has become over time.
3378:
3215:
3117:
1767:
2807:
1792:
1396:"North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions"
4427:
3437:
3210:
3179:
2210:
4482:
4477:
3317:
3230:
3029:
3019:
2984:
2733:
1043:, a North Korean military intelligence agency, for having participated in several Lazarus hacking campaigns:
1040:
651:
145:
398:
The Lazarus Group attacks culminated on November 24, 2014. On that day, a Reddit post appeared stating that
328:
worm cyber attack copied techniques from the NSA as well. This ransomware leverages an NSA exploit known as
4497:
4191:
3581:
3368:
3307:
3266:
3164:
850:, the central bank of Bangladesh. After several of the transactions went through (US$ 20 million traced to
372:
3928:
677:
Some victims who visited the blog post reported that their computers were compromised despite using fully
3686:
3421:
3184:
399:
3521:
2959:
1204:"Lazarus Group, HIDDEN COBRA, Guardians of Peace, ZINC, NICKEL ACADEMY, Group G0032 | MITRE ATT&CKĀ®"
308:
It is not clear who is really behind the group, but media reports have suggested the group has links to
4487:
4375:
3716:
3571:
3363:
3256:
3200:
878:
449:
443:
221:
57:
3122:
2551:"WazirX hacked: North Korean hackers behind $ 235 million theft from Indian investors, report reveals"
1301:
1163:
3856:
3825:
3452:
2083:"Lazarus: North Korean hackers linked to Sony hack were behind cryptocurrency attacks in South Korea"
670:
3411:
2349:
Intelligence, Microsoft Threat Intelligence Center (MSTIC), Microsoft Defender Threat (2021-01-28).
1630:
1524:
650:
both publicly reported on a group of North Korean hackers targeting cybersecurity researchers via a
3994:
3561:
3479:
3385:
3358:
2678:
2508:"FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $ 41 Million from Stake.com"
527:
2954:
2055:"North Korea government-backed hackers are trying to steal cryptocurrency from South Korean users"
4150:
3814:
3287:
3220:
3066:
2929:
Cameron, Dell (2016). "Security Researchers Say Mysterious 'Lazarus Group' Hacked Sony in 2014",
2441:"FBI Confirms Lazarus Group Cyber Actors Responsible for Harmony's Horizon Bridge Currency Theft"
835:
783:
of all types onto computers, computer networks, and servers. Education domestically includes the
572:
563:
428:
279:
1607:
3711:
3373:
2965:
1605:
788:
349:
3353:
2265:"Exclusive: Suspected North Korean hackers targeted COVID vaccine maker AstraZeneca ā sources"
1867:
Fancy Bear Goes Phishing: The dark history of the information age, in five extraordinary hacks
4467:
4212:
4165:
4073:
4000:
3784:
3148:
298:
149:
3395:
3251:
3809:
3174:
1501:"Lazarus: North Korean hackers suspected to have stolen millions in Taiwan bank cyberheist"
1294:"North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign"
996:
965:
686:
674:
a file containing malware, or to visit a blog post on a website controlled by the hackers.
117:
101:
2941:
Zetter, Kim (2016). "Sony Hackers Were Causing Mayhem Years Before They Hit The Company",
1998:
340:
reported in 2017 that it was "highly likely" that Lazarus was behind the WannaCry attack.
212:
group made up of an unknown number of individuals, alleged to be run by the government of
8:
4299:
3327:
3143:
1004:
890:
220:
to them since 2010. Originally a criminal group, the group has now been designated as an
83:
1705:
4437:
4432:
4329:
3958:
3721:
3647:
3337:
3138:
2466:"North Korean hackers stole $ 100 million in recent cryptocurrency heist, analysts say"
964:
Tactics commonly used by BlueNorOff include: phishing, backdoors, Drive-by compromise,
393:
360:
257:
3169:
2648:
4442:
4324:
4294:
3898:
3754:
3112:
3076:
2970:
2815:
2693:
2619:
2368:
2294:
1870:
1582:
1080:
767:
was hacked by the group and $ 234.9 million worth of crypto assets have been stolen.
678:
613:
576:
513:
hardcoded into the virus. The malware included a periodic check to see if a specific
378:
121:
2771:
1141:
232:
to refer to malicious cyber activity by the North Korean government in general) and
216:. While not much is known about the Lazarus Group, researchers have attributed many
4370:
4222:
4145:
3794:
3731:
3606:
3055:
2676:
1862:
1631:
The WannaCry Ransomware Has a Link to Suspected North Korean Hackers (2017-03-03).
764:
4068:
4380:
4355:
4319:
4247:
4160:
4155:
3799:
3591:
3501:
3205:
2750:
1656:
1297:
1185:
969:
847:
654:
campaign, with Microsoft specifically attributing the campaign to Lazarus Group.
555:
506:
302:
294:
133:
2935:
Zetter, Kim (2014). "Sony Got Hacked Hard: What We Know and Don't Know So Far",
4119:
4114:
3804:
3789:
3779:
3774:
3706:
3681:
3676:
3671:
3616:
3390:
3071:
2415:
1318:
1000:
366:
337:
333:
113:
67:
3261:
4461:
4242:
3701:
2819:
2298:
1586:
1369:"North Korean hacker group Lazarus is using Telegram to steal cryptocurrency"
1075:
1044:
698:
682:
313:
287:
105:
2808:"North Korean Hackers Stole U.S.-South Korean Military Plans, Lawmaker Says"
2602:"As Trump cozies up to Kim Jong-un, North Korean hackers target major banks"
2108:"Bitcoin, cryptocurrencies targeted by North Korean hackers, report reveals"
1420:
4186:
4140:
3940:
3904:
3759:
3749:
3642:
3637:
3632:
3506:
3322:
995:
Attack vectors include: ActiveX, vulnerabilities in South Korean software,
637:
490:
217:
71:
4493:
North Korean entities subject to U.S. Department of the Treasury sanctions
1606:
GReAT ā Kaspersky Lab's Global Research & Analysis Team (2017-03-03).
4422:
4412:
4360:
4268:
4124:
3934:
3764:
3626:
3491:
2869:"US charges two more members of the 'Lazarus' North Korean hacking group"
1575:"WannaCry ransomware has links to North Korea, cybersecurity experts say"
1445:"Security researchers say mysterious 'Lazarus Group' hacked Sony in 2014"
1203:
984:
855:
824:
763:
According to Indian media reports, a local cryptocurrency exchange named
617:
531:
514:
510:
484:
462:
329:
309:
248:
213:
91:
2649:"Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups"
1682:"The Sony Hackers Were Causing Mayhem Years Before They Hit the Company"
685:
browser, suggesting that the hackers may have used a previously unknown
4365:
4350:
4278:
4018:
3922:
3874:
3850:
3838:
3696:
3621:
3611:
3601:
3586:
3546:
3471:
3102:
2976:
2923:
RBS (2014). "A Breakdown and Analysis of the December 2014 Sony Hack".
1319:"Drugs, arms, and terror: A high-profile defector on Kim's North Korea"
1060:
1048:
558:
issued a report linking the Lazarus Group to attacks on cryptocurrency
318:
161:
4396:
4273:
4237:
4227:
4099:
3916:
3666:
3596:
3536:
3097:
1845:"Congresswoman wants probe of 'brazen' $ 81M theft from New York Fed"
1292:
Guerrero-Saade, Juan Andres; Moriuchi, Priscilla (January 16, 2018).
1012:
862:
851:
647:
575:, a South Korean word processing software. Another tactic was to use
241:
87:
2960:
Indictment of Park Jin Hyok, Jon Chang Hyok and Kim Il, January 2020
2133:"North Korean hackers tied to cryptocurrency attacks in South Korea"
4304:
4232:
4217:
4036:
4012:
3886:
3868:
3769:
3691:
3526:
3511:
2677:
Healthcare Sector Cybersecurity Coordination Center, (HC3) (2021).
1268:
898:
866:
816:
776:
666:
588:
325:
297:
in 2015. They have also targeted banks in Poland and Mexico. The
165:
2772:"FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks | CISA"
2182:"Bitcoin exchanges targeted by North Korean hackers, analysts say"
1869:(1st ed.). New York: Farrar, Straus and Giroux. p. 316.
413:
4334:
4207:
4170:
4104:
4083:
4053:
4006:
3988:
3910:
3844:
3541:
3531:
3516:
1065:
938:
918:
780:
658:
584:
559:
494:
triggered it to activate on a victim's computer. In other words,
454:
109:
2416:"North Korean hackers target gamers in $ 615m crypto heist - US"
1186:"HIDDEN COBRA ā North Korea's DDoS Botnet Infrastructure | CISA"
4417:
4309:
4263:
4078:
3892:
3862:
3741:
3726:
3556:
3107:
2239:"U.S. Targets North Korean Hacking as National-Security Threat"
922:
662:
643:
630:
Giving foreign regimes access to proprietary COVID-19 research.
601:
568:
355:
209:
2575:"How barely connected North Korea became a hacking superpower"
2157:"South Korean crypto exchange files for bankruptcy after hack"
2027:"North Korean Hacker Group Seen Behind Crypto Attack in South"
1789:"Novetta Exposes Depth of Sony Pictures Attack ā Novetta"
1269:"FBI thwarts Lazarus-linked North Korean surveillance malware"
692:
4042:
3982:
3952:
1549:"Cyber attacks linked to North Korea, security experts claim"
2287:"North Korea Targetsāand Dupesāa Slew of Cybersecurity Pros"
1344:"Who is Lazarus? North Korea's Newest Cybercrime Collective"
367:
2013 South Korea Cyberattack (Operation 1Mission/ DarkSeoul)
260:
with a small group of operators, especially to South Korea.
4314:
4109:
1943:"How to defend against TCP port 445 and other SMB exploits"
1657:"More evidence for WannaCry 'link' to North Korean hackers"
1470:"SWIFT attackers' malware linked to more financial attacks"
607:
2211:"NiceHash security breach investigation update ā NiceHash"
1730:"A Breakdown and Analysis of the December, 2014 Sony Hack"
1706:"Sony Got Hacked Hard: What We Know and Don't Know So Far"
3293:
Hollywood Presbyterian Medical Center ransomware incident
779:, China for special training. They are trained to deploy
755:
under North Korea Sanctions Regulations section 510.214.
283:
2734:
Lazarus APT Spinoff Linked to Banking Hacks | Threatpost
2715:"STARDUST CHOLLIMA | Threat Actor Profile | CrowdStrike"
1421:"BBC World Service - The Lazarus Heist, 10. Kill switch"
1120:"North Korea Designations; Global Magnitsky Designation"
638:
January 2021 attacks targeting cybersecurity researchers
488:
automatically spreads the virus through networks, while
4503:
Specially Designated Nationals and Blocked Persons List
286:
wanted notice for one of the hackers of Lazarus Group,
2600:
EST, Jason Murdock On 3/9/18 at 9:54 AM (2018-03-09).
1291:
1003:(macro), IT management products (antivirus, PMS), and
842:
to illegally transfer close to US$ 1 billion from the
437:
624:
Stealing sensitive information to be sold for profit.
2490:"FBI Identifies Cryptocurrency Funds Stolen by DPRK"
1891:"Cybercriminal Lazarus group hacked Bangladesh Bank"
482:, were used by the malware to make it a cryptoworm.
2787:"FBI Implicates North Korea in Destructive Attacks"
1917:"US charges North Korean over Bangladesh Bank hack"
968:, exploitation of insecure out-of-date versions of
422:
2643:
2641:
2639:
2637:
2635:
1214:
704:
1007:(installers and updaters). Malware used include:
722:
4459:
1760:"Five Reasons Why Operation Blockbuster Matters"
730:
3333:Russian interference in the 2016 U.S. elections
2632:
834:BlueNorOff's most infamous attack was the 2016
414:Early 2016 Investigation: Operation Blockbuster
4473:North Korean advanced persistent threat groups
2686:U.S. Department of Health & Human Services
775:North Korean hackers are sent vocationally to
713:
657:The hackers created multiple user profiles on
583:North Korean hackers stole US$ 7 million from
549:
2992:
2322:"New campaign targeting security researchers"
861:Malware associated with BlueNorOff include: "
758:
230:United States Department of Homeland Security
2373:: CS1 maint: multiple names: authors list (
2348:
1968:"Cryptoworms: The future of ransomware hell"
1051:and money launderers for the Lazarus group.
498:got the infected link to your computer, and
419:attacks through a pattern of code re-usage.
3303:Democratic National Committee cyber attacks
2955:Indictment of Park Jin Hyok, September 2018
2784:
2745:
2743:
2741:
2698:: CS1 maint: numeric names: authors list (
2624:: CS1 maint: numeric names: authors list (
2548:
2351:"ZINC attacks against security researchers"
2080:
1757:
1112:
693:March 2022 online game Axie Infinity attack
3247:Office of Personnel Management data breach
2999:
2985:
2672:
2670:
2668:
2666:
2664:
2662:
1142:"Lazarus Group | InsightIDR Documentation"
530:where the exploit had been developed as a
594:
387:
3006:
2805:
2738:
2105:
987:. AndAriel's alternative name is called
608:Late 2020 pharmaceutical company attacks
278:
2866:
2659:
2130:
2052:
1861:
1366:
1285:
1178:
799:Lazarus is believed to have two units.
14:
4460:
2867:Cimpanu, Catalin (February 17, 2021).
2712:
2463:
2386:
2384:
2344:
2342:
2262:
2024:
1842:
1390:
1388:
343:
321:) between Bluenoroff and North Korea.
247:The Lazarus Group has strong links to
2980:
2760:. U.S. Army. 2020. pp. E-1, E-2.
2316:
2314:
2280:
2278:
2232:
2230:
2076:
2074:
2048:
2046:
2020:
2018:
2016:
1993:
1991:
1989:
1987:
1965:
1572:
1498:
1494:
1492:
1490:
1313:
1311:
2236:
2081:Mascarenhas, Hyacinth (2018-01-17).
1196:
270:distributed denial-of-service attack
3298:Commission on Elections data breach
2841:"North Korea Bitten by Bitcoin Bug"
2599:
2381:
2339:
1385:
1222:"How Microsoft names threat actors"
1071:North KoreaāUnited States relations
438:May 2017 WannaCry ransomware attack
253:United States Department of Justice
24:
2899:. 17 February 2021. Archived from
2785:Alperovitch, Dmitri (2014-12-19).
2311:
2284:
2275:
2263:Stubbs, Jack (November 27, 2020).
2227:
2071:
2043:
2013:
1984:
1791:. 24 February 2016. Archived from
1517:
1487:
1308:
785:Kim Chaek University of Technology
25:
4514:
3458:Jeff Bezos phone hacking incident
2948:
2758:Federation of American Scientists
1758:Van Buskirk, Peter (2016-03-01).
1736:. 5 December 2014. Archived from
738:
4031:Microarchitectural Data Sampling
3267:Ukrainian Power Grid Cyberattack
3175:Cyberterrorism attack of June 25
2838:
2526:"North Korea Designation Update"
844:Federal Reserve Bank of New York
423:2016 Bangladesh Bank cyber heist
153:Nonserviam Cyber Warfare Command
3656:
3379:2017 Ukraine ransomware attacks
3216:2014 JPMorgan Chase data breach
2885:
2860:
2832:
2799:
2778:
2764:
2727:
2706:
2653:U.S. Department of the Treasury
2593:
2567:
2542:
2530:U.S. Department of the Treasury
2518:
2500:
2482:
2457:
2445:Federal Bureau of Investigation
2433:
2408:
2256:
2203:
2174:
2149:
2131:Ashford, Warwick (2018-01-17).
2124:
2099:
2087:International Business Times UK
1959:
1935:
1909:
1883:
1855:
1843:Schram, Jamie (22 March 2016).
1836:
1807:
1781:
1751:
1722:
1698:
1674:
1649:
1624:
1599:
1566:
1541:
1505:International Business Times UK
1462:
1437:
1413:
1367:Beedham, Matthew (2020-01-09).
1360:
1336:
1124:U.S. Department of the Treasury
1093:
838:in which they tried to use the
705:June 2022 Horizon Bridge attack
3211:2014 celebrity nude photo leak
2464:Satter, Raphael (2023-06-13).
2106:Limitone, Julia (2018-01-17).
1261:
1236:
1164:"NICKEL ACADEMY | Secureworks"
1156:
1134:
1039:indicted three members of the
1030:
723:June 2023 Atomic Wallet attack
13:
1:
3660:
3448:Bulgarian revenue agency hack
3226:Russian hacker password theft
2806:Sang-Hun, Choe (2017-10-10).
2679:"North Korean Cyber Activity"
2549:D'Cruze, Danny (2024-07-29).
2053:Kharpal, Arjun (2018-01-17).
1966:Storm, Darlene (2016-04-13).
1106:
1041:Reconnaissance General Bureau
802:
731:September 2023 Stake.com hack
332:that a hacker group known as
146:Reconnaissance General Bureau
46:
3582:Bangladesh Black Hat Hackers
3058:(publication of 2009 events)
2188:. 2017-12-21. Archived from
1573:Solon, Olivia (2017-05-15).
811:. BlueNorOff is also called
770:
537:
373:2013 South Korea cyberattack
336:made public in April 2017.
274:2014 attack on Sony Pictures
7:
3443:Baltimore ransomware attack
2713:Meyers, Adam (2018-04-06).
2237:Volz (September 16, 2019).
2025:Al Ali, Nour (2018-01-16).
1529:baesystemsai.blogspot.co.uk
1499:Ashok, India (2017-10-17).
1054:
975:
714:2023 cryptocurrency attacks
550:2017 cryptocurrency attacks
10:
4519:
3717:Tailored Access Operations
3364:WannaCry ransomware attack
3257:Ashley Madison data breach
3201:Anthem medical data breach
3118:PlayStation network outage
2910:
854:and US$ 81 million to the
759:2024 cryptocurrency attack
444:WannaCry ransomware attack
441:
426:
391:
376:
370:
347:
301:included an attack on the
263:
222:advanced persistent threat
58:Advanced persistent threat
4405:
4389:
4343:
4287:
4256:
4200:
4179:
4133:
4092:
4061:
4052:
3823:
3740:
3570:
3470:
3453:WhatsApp snooping scandal
3430:
3404:
3346:
3318:Indian Bank data breaches
3280:
3239:
3193:
3157:
3131:
3085:
3048:
3041:
3012:
1734:www.riskbasedsecurity.com
468:
172:
157:
139:
127:
97:
77:
63:
53:
42:
35:
3995:Speculative Store Bypass
3562:Ukrainian Cyber Alliance
3359:2017 Macron e-mail leaks
2579:South China Morning Post
1608:"Lazarus Under The Hood"
1373:Hard Fork | The Next Web
1086:
1037:US Department of Justice
794:
544:US Department of Justice
36:
3369:Westminster data breach
3288:Bangladesh Bank robbery
3231:2014 Yahoo! data breach
3221:2014 Sony Pictures hack
3180:2013 Yahoo! data breach
3165:South Korea cyberattack
3067:Operation Olympic Games
3062:Australian cyberattacks
2355:Microsoft Security Blog
1248:Microsoft on the Issues
836:Bangladesh Bank robbery
429:Bangladesh Bank robbery
27:Cybercrime organization
3712:Syrian Electronic Army
3422:SingHealth data breach
3185:Singapore cyberattacks
3123:RSA SecurID compromise
2751:"North Korean Tactics"
1035:In February 2021, the
789:Kim Il-sung University
751:placed Lazarus on the
743:On 14 April 2022, the
687:zero-day vulnerability
671:software vulnerability
595:September 2019 attacks
388:Late 2014: Sony breach
350:July 2009 cyberattacks
290:
4001:Lazy FP state restore
3785:Kristoffer von Hassel
3438:Sri Lanka cyberattack
3308:Vietnam Airport Hacks
3149:Operation High Roller
2969:10 part podcast from
1525:"Two bytes to $ 951m"
997:watering hole attacks
846:account belonging to
669:posing as legitimate
282:
150:Korea Computer Center
4483:Hacking in the 2010s
4478:Hacking in the 2000s
3947:Silent Bob is Silent
3007:Hacking in the 2010s
2514:. September 6, 2023.
1304:on January 16, 2018.
1210:. MITRE Corporation.
966:Watering hole attack
526:exploit back to the
505:Security researcher
502:clicked it for you.
4498:Cybercrime in India
3881:SS7 vulnerabilities
3417:Atlanta cyberattack
3386:Equifax data breach
3144:Stratfor email leak
3093:Canadian government
3072:Operation ShadowNet
2925:RiskBased Security.
1348:www.cyberpolicy.com
612:Due to the ongoing
344:2009 Operation Troy
141:Parent organization
84:Potonggang District
32:
4330:Petya and NotPetya
3959:ROCA vulnerability
3722:The Shadow Brokers
3648:Iranian Cyber Army
3574:persistent threats
3374:Petya and NotPetya
3338:2016 Bitfinex hack
3313:DCCC cyber attacks
3272:SWIFT banking hack
2897:US Dept of Justice
2812:The New York Times
2496:. August 22, 2023.
2285:Newman, Lily Hay.
1923:. 6 September 2018
1795:on 27 January 2018
1451:. 24 February 2016
652:social engineering
627:Extortion schemes.
394:Sony Pictures hack
361:master boot record
291:
202:Guardians of Peace
184:Guardians of Peace
129:Official language
30:
18:Guardians of Peace
4488:Cyberattack gangs
4455:
4454:
4451:
4450:
4443:ZeroAccess botnet
3755:Mustafa Al-Bassam
3522:New World Hackers
3485:associated events
3466:
3465:
3262:VTech data breach
3113:Operation AntiSec
3077:Operation Payback
3036:
3035:
2971:BBC World Service
2966:The Lazarus Heist
2581:. 1 February 2018
2161:The Straits Times
1876:978-0-374-60117-1
1819:www.kaspersky.com
1081:Ricochet Chollima
821:Stardust Chollima
642:In January 2021,
614:COVID-19 pandemic
528:United States NSA
379:DarkSeoul (wiper)
258:asymmetric threat
195:
194:
16:(Redirected from
4510:
4059:
4058:
3732:Yemen Cyber Army
3056:Operation Aurora
3046:
3045:
3015:
3014:
3001:
2994:
2987:
2978:
2977:
2905:
2904:
2903:on 8 April 2023.
2889:
2883:
2882:
2880:
2879:
2864:
2858:
2857:
2855:
2854:
2845:
2836:
2830:
2829:
2827:
2826:
2803:
2797:
2796:
2794:
2793:
2782:
2776:
2775:
2768:
2762:
2761:
2755:
2747:
2736:
2731:
2725:
2724:
2722:
2721:
2710:
2704:
2703:
2697:
2689:
2683:
2674:
2657:
2656:
2645:
2630:
2629:
2623:
2615:
2613:
2612:
2597:
2591:
2590:
2588:
2586:
2571:
2565:
2564:
2562:
2561:
2546:
2540:
2539:
2537:
2536:
2522:
2516:
2515:
2504:
2498:
2497:
2486:
2480:
2479:
2477:
2476:
2461:
2455:
2454:
2452:
2451:
2437:
2431:
2430:
2428:
2427:
2412:
2406:
2405:
2403:
2402:
2388:
2379:
2378:
2372:
2364:
2362:
2361:
2346:
2337:
2336:
2334:
2333:
2318:
2309:
2308:
2306:
2305:
2282:
2273:
2272:
2260:
2254:
2253:
2251:
2249:
2234:
2225:
2224:
2222:
2221:
2207:
2201:
2200:
2198:
2197:
2178:
2172:
2171:
2169:
2168:
2153:
2147:
2146:
2144:
2143:
2128:
2122:
2121:
2119:
2118:
2103:
2097:
2096:
2094:
2093:
2078:
2069:
2068:
2066:
2065:
2050:
2041:
2040:
2038:
2037:
2022:
2011:
2010:
2009:
2008:
1995:
1982:
1981:
1979:
1978:
1963:
1957:
1956:
1954:
1953:
1939:
1933:
1932:
1930:
1928:
1913:
1907:
1906:
1904:
1902:
1897:. April 20, 2017
1895:thedailystar.net
1887:
1881:
1880:
1859:
1853:
1852:
1840:
1834:
1833:
1831:
1830:
1821:. Archived from
1811:
1805:
1804:
1802:
1800:
1785:
1779:
1778:
1776:
1775:
1766:. Archived from
1755:
1749:
1748:
1746:
1745:
1726:
1720:
1719:
1717:
1716:
1702:
1696:
1695:
1693:
1692:
1678:
1672:
1671:
1669:
1668:
1653:
1647:
1646:
1644:
1643:
1628:
1622:
1621:
1619:
1618:
1603:
1597:
1596:
1594:
1593:
1570:
1564:
1563:
1561:
1560:
1545:
1539:
1538:
1536:
1535:
1521:
1515:
1514:
1512:
1511:
1496:
1485:
1484:
1482:
1481:
1466:
1460:
1459:
1457:
1456:
1441:
1435:
1434:
1432:
1431:
1417:
1411:
1410:
1408:
1407:
1392:
1383:
1382:
1380:
1379:
1364:
1358:
1357:
1355:
1354:
1340:
1334:
1333:
1331:
1330:
1315:
1306:
1305:
1300:. Archived from
1289:
1283:
1282:
1280:
1279:
1265:
1259:
1258:
1256:
1255:
1240:
1234:
1233:
1231:
1229:
1218:
1212:
1211:
1208:MITRE ATT&CK
1200:
1194:
1193:
1190:us-cert.cisa.gov
1182:
1176:
1175:
1160:
1154:
1153:
1138:
1132:
1131:
1116:
1100:
1097:
681:versions of the
48:
33:
29:
21:
4518:
4517:
4513:
4512:
4511:
4509:
4508:
4507:
4458:
4457:
4456:
4447:
4401:
4385:
4339:
4283:
4252:
4196:
4175:
4129:
4088:
4048:
3828:
3826:vulnerabilities
3819:
3736:
3629:(confederation)
3592:Charming Kitten
3573:
3566:
3502:Goatse Security
3462:
3426:
3400:
3391:Deloitte breach
3342:
3328:Dyn cyberattack
3276:
3235:
3206:Operation Tovar
3189:
3153:
3127:
3081:
3042:Major incidents
3037:
3008:
3005:
2951:
2913:
2908:
2891:
2890:
2886:
2877:
2875:
2865:
2861:
2852:
2850:
2843:
2837:
2833:
2824:
2822:
2804:
2800:
2791:
2789:
2783:
2779:
2770:
2769:
2765:
2753:
2749:
2748:
2739:
2732:
2728:
2719:
2717:
2711:
2707:
2691:
2690:
2681:
2675:
2660:
2647:
2646:
2633:
2617:
2616:
2610:
2608:
2598:
2594:
2584:
2582:
2573:
2572:
2568:
2559:
2557:
2547:
2543:
2534:
2532:
2524:
2523:
2519:
2506:
2505:
2501:
2488:
2487:
2483:
2474:
2472:
2462:
2458:
2449:
2447:
2439:
2438:
2434:
2425:
2423:
2414:
2413:
2409:
2400:
2398:
2390:
2389:
2382:
2366:
2365:
2359:
2357:
2347:
2340:
2331:
2329:
2320:
2319:
2312:
2303:
2301:
2283:
2276:
2261:
2257:
2247:
2245:
2235:
2228:
2219:
2217:
2209:
2208:
2204:
2195:
2193:
2180:
2179:
2175:
2166:
2164:
2155:
2154:
2150:
2141:
2139:
2137:Computer Weekly
2129:
2125:
2116:
2114:
2104:
2100:
2091:
2089:
2079:
2072:
2063:
2061:
2051:
2044:
2035:
2033:
2023:
2014:
2006:
2004:
2000:10. Kill switch
1997:
1996:
1985:
1976:
1974:
1964:
1960:
1951:
1949:
1941:
1940:
1936:
1926:
1924:
1915:
1914:
1910:
1900:
1898:
1889:
1888:
1884:
1877:
1860:
1856:
1841:
1837:
1828:
1826:
1813:
1812:
1808:
1798:
1796:
1787:
1786:
1782:
1773:
1771:
1756:
1752:
1743:
1741:
1728:
1727:
1723:
1714:
1712:
1704:
1703:
1699:
1690:
1688:
1680:
1679:
1675:
1666:
1664:
1655:
1654:
1650:
1641:
1639:
1629:
1625:
1616:
1614:
1604:
1600:
1591:
1589:
1571:
1567:
1558:
1556:
1547:
1546:
1542:
1533:
1531:
1523:
1522:
1518:
1509:
1507:
1497:
1488:
1479:
1477:
1468:
1467:
1463:
1454:
1452:
1443:
1442:
1438:
1429:
1427:
1419:
1418:
1414:
1405:
1403:
1400:www.justice.gov
1394:
1393:
1386:
1377:
1375:
1365:
1361:
1352:
1350:
1342:
1341:
1337:
1328:
1326:
1317:
1316:
1309:
1298:Recorded Future
1290:
1286:
1277:
1275:
1267:
1266:
1262:
1253:
1251:
1242:
1241:
1237:
1227:
1225:
1220:
1219:
1215:
1202:
1201:
1197:
1184:
1183:
1179:
1168:secureworks.com
1162:
1161:
1157:
1140:
1139:
1135:
1118:
1117:
1113:
1109:
1104:
1103:
1098:
1094:
1089:
1057:
1033:
989:Silent Chollima
978:
970:Apache Struts 2
848:Bangladesh Bank
805:
797:
773:
761:
741:
733:
725:
716:
707:
695:
640:
610:
597:
556:Recorded Future
552:
540:
507:Marcus Hutchins
471:
450:WannaCry attack
446:
440:
431:
425:
416:
403:had been hacked
396:
390:
381:
375:
369:
352:
346:
303:Bangladesh Bank
299:2016 bank heist
295:Tien Phong Bank
266:
200:(also known as
191:
189:
187:
185:
183:
181:
179:
175:
174:Formerly called
152:
148:
142:
130:
80:
38:
28:
23:
22:
15:
12:
11:
5:
4516:
4506:
4505:
4500:
4495:
4490:
4485:
4480:
4475:
4470:
4453:
4452:
4449:
4448:
4446:
4445:
4440:
4435:
4430:
4425:
4420:
4415:
4409:
4407:
4403:
4402:
4400:
4399:
4393:
4391:
4387:
4386:
4384:
4383:
4378:
4373:
4368:
4363:
4358:
4353:
4347:
4345:
4341:
4340:
4338:
4337:
4332:
4327:
4322:
4317:
4312:
4307:
4302:
4297:
4291:
4289:
4285:
4284:
4282:
4281:
4276:
4271:
4266:
4260:
4258:
4254:
4253:
4251:
4250:
4245:
4240:
4235:
4230:
4225:
4220:
4215:
4213:Black Energy 3
4210:
4204:
4202:
4198:
4197:
4195:
4194:
4189:
4183:
4181:
4177:
4176:
4174:
4173:
4168:
4163:
4158:
4153:
4148:
4143:
4137:
4135:
4131:
4130:
4128:
4127:
4122:
4120:Metulji botnet
4117:
4112:
4107:
4102:
4096:
4094:
4090:
4089:
4087:
4086:
4081:
4076:
4074:Black Energy 2
4071:
4065:
4063:
4056:
4050:
4049:
4047:
4046:
4040:
4034:
4028:
4022:
4016:
4010:
4004:
3998:
3992:
3986:
3980:
3974:
3968:
3962:
3956:
3950:
3944:
3938:
3932:
3929:Broadcom Wi-Fi
3926:
3920:
3914:
3908:
3902:
3896:
3890:
3884:
3878:
3872:
3866:
3860:
3854:
3848:
3842:
3835:
3833:
3821:
3820:
3818:
3817:
3812:
3807:
3802:
3797:
3792:
3790:Junaid Hussain
3787:
3782:
3780:Jeremy Hammond
3777:
3775:Elliott Gunton
3772:
3767:
3762:
3757:
3752:
3746:
3744:
3738:
3737:
3735:
3734:
3729:
3724:
3719:
3714:
3709:
3707:Stealth Falcon
3704:
3699:
3694:
3689:
3684:
3682:PLA Unit 61486
3679:
3677:PLA Unit 61398
3674:
3672:Numbered Panda
3669:
3664:
3650:
3645:
3640:
3635:
3630:
3624:
3619:
3617:Equation Group
3614:
3609:
3604:
3599:
3594:
3589:
3584:
3578:
3576:
3568:
3567:
3565:
3564:
3559:
3554:
3549:
3544:
3539:
3534:
3529:
3524:
3519:
3514:
3509:
3504:
3499:
3494:
3489:
3488:
3487:
3476:
3474:
3468:
3467:
3464:
3463:
3461:
3460:
3455:
3450:
3445:
3440:
3434:
3432:
3428:
3427:
3425:
3424:
3419:
3414:
3408:
3406:
3402:
3401:
3399:
3398:
3393:
3388:
3383:
3382:
3381:
3371:
3366:
3361:
3356:
3350:
3348:
3344:
3343:
3341:
3340:
3335:
3330:
3325:
3320:
3315:
3310:
3305:
3300:
3295:
3290:
3284:
3282:
3278:
3277:
3275:
3274:
3269:
3264:
3259:
3254:
3249:
3243:
3241:
3237:
3236:
3234:
3233:
3228:
3223:
3218:
3213:
3208:
3203:
3197:
3195:
3191:
3190:
3188:
3187:
3182:
3177:
3172:
3167:
3161:
3159:
3155:
3154:
3152:
3151:
3146:
3141:
3135:
3133:
3129:
3128:
3126:
3125:
3120:
3115:
3110:
3108:HBGary Federal
3105:
3100:
3095:
3089:
3087:
3083:
3082:
3080:
3079:
3074:
3069:
3064:
3059:
3052:
3050:
3043:
3039:
3038:
3034:
3033:
3027:
3022:
3013:
3010:
3009:
3004:
3003:
2996:
2989:
2981:
2975:
2974:
2962:
2957:
2950:
2949:External links
2947:
2946:
2945:
2939:
2933:
2931:The Daily Dot.
2927:
2921:
2912:
2909:
2907:
2906:
2884:
2859:
2848:proofpoint.com
2839:Huss, Darien.
2831:
2798:
2777:
2763:
2737:
2726:
2705:
2658:
2631:
2592:
2566:
2555:Business Today
2541:
2517:
2499:
2481:
2456:
2432:
2407:
2396:Fortune Crypto
2380:
2338:
2310:
2274:
2255:
2226:
2202:
2173:
2148:
2123:
2098:
2070:
2042:
2012:
1983:
1958:
1947:SearchSecurity
1934:
1908:
1882:
1875:
1863:Shapiro, Scott
1854:
1835:
1806:
1780:
1750:
1721:
1697:
1673:
1648:
1623:
1598:
1565:
1540:
1516:
1486:
1461:
1436:
1412:
1384:
1359:
1335:
1307:
1284:
1260:
1235:
1213:
1195:
1177:
1155:
1133:
1110:
1108:
1105:
1102:
1101:
1091:
1090:
1088:
1085:
1084:
1083:
1078:
1073:
1068:
1063:
1056:
1053:
1032:
1029:
1001:spear phishing
977:
974:
804:
801:
796:
793:
772:
769:
760:
757:
740:
739:U.S. sanctions
737:
732:
729:
724:
721:
715:
712:
706:
703:
694:
691:
639:
636:
632:
631:
628:
625:
609:
606:
596:
593:
577:spear-phishing
551:
548:
539:
536:
470:
467:
442:Main article:
439:
436:
427:Main article:
424:
421:
415:
412:
392:Main article:
389:
386:
371:Main article:
368:
365:
348:Main article:
345:
342:
334:Shadow Brokers
265:
262:
193:
192:
182:Gods Disciples
176:
173:
170:
169:
159:
155:
154:
143:
140:
137:
136:
131:
128:
125:
124:
114:disinformation
99:
95:
94:
81:
78:
75:
74:
68:Cyberespionage
65:
61:
60:
55:
51:
50:
44:
40:
39:
26:
9:
6:
4:
3:
2:
4515:
4504:
4501:
4499:
4496:
4494:
4491:
4489:
4486:
4484:
4481:
4479:
4476:
4474:
4471:
4469:
4466:
4465:
4463:
4444:
4441:
4439:
4436:
4434:
4431:
4429:
4426:
4424:
4421:
4419:
4416:
4414:
4411:
4410:
4408:
4404:
4398:
4395:
4394:
4392:
4388:
4382:
4379:
4377:
4374:
4372:
4369:
4367:
4364:
4362:
4359:
4357:
4354:
4352:
4349:
4348:
4346:
4342:
4336:
4333:
4331:
4328:
4326:
4323:
4321:
4318:
4316:
4313:
4311:
4308:
4306:
4303:
4301:
4298:
4296:
4293:
4292:
4290:
4286:
4280:
4277:
4275:
4272:
4270:
4267:
4265:
4262:
4261:
4259:
4255:
4249:
4246:
4244:
4243:Gameover ZeuS
4241:
4239:
4236:
4234:
4231:
4229:
4226:
4224:
4221:
4219:
4216:
4214:
4211:
4209:
4206:
4205:
4203:
4199:
4193:
4190:
4188:
4185:
4184:
4182:
4178:
4172:
4169:
4167:
4164:
4162:
4159:
4157:
4154:
4152:
4149:
4147:
4144:
4142:
4139:
4138:
4136:
4132:
4126:
4123:
4121:
4118:
4116:
4113:
4111:
4108:
4106:
4103:
4101:
4098:
4097:
4095:
4091:
4085:
4082:
4080:
4077:
4075:
4072:
4070:
4067:
4066:
4064:
4060:
4057:
4055:
4051:
4044:
4041:
4038:
4035:
4032:
4029:
4026:
4023:
4020:
4017:
4014:
4011:
4008:
4005:
4002:
3999:
3996:
3993:
3990:
3987:
3984:
3981:
3978:
3975:
3972:
3969:
3966:
3963:
3960:
3957:
3954:
3951:
3948:
3945:
3942:
3939:
3936:
3933:
3930:
3927:
3924:
3921:
3918:
3915:
3912:
3909:
3906:
3903:
3900:
3897:
3894:
3891:
3888:
3885:
3882:
3879:
3876:
3873:
3870:
3867:
3864:
3861:
3858:
3855:
3852:
3849:
3846:
3843:
3840:
3837:
3836:
3834:
3832:
3827:
3822:
3816:
3813:
3811:
3808:
3806:
3803:
3801:
3798:
3796:
3793:
3791:
3788:
3786:
3783:
3781:
3778:
3776:
3773:
3771:
3768:
3766:
3763:
3761:
3758:
3756:
3753:
3751:
3748:
3747:
3745:
3743:
3739:
3733:
3730:
3728:
3725:
3723:
3720:
3718:
3715:
3713:
3710:
3708:
3705:
3703:
3702:Rocket Kitten
3700:
3698:
3695:
3693:
3690:
3688:
3685:
3683:
3680:
3678:
3675:
3673:
3670:
3668:
3665:
3662:
3658:
3654:
3653:Lazarus Group
3651:
3649:
3646:
3644:
3641:
3639:
3636:
3634:
3631:
3628:
3625:
3623:
3620:
3618:
3615:
3613:
3610:
3608:
3605:
3603:
3600:
3598:
3595:
3593:
3590:
3588:
3585:
3583:
3580:
3579:
3577:
3575:
3569:
3563:
3560:
3558:
3555:
3553:
3550:
3548:
3545:
3543:
3540:
3538:
3535:
3533:
3530:
3528:
3525:
3523:
3520:
3518:
3515:
3513:
3510:
3508:
3505:
3503:
3500:
3498:
3495:
3493:
3490:
3486:
3483:
3482:
3481:
3478:
3477:
3475:
3473:
3469:
3459:
3456:
3454:
3451:
3449:
3446:
3444:
3441:
3439:
3436:
3435:
3433:
3429:
3423:
3420:
3418:
3415:
3413:
3410:
3409:
3407:
3403:
3397:
3396:Disqus breach
3394:
3392:
3389:
3387:
3384:
3380:
3377:
3376:
3375:
3372:
3370:
3367:
3365:
3362:
3360:
3357:
3355:
3352:
3351:
3349:
3345:
3339:
3336:
3334:
3331:
3329:
3326:
3324:
3321:
3319:
3316:
3314:
3311:
3309:
3306:
3304:
3301:
3299:
3296:
3294:
3291:
3289:
3286:
3285:
3283:
3279:
3273:
3270:
3268:
3265:
3263:
3260:
3258:
3255:
3253:
3250:
3248:
3245:
3244:
3242:
3238:
3232:
3229:
3227:
3224:
3222:
3219:
3217:
3214:
3212:
3209:
3207:
3204:
3202:
3199:
3198:
3196:
3192:
3186:
3183:
3181:
3178:
3176:
3173:
3171:
3170:Snapchat hack
3168:
3166:
3163:
3162:
3160:
3156:
3150:
3147:
3145:
3142:
3140:
3139:LinkedIn hack
3137:
3136:
3134:
3130:
3124:
3121:
3119:
3116:
3114:
3111:
3109:
3106:
3104:
3101:
3099:
3096:
3094:
3091:
3090:
3088:
3084:
3078:
3075:
3073:
3070:
3068:
3065:
3063:
3060:
3057:
3054:
3053:
3051:
3047:
3044:
3040:
3032: →
3031:
3028:
3026:
3023:
3021:
3018:←
3017:
3016:
3011:
3002:
2997:
2995:
2990:
2988:
2983:
2982:
2979:
2972:
2968:
2967:
2963:
2961:
2958:
2956:
2953:
2952:
2944:
2940:
2938:
2934:
2932:
2928:
2926:
2922:
2919:
2918:Kaspersky Lab
2915:
2914:
2902:
2898:
2894:
2888:
2874:
2870:
2863:
2849:
2842:
2835:
2821:
2817:
2813:
2809:
2802:
2788:
2781:
2773:
2767:
2759:
2752:
2746:
2744:
2742:
2735:
2730:
2716:
2709:
2701:
2695:
2687:
2680:
2673:
2671:
2669:
2667:
2665:
2663:
2654:
2650:
2644:
2642:
2640:
2638:
2636:
2627:
2621:
2607:
2603:
2596:
2580:
2576:
2570:
2556:
2552:
2545:
2531:
2527:
2521:
2513:
2509:
2503:
2495:
2491:
2485:
2471:
2467:
2460:
2446:
2442:
2436:
2421:
2417:
2411:
2397:
2393:
2387:
2385:
2376:
2370:
2356:
2352:
2345:
2343:
2327:
2323:
2317:
2315:
2300:
2296:
2292:
2288:
2281:
2279:
2270:
2266:
2259:
2248:September 16,
2244:
2240:
2233:
2231:
2216:
2212:
2206:
2192:on 2018-01-18
2191:
2187:
2183:
2177:
2162:
2158:
2152:
2138:
2134:
2127:
2113:
2109:
2102:
2088:
2084:
2077:
2075:
2060:
2056:
2049:
2047:
2032:
2031:Bloomberg.com
2028:
2021:
2019:
2017:
2002:
2001:
1994:
1992:
1990:
1988:
1973:
1972:Computerworld
1969:
1962:
1948:
1944:
1938:
1922:
1918:
1912:
1896:
1892:
1886:
1878:
1872:
1868:
1864:
1858:
1850:
1849:New York Post
1846:
1839:
1825:on 2016-09-01
1824:
1820:
1816:
1810:
1794:
1790:
1784:
1770:on 2017-07-07
1769:
1765:
1761:
1754:
1740:on 2016-03-04
1739:
1735:
1731:
1725:
1711:
1707:
1701:
1687:
1683:
1677:
1662:
1658:
1652:
1638:
1634:
1627:
1613:
1609:
1602:
1588:
1584:
1580:
1576:
1569:
1554:
1553:The Telegraph
1550:
1544:
1530:
1526:
1520:
1506:
1502:
1495:
1493:
1491:
1475:
1471:
1465:
1450:
1449:The Daily Dot
1446:
1440:
1426:
1422:
1416:
1401:
1397:
1391:
1389:
1374:
1370:
1363:
1349:
1345:
1339:
1324:
1320:
1314:
1312:
1303:
1299:
1295:
1288:
1274:
1270:
1264:
1249:
1245:
1239:
1223:
1217:
1209:
1205:
1199:
1192:. CISA. 2017.
1191:
1187:
1181:
1174:
1169:
1165:
1159:
1152:
1147:
1143:
1137:
1130:
1125:
1121:
1115:
1111:
1096:
1092:
1082:
1079:
1077:
1076:Park Jin Hyok
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1058:
1052:
1050:
1046:
1045:Park Jin Hyok
1042:
1038:
1028:
1026:
1022:
1018:
1014:
1010:
1006:
1002:
998:
992:
990:
986:
982:
973:
971:
967:
962:
960:
956:
955:Powerratankba
952:
948:
944:
940:
936:
932:
928:
924:
920:
916:
912:
908:
904:
900:
896:
892:
888:
884:
880:
876:
872:
868:
864:
859:
857:
853:
849:
845:
841:
840:SWIFT network
837:
832:
828:
826:
822:
818:
814:
810:
800:
792:
790:
786:
782:
778:
768:
766:
756:
754:
750:
746:
736:
728:
720:
711:
702:
700:
699:Axie Infinity
690:
688:
684:
683:Google Chrome
680:
675:
672:
668:
664:
660:
655:
653:
649:
645:
635:
629:
626:
623:
622:
621:
619:
615:
605:
603:
592:
590:
586:
581:
578:
574:
570:
565:
561:
557:
547:
545:
535:
533:
529:
525:
519:
516:
512:
508:
503:
501:
497:
493:
492:
487:
486:
481:
477:
466:
464:
460:
456:
451:
445:
435:
430:
420:
411:
407:
404:
401:
400:Sony Pictures
395:
385:
380:
374:
364:
362:
357:
351:
341:
339:
335:
331:
327:
322:
320:
315:
314:Kaspersky Lab
311:
306:
304:
300:
296:
289:
288:Park Jin Hyok
285:
281:
277:
275:
271:
261:
259:
254:
250:
245:
243:
239:
238:Diamond Sleet
235:
231:
228:(used by the
227:
223:
219:
215:
211:
207:
203:
199:
198:Lazarus Group
180:Gods Apostles
177:
171:
167:
163:
160:
156:
151:
147:
144:
138:
135:
132:
126:
123:
119:
115:
111:
107:
106:spearphishing
103:
100:
96:
93:
89:
85:
82:
76:
73:
69:
66:
62:
59:
56:
52:
45:
41:
34:
31:Lazarus Group
19:
4468:Cyberattacks
4187:CryptoLocker
3941:DoublePulsar
3760:Cyber Anakin
3750:Ryan Ackroyd
3652:
3643:Helix Kitten
3638:Hacking Team
3633:Guccifer 2.0
3507:Lizard Squad
3323:Surkov leaks
3252:Hacking Team
2964:
2942:
2936:
2930:
2924:
2917:
2901:the original
2896:
2887:
2876:. Retrieved
2872:
2862:
2851:. Retrieved
2847:
2834:
2823:. Retrieved
2811:
2801:
2790:. Retrieved
2780:
2766:
2757:
2729:
2718:. Retrieved
2708:
2685:
2652:
2609:. Retrieved
2605:
2595:
2583:. Retrieved
2578:
2569:
2558:. Retrieved
2554:
2544:
2533:. Retrieved
2529:
2520:
2511:
2502:
2493:
2484:
2473:. Retrieved
2469:
2459:
2448:. Retrieved
2444:
2435:
2424:. Retrieved
2422:. 2022-04-15
2419:
2410:
2399:. Retrieved
2395:
2358:. Retrieved
2354:
2330:. Retrieved
2328:. 2021-01-25
2325:
2302:. Retrieved
2290:
2268:
2258:
2246:. Retrieved
2242:
2218:. Retrieved
2214:
2205:
2194:. Retrieved
2190:the original
2185:
2176:
2165:. Retrieved
2163:. 2017-12-20
2160:
2151:
2140:. Retrieved
2136:
2126:
2115:. Retrieved
2112:Fox Business
2111:
2101:
2090:. Retrieved
2086:
2062:. Retrieved
2058:
2034:. Retrieved
2030:
2005:, retrieved
2003:, 2021-06-20
1999:
1975:. Retrieved
1971:
1961:
1950:. Retrieved
1946:
1937:
1925:. Retrieved
1921:finextra.com
1920:
1911:
1899:. Retrieved
1894:
1885:
1866:
1857:
1848:
1838:
1827:. Retrieved
1823:the original
1818:
1809:
1797:. Retrieved
1793:the original
1783:
1772:. Retrieved
1768:the original
1763:
1753:
1742:. Retrieved
1738:the original
1733:
1724:
1713:. Retrieved
1709:
1700:
1689:. Retrieved
1685:
1676:
1665:. Retrieved
1663:. 2017-05-23
1660:
1651:
1640:. Retrieved
1636:
1626:
1615:. Retrieved
1611:
1601:
1590:. Retrieved
1579:The Guardian
1578:
1568:
1557:. Retrieved
1555:. 2017-05-16
1552:
1543:
1532:. Retrieved
1528:
1519:
1508:. Retrieved
1504:
1478:. Retrieved
1476:. 2016-05-26
1473:
1464:
1453:. Retrieved
1448:
1439:
1428:. Retrieved
1424:
1415:
1404:. Retrieved
1402:. 2018-09-06
1399:
1376:. Retrieved
1372:
1362:
1351:. Retrieved
1347:
1338:
1327:. Retrieved
1325:. 2021-10-10
1322:
1302:the original
1287:
1276:. Retrieved
1272:
1263:
1252:. Retrieved
1250:. 2017-12-19
1247:
1238:
1226:. Retrieved
1216:
1207:
1198:
1189:
1180:
1171:
1167:
1158:
1149:
1145:
1136:
1127:
1123:
1114:
1095:
1034:
1005:supply chain
993:
988:
980:
979:
963:
951:Electricfish
860:
833:
829:
820:
812:
806:
798:
774:
762:
742:
734:
726:
717:
708:
696:
676:
656:
641:
633:
611:
598:
582:
553:
541:
524:DoublePulsar
523:
520:
504:
500:DoublePulsar
499:
495:
491:DoublePulsar
489:
483:
480:DoublePulsar
479:
475:
472:
463:TCP port 445
458:
447:
432:
417:
408:
397:
382:
353:
323:
307:
292:
267:
246:
237:
233:
226:Hidden Cobra
225:
218:cyberattacks
205:
201:
197:
196:
190:Hidden Cobra
158:Affiliations
72:cyberwarfare
4423:NetTraveler
4361:LogicLocker
4269:Hidden Tear
4166:Red October
4025:Dragonblood
3935:EternalBlue
3899:Stagefright
3765:George Hotz
3742:Individuals
3492:CyberBerkut
1633:"The Wired"
1224:. Microsoft
1173:(Microsoft)
1129:District...
1049:money mules
1031:Indictments
985:South Korea
959:Powerspritz
856:Philippines
825:Crowdstrike
745:US Treasury
618:AstraZeneca
532:cyberweapon
515:domain name
511:kill switch
496:EternalBlue
485:EternalBlue
476:EternalBlue
330:EternalBlue
310:North Korea
249:North Korea
214:North Korea
92:North Korea
4462:Categories
4366:Rensenware
4351:BrickerBot
4279:TeslaCrypt
4069:Bad Rabbit
4019:Foreshadow
3923:Cloudbleed
3875:Row hammer
3857:Shellshock
3851:Heartbleed
3839:Evercookie
3815:The Jester
3697:Red Apollo
3657:BlueNorOff
3627:GOSSIPGIRL
3622:Fancy Bear
3612:Elfin Team
3607:DarkMatter
3602:Dark Basin
3587:Bureau 121
3547:Teamp0ison
3472:Hacktivism
3103:DNSChanger
2878:2021-02-20
2853:2019-08-16
2825:2019-08-16
2792:2019-08-16
2720:2019-08-16
2611:2019-08-16
2585:10 October
2560:2024-07-31
2535:2022-04-15
2475:2023-12-05
2450:2023-03-22
2426:2022-04-15
2401:2023-12-15
2360:2023-03-13
2332:2023-03-13
2304:2023-03-17
2220:2018-11-13
2196:2018-01-17
2167:2018-01-17
2142:2018-01-17
2117:2018-01-17
2092:2018-01-17
2064:2018-01-17
2036:2018-01-17
2007:2022-01-14
1977:2022-01-14
1952:2022-01-14
1829:2016-02-29
1774:2017-05-16
1744:2016-03-01
1715:2016-03-01
1691:2016-03-01
1667:2017-05-23
1642:2017-05-16
1637:Securelist
1617:2017-05-16
1612:Securelist
1592:2017-05-16
1559:2017-05-16
1534:2017-05-15
1510:2017-10-19
1480:2017-10-19
1455:2016-02-29
1430:2022-04-21
1406:2022-01-14
1378:2020-08-26
1353:2020-08-26
1329:2021-10-11
1278:2019-08-16
1254:2019-08-16
1228:21 January
1107:References
1061:Bureau 121
935:Closeshave
903:Sorrybrute
895:Smoothride
803:BlueNorOff
459:cryptoworm
377:See also:
319:IP address
206:Whois Team
188:Whois Team
168:, AndAriel
162:Bureau 121
4397:VPNFilter
4274:Rombertik
4238:FinFisher
4228:DarkHotel
4192:DarkSeoul
4100:Coreflood
3965:BlueBorne
3917:Dirty COW
3831:disclosed
3829:publicly
3667:NSO Group
3597:Cozy Bear
3537:PayPal 14
3480:Anonymous
3354:SHAttered
3098:DigiNotar
2820:0362-4331
2299:1059-1028
2186:MSN Money
1587:0261-3077
1013:Gh0st RAT
931:Cleantoad
927:Bootwreck
887:Quickcafe
875:Macktruck
863:DarkComet
852:Sri Lanka
771:Education
648:Microsoft
554:In 2018,
538:Aftermath
242:Microsoft
118:backdoors
102:Zero-days
88:Pyongyang
43:Formation
4438:Titanium
4381:XafeCopy
4376:WannaCry
4305:KeRanger
4233:Duqu 2.0
4218:Carbanak
4037:BlueKeep
4013:SigSpoof
3971:Meltdown
3887:WinShock
3869:Rootpipe
3770:Guccifer
3692:Pranknet
3687:PLATINUM
3661:AndAriel
3572:Advanced
3527:NullCrew
3512:LulzRaft
3412:Trustico
3025:Timeline
2694:cite web
2620:cite web
2606:Newsweek
2420:BBC News
2369:cite web
2215:NiceHash
1865:(2023).
1661:BBC News
1474:Symantec
1323:BBC News
1126:. 2019.
1055:See also
1021:Phandoor
981:AndAriel
976:AndAriel
947:Twopence
915:Mapmaker
911:Snapshot
899:TightVNC
883:Whiteout
879:WannaCry
867:Mimikatz
817:Mandiant
777:Shenyang
753:SDN List
667:LinkedIn
589:Nicehash
338:Symantec
326:WannaCry
166:Unit 180
122:droppers
4335:X-Agent
4325:Pegasus
4208:Brambul
4171:Shamoon
4115:Kelihos
4105:Alureon
4084:Stuxnet
4054:Malware
4007:TLBleed
3989:Exactis
3977:Spectre
3911:Badlock
3845:iSeeYou
3810:Topiary
3542:RedHack
3532:OurMine
3517:LulzSec
2911:Sources
2655:. 2019.
2470:Reuters
2269:Reuters
1799:19 June
1764:Novetta
1066:Kimsuky
1025:Andarat
1017:Rifdoor
939:Dyepack
919:net.exe
907:Keylime
891:Rawhide
871:Nestegg
781:malware
679:patched
659:Twitter
585:Bithumb
560:Bitcoin
455:Europol
363:(MBR).
264:History
208:) is a
110:malware
98:Methods
79:Region
64:Purpose
37:ė¼ģė£Øģ¤ ģ”°ģ§
4418:Joanap
4371:Triton
4310:Necurs
4300:Jigsaw
4295:Hitler
4264:Dridex
4223:Careto
4146:Dexter
4079:SpyEye
4045:(2019)
4039:(2019)
4033:(2019)
4027:(2019)
4021:(2018)
4015:(2018)
4009:(2018)
4003:(2018)
3997:(2018)
3991:(2018)
3985:(2018)
3979:(2018)
3973:(2018)
3967:(2017)
3961:(2017)
3955:(2017)
3949:(2017)
3943:(2017)
3937:(2017)
3931:(2017)
3925:(2017)
3919:(2016)
3913:(2016)
3907:(2016)
3901:(2015)
3895:(2015)
3893:JASBUG
3889:(2014)
3883:(2014)
3877:(2014)
3871:(2014)
3865:(2014)
3863:POODLE
3859:(2014)
3853:(2014)
3847:(2013)
3841:(2010)
3824:Major
3805:Track2
3727:xDedic
3557:UGNazi
2943:Wired.
2937:Wired.
2818:
2326:Google
2297:
1927:13 May
1901:13 May
1873:
1585:
1273:IT PRO
1146:Rapid7
1023:, and
957:, and
943:Hermes
923:sysmon
819:) and
765:WazirX
665:, and
663:GitHub
644:Google
602:Kuwait
573:Hangul
569:Hancom
564:Monero
469:Attack
356:Mydoom
251:. The
210:hacker
134:Korean
4433:Tinba
4320:Mirai
4248:Regin
4161:Mahdi
4156:Flame
4141:Carna
4125:Stars
4043:Kr00k
3983:EFAIL
3953:KRACK
3905:DROWN
3030:2020s
3020:2000s
2873:ZDNet
2844:(PDF)
2754:(PDF)
2682:(PDF)
2291:Wired
1710:WIRED
1686:WIRED
1087:Notes
1009:Aryan
813:APT38
809:SWIFT
795:Units
178:APT38
4428:R2D2
4413:Grum
4406:2019
4390:2018
4356:Kirk
4344:2017
4315:MEMZ
4288:2016
4257:2015
4201:2014
4180:2013
4134:2012
4110:Duqu
4093:2011
4062:2010
3800:Sabu
3552:TDO
3497:GNAA
3431:2019
3405:2018
3347:2017
3281:2016
3240:2015
3194:2014
3158:2013
3132:2012
3086:2011
3049:2010
2816:ISSN
2700:link
2626:link
2587:2021
2375:link
2295:ISSN
2250:2019
2059:CNBC
1929:2021
1903:2021
1871:ISBN
1801:2016
1583:ISSN
1230:2024
823:(by
815:(by
749:OFAC
646:and
562:and
542:The
478:and
448:The
240:(by
234:ZINC
186:ZINC
54:Type
49:2009
4151:FBI
3795:MLT
3659:) (
2512:FBI
2494:FBI
2243:MSN
1425:BBC
827:).
747:'s
571:'s
284:FBI
236:or
204:or
4464::
2895:.
2871:.
2846:.
2814:.
2810:.
2756:.
2740:^
2696:}}
2692:{{
2684:.
2661:^
2651:.
2634:^
2622:}}
2618:{{
2604:.
2577:.
2553:.
2528:.
2510:.
2492:.
2468:.
2443:.
2418:.
2394:.
2383:^
2371:}}
2367:{{
2353:.
2341:^
2324:.
2313:^
2293:.
2289:.
2277:^
2267:.
2241:.
2229:^
2213:.
2184:.
2159:.
2135:.
2110:.
2085:.
2073:^
2057:.
2045:^
2029:.
2015:^
1986:^
1970:.
1945:.
1919:.
1893:.
1847:.
1817:.
1762:.
1732:.
1708:.
1684:.
1659:.
1635:.
1610:.
1581:.
1577:.
1551:.
1527:.
1503:.
1489:^
1472:.
1447:.
1423:.
1398:.
1387:^
1371:.
1346:.
1321:.
1310:^
1296:.
1271:.
1246:.
1206:.
1188:.
1170:.
1166:.
1148:.
1144:.
1122:.
1027:.
1019:,
1015:,
1011:,
999:,
961:"
953:,
949:,
945:,
941:,
937:,
933:,
929:,
925:,
921:,
917:,
913:,
909:,
905:,
901:,
897:,
893:,
889:,
885:,
881:,
877:,
873:,
869:,
865:,
787:,
661:,
604:.
312:.
164:,
120:,
116:,
112:,
108:,
104:,
90:,
86:,
70:,
47:c.
3663:)
3655:(
3000:e
2993:t
2986:v
2973:.
2920:.
2881:.
2856:.
2828:.
2795:.
2774:.
2723:.
2702:)
2688:.
2628:)
2614:.
2589:.
2563:.
2538:.
2478:.
2453:.
2429:.
2404:.
2377:)
2363:.
2335:.
2307:.
2271:.
2252:.
2223:.
2199:.
2170:.
2145:.
2120:.
2095:.
2067:.
2039:.
1980:.
1955:.
1931:.
1905:.
1879:.
1851:.
1832:.
1803:.
1777:.
1747:.
1718:.
1694:.
1670:.
1645:.
1620:.
1595:.
1562:.
1537:.
1513:.
1483:.
1458:.
1433:.
1409:.
1381:.
1356:.
1332:.
1281:.
1257:.
1232:.
317:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.