Worryingly, this blueprint is also being mimicked by other rogue states. “This money is being funneled directly into weapons programmes and cyber crime has become an essential cog in the ongoing survival of Kim Jong Un’s dictatorship. “ Our research shows that the proceeds of cyber criminal activities from infamous groups such as Lazarus and APT38 – which are both named by the US State Department – are being used to circumvent international sanctions in North Korea,” said Bocek.
![critical ops pc hack 2017 critical ops pc hack 2017](https://1.bp.blogspot.com/-dfU4GPgNocU/WeA6qfv2Y5I/AAAAAAAAAV0/x4PKfl7FuWYfbeyhYH4G8j4El05WIpQYgCLcBGAs/w1200-h630-p-k-no-nu/maxresdefault.jpg)
Kevin Bocek, vice-president of security strategy and threat intelligence at Venafi, a specialist in machine identity management, said the doubling of the reward showed how much of a threat North Korean actors have become in the international cyber crime sphere. The State Department said North Korean threat actors were targeting US critical infrastructure with disruptive cyber attacks in violation of the Computer Fraud and Abuse Act, as well as targeting financial institutions – including cryptocurrency exchanges – and businesses to steal funds in support of North Korea’s nuclear and ballistic missile programmes, in contravention of sanctions against the regime. ONKHXwWiV1 - Rewards for Justice 26, 2022 Got a tip on the Lazarus Group, Kimsuky, Bluenoroff, Andariel, or others? Send it to RFJ via our TOR-based tip line. REWARD! Up to $10M for information on DPRK-linked malicious #cyber activity & #cyberthreat actors. In a new notice posted to Twitter, the Rewards for Justice programme – which was established in the 1980s to offer bounties for information on terrorism and, latterly, cyber crime – invited anyone with information on these groups to contact it through its dark web-based Tor tip line.