The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Thursday sanctioned the North Korea-linked adversarial collective known as Kimsuky as well as eight foreign-based agents who are alleged to have facilitated sanctions evasion.
财政部外国资产控制办公室(OFAC)在周四制裁了与朝鲜联系紧密的对手集体Kimsuky以及据称协助逃避制裁的八名外国代理人。
The agents, the Treasury said, helped in "revenue generation and missile-related technology procurement that support the DPRK's weapons of mass destruction (WMD) programs."
财政部表示这些代理人协助"收入来源和支持朝鲜民主主义人民共和国大规模杀伤性武器(WMD)项目的导弹相关技术采购。"
The sanctions against Kimsuky, which have been levied for gathering intelligence to support the regime's strategic objectives, come more than four years after the OFAC imposed similar measures against the Lazarus Group and its offshoots Andariel and BlueNoroff in September 2019.
针对Kimsuky的制裁是因为其收集情报支持政权的战略目标,这是在OFAC于2019年9月对拉萨鲁斯集团及其分支机构Andariel和BlueNoroff施加类似措施四年余之后。
The actions are in response to North Korea's launch of a military reconnaissance satellite late last month, the Treasury added. They also arrive a day after a virtual currency mixer service called Sinbad was sanctioned for processing stolen assets linked to hacks perpetrated by the Lazarus Group.
财政部补充说,这些行动是对朝鲜上个月发射军事侦察卫星的回应,并且在一个名为Sinbad的虚拟货币混合器服务因处理与拉萨鲁斯集团有关的盗窃资产而被制裁的一天后到来。
Kimsuky – also called APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet (previously Thallium), Nickel Kimball, and Velvet Chollima – is a prolific cyber espionage crew that primarily targets governments, nuclear organizations, and foreign relations entities to collect intelligence that help further North Korea's interests.
Kimsuky又名APT43,ARCHIPELAGO,Black Banshee,Emerald Sleet(之前的Thallium),Nickel Kimball和Velvet Chollima,是一个多产的网络间谍团队,主要针对政府、核组织和外交机构以收集情报,来支持朝鲜的利益。
"The group combines moderately sophisticated technical capabilities with aggressive social engineering tactics, especially against South Korean and U.S.-based government organizations, academics, and think tanks focused on Korean peninsula geopolitical issues," Google-owned Mandiant noted in October 2023.
Google旗下的Mandiant在2023年10月指出,"该组织结合了适度复杂的技术能力与激进的社会工程策略,尤其是针对韩国和美国政府组织、学术界以及专注于朝鲜半岛地缘政治问题的智库。"
Like the Lazarus Group, it's also an element within the Reconnaissance General Bureau (RGB), which is North Korea's primary foreign intelligence service that's responsible for intelligence collection operations. It's known to be active since at least 2012.
与拉萨鲁斯团伙一样,Kimsuky也是朝鲜中央情报局(RGB)的一部分,这是朝鲜主要的外国情报机构,负责情报搜集行动,据悉从2012年以来一直活跃。
"Kimsuky employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets," the Treasury said.
财政部称,"Kimsuky采用社会工程学来搜集涉及地缘政治事件、外交政策战略以及影响其利益的外交努力的情报,通过非法方式获取目标的私人文件、研究和通信"。
The agency also identified Kang Kyong Il, Ri Sung Il, and Kang Phyong Guk for acting as weapons sales representatives; So Myong, Choe Un Hyok, and Jang Myong Chol for engaging in illicit financial transfers to procure material for North Korea's missile programs; and Choe Song Chol and Im Song Sun for running front companies involved in generating revenue by exporting skilled workers.
该机构还确定了姜京日、李成日和康炳国因充当武器销售代表;苏明、崔银赫和张明哲因从事非法金融转账以采购朝鲜导弹项目的材料;以及崔松哲和任松顺因经营涉及通过"出口熟练工人"赚取收入的前台公司。
"The geographic breakdown of North Korean threat groups' targeting in the cryptocurrency industry [follows a multi-pronged approach], where Kimsuky has been seen targeting the cryptocurrency industry in South Korea, and Lazarus Group has a more global presence in their cryptocurrency targeting operations," Recorded Future said in a new report published this week.
"朝鲜威胁团体在加密货币行业的地理分布遵循了多管齐下的方式,Kimsuky已经被发现针对韩国的加密货币行业进行目标定位,而拉萨鲁斯团伙在其加密货币目标运营中具有更广泛的全球影响力。"
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...