**Park Jin Hyok:

Key Details**

- **Affiliation**: Member of the **Lazarus Group**, a cybercrime unit tied to North Korea’s Reconnaissance General Bureau (RGB).

- **DOJ Charges**:

- Indicted in 2018 for conspiracy to commit computer fraud, wire fraud, and bank fraud.

- Linked to major cyberattacks, including:

1. **2014 Sony Pictures Hack** (retaliation for *The Interview* film).

2. **2016 Bangladesh Bank Heist** ($81M stolen via SWIFT network).

3. **2017 WannaCry Ransomware** (global disruption of hospitals, businesses).

- **Modus Operandi**: Phishing, malware deployment (e.g., *BankJob* malware), and cryptocurrency theft to fund North Korea’s regime.

**Current Status (2024)**

- **Location**: Believed to operate from North Korea, shielded by the regime.

- **Sanctions**: Designated by the U.S. Treasury (OFAC) under sanctions targeting Lazarus Group.

- **Recent Activity**: Lazarus Group remains active in crypto hacks (e.g., $625M Ronin Bridge attack in 2022, $100M Horizon Bridge exploit).

---

**Cybersecurity Implications**

- **Targets**: Financial institutions, crypto exchanges, and critical infrastructure.

- **Motivation**: Generate revenue for North Korea’s sanctioned nuclear program.

- **U.S. Rewards**: The State Department offers up to **$5M** for info on Lazarus Group operatives.