**Park Jin Hyok:
Key Details**
- **Affiliation**: Member of the **Lazarus Group**, a cybercrime unit tied to North Korea’s Reconnaissance General Bureau (RGB).
- **DOJ Charges**:
- Indicted in 2018 for conspiracy to commit computer fraud, wire fraud, and bank fraud.
- Linked to major cyberattacks, including:
1. **2014 Sony Pictures Hack** (retaliation for *The Interview* film).
2. **2016 Bangladesh Bank Heist** ($81M stolen via SWIFT network).
3. **2017 WannaCry Ransomware** (global disruption of hospitals, businesses).
- **Modus Operandi**: Phishing, malware deployment (e.g., *BankJob* malware), and cryptocurrency theft to fund North Korea’s regime.
**Current Status (2024)**
- **Location**: Believed to operate from North Korea, shielded by the regime.
- **Sanctions**: Designated by the U.S. Treasury (OFAC) under sanctions targeting Lazarus Group.
- **Recent Activity**: Lazarus Group remains active in crypto hacks (e.g., $625M Ronin Bridge attack in 2022, $100M Horizon Bridge exploit).
---
**Cybersecurity Implications**
- **Targets**: Financial institutions, crypto exchanges, and critical infrastructure.
- **Motivation**: Generate revenue for North Korea’s sanctioned nuclear program.
- **U.S. Rewards**: The State Department offers up to **$5M** for info on Lazarus Group operatives.
