Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Stay on top of the latest market trends
Subscribe to Axios Markets for the latest market trends and economic insights. Sign up for free.
Sports news worthy of your time
Binge on the stats and stories that drive the sports world with Axios Sports. Sign up for free.
Tech news worthy of your time
Get our smart take on technology from the Valley and D.C. with Axios Login. Sign up for free.
Get the inside stories
Get an insider's guide to the new White House with Axios Sneak Peek. Sign up for free.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Want a daily digest of the top Denver news?
Get a daily digest of the most important stories affecting your hometown with Axios Denver
Want a daily digest of the top Des Moines news?
Get a daily digest of the most important stories affecting your hometown with Axios Des Moines
Want a daily digest of the top Twin Cities news?
Get a daily digest of the most important stories affecting your hometown with Axios Twin Cities
Want a daily digest of the top Tampa Bay news?
Get a daily digest of the most important stories affecting your hometown with Axios Tampa Bay
Want a daily digest of the top Charlotte news?
Get a daily digest of the most important stories affecting your hometown with Axios Charlotte
North Korean leader Kim Jong Un. AFP photo /KCNA via KNS
Researchers at FireEye say a newly profiled group they nicknamed APT 37 or Reaper is now targeting Japan, Vietnam and the Middle East, including targets in a bevy of industries. It had until recently been focused on South Korea. FireEye believes Reaper is North Korean.
Between the lines: North Korea runs several separate hacking operations, including the prominent (and distinct) Lazarus Group known for hacking Sony. Reaper is known to have used a previously undiscovered security flaw in Flash during an attack. Since such unknown security problems are not cheap to research, this suggests the group is fairly well resourced.
How do they know it's North Korea? Beyond victimology — the group, for example, targeted South Korean businesses with former ties to the North — one Reaper accidentally let his real internet address slip through the infrastructure used to make the attacks anonymous. North Korean internet address. North Korea keeps a close handle on internet connections within the country.
The details: Though this is the first discussion of the group as a single actor, certain tools have been discussed in the past. FireEye discussed a key attack method in early February, and Kaspersky and Cisco have written about specific malware the group uses as well.
Why now? FireEye claims to have tracked the group for three years. Researchers don't usually come forward with detailed profiles of attackers; allowing North Korea to believe security companies and the intelligence community are oblivious to a campaign gives the good guys a leg up. But FireEye said it was pressed by the expanded range of targets into releasing information about the group.