Search OpenSanctions

Advanced

Kimsuky Group

Sanction-linked entity
TypeOrganization[sources]
NameKimsuky Group[sources]
Other nameAPT 43 · APT43 · Kimsuky · Sharptongue · Thallium · 1 more...[sources]
Legal formnot available[sources]
CountryNorth Korea[sources]
DescriptionNorth Korean cybercrime group controlled by the Reconnaissance General Bureau (RGB; KPe.031).[sources]
E-Mailbing2020@outlook.kr · donghyunkim1010@gmail.com · ds1kde@daum.net · ds1kdie@aol.com · haris2022100@outlook.com · 11 more...[sources]
Statusnot available[sources]
Last changeLast processedFirst seen

Descriptions

In Annex 98 (p. 568) of the UN Panel of Experts March 2024 report, the Panel released a list of websites associated with Kimsuky. Please proceed with caution as the following URLs might be linked to cybercrime activities and the distribution of malware: sovershopp[.]online; onerearth[.]xyz; mofa[.]lat; janskinmn[.]lol; supermeasn[.]lat; bookstarrtion[.]online; cdredos[.]site; scemsal[.]site; somelmark[.]store

DPRK Reports non-official source,

Relationships

Data sources

DPRK Reports5,540

A database of entities and events related to North Korea's sanctions evasion efforts.

United Kingdom · RUSI · non-official source

External databases

The record has been enriched with data from the following external databases:

Graph-based entity tagging63,732

Automatically generated graph-based topic annotations

External dataset · OpenSanctions · non-official source


For experts: raw data explorer