Type | Person | [sources] | |||
---|---|---|---|---|---|
Name | Park Jin Hyok | [sources] | |||
Other name | Pak Jin Hek | [sources] | |||
Birth date | not available | [sources] | |||
Gender | male | [sources] | |||
Nationality | North Korea | [sources] | |||
Description | North Korean hacker, who worked as a member of the Lazarus Group. Interdicted by the United States Government in September 2018. According to the United States, Park “has travelled to China in the past and conducted legitimate IT work under the front company ‘Chosun Expo’ or the Korean Expo Joint Venture in addition to activities conducted on behalf of North Korea ’s Reconnaissance General Bureau” (RGB. KPe.031). Involved in several cybercrime attacks on international targets. Wanted by the FBI: https://www.fbi.gov/wanted/cyber/park-jin-hyok. | [sources] | |||
Last change | Last processed | First seen |
The record has been enriched with data from the following external databases:
For experts: raw data explorer
OpenSanctions is free for non-commercial users. Businesses must acquire a data license to use the dataset.
Linked to | ||||
---|---|---|---|---|
Object | Role | Start date | End date | |
Korea Expo Joint Venture Corporation | Has conducted "legitimate IT work" for the company | - | - | |
Reconnaissance General Bureau | Has conducted activities on behalf of the Reconnaissance General Bureau | - | - |
Memberships | ||||
---|---|---|---|---|
Organization | Role | Start date | End date | |
Lazarus Group | Member | - | - |