Type | Organization | [sources] | |||
---|---|---|---|---|---|
Name | BeagleBoyz Group | [sources] | |||
Legal form | not available | [sources] | |||
Country | not available | [sources] | |||
Description | Cybercrime group controlled by the Reconnaissance General Bureau (RGB. KPe.031). Active since 2014, the BeagleBoyz group was implicated in the 2016 Bangladesh Bank heist. They attempted to steal nearly $2 billion since 2015 through ATM cash-outs and attacks on SWIFT terminals and financial institution servers. They also targeted cryptocurrency exchanges with remote access and spearphishing emails. The group's activities match the reported cyberattacks on financial institutions and exchanges. The suspected 2016 South African bank attack leader fled to the Democratic People’s Republic of Korea post-attack. | [sources] | |||
Status | not available | [sources] | |||
Last change | Last processed | First seen |
A database of entities and events related to North Korea's sanctions evasion efforts.
United Kingdom · RUSI · non-official source
For experts: raw data explorer
OpenSanctions is free for non-commercial users. Businesses must acquire a data license to use the dataset.
Linked from | ||||
---|---|---|---|---|
Subject | Role | Start date | End date | |
Reconnaissance General Bureau Sanctioned entity | The Reconnaissance General Bureau oversees all North Korean cybercrime activities | - | - |