Type | Organization | [sources] | |||
---|---|---|---|---|---|
Name | BeagleBoyz Group | [sources] | |||
Legal form | not available | [sources] | |||
Country | not available | [sources] | |||
Description | Cybercrime group controlled by the Reconnaissance General Bureau (RGB. KPe.031). Active since 2014, the BeagleBoyz group was implicated in the 2016 Bangladesh Bank heist. They attempted to steal nearly $2 billion since 2015 through ATM cash-outs and attacks on SWIFT terminals and financial institution servers. They also targeted cryptocurrency exchanges with remote access and spearphishing emails. The group's activities match the reported cyberattacks on financial institutions and exchanges. The suspected 2016 South African bank attack leader fled to the Democratic People’s Republic of Korea post-attack. | [sources] | |||
Status | not available | [sources] | |||
Last change | Last processed | First seen |
The record has been enriched with data from the following external databases:
For experts: raw data explorer
OpenSanctions is free for non-commercial users. Businesses must acquire a data license to use the dataset.
Linked from | ||||
---|---|---|---|---|
Subject | Role | Start date | End date | |
Reconnaissance General Bureau | The Reconnaissance General Bureau oversees all North Korean cybercrime activities | - | - |