, 10 tweets, 2 min read Read on Twitter
The indictment about the Sony and Bangladesh bank attacks is 179 pages. Here are some first insights:

1/n

documentcloud.org/documents/4834…
First, some remarks on methodology:

Compared to the GRU indictment from a few weeks earlier, this one contains less details about the individuals and their organization. E.g. it is not really clear how many "co-conspirators" are covered and how close their cooperation is.

2/n
But: This indictment is much more transparent about the attribution and analysis methods than the GRU indictment.
Mostly, the methods are comparable to what security companies do: malware similarities, identifying shared encryption keys and shared email accounts.

3/n
Compared to analysis methods of security companies, the FBI gained a bit mor insight by getting access to collector email accounts and email subscriber records.

4/n
The difference between the Sony and GRU indictments (less suspects' details, more methodology details) hints at the possibility that the findings about GRU were not gained from classic malware and network analysis (see above), but from more confidential sources.

5/n
Now, about the findings themselves:

The main suspect supposedly worked for "Chosun Expo Joint Venture", which is called a front for the "Lab 110" of the North Korean government.

6/n
Apparently, the main subject did not just do hacking, but also did benign programming work for customers. This was probably a means to generate funds for the North Korean government and corroborates public reports about these fund generation methods.

7/n
These benign&hacking activities went on for several years, during which the suspect used the same email accounts for benign and malicious work projects. This _may_ be an indication that the difference between legal and illegal projects may not be very relevant for the suspect
8/n
The traced North Korean IP addresses are masked in the indictment, but allude to the public report by Group IB, who traced Lazarus connections to the Ryugyong Hotel in Pyongyang: group-ib.com/blog/lazarus

9/n
I had hoped that the indictment would shed more light on how exactly the Sony and Bangladesh Bank ("SWIFT" cases are related. But the links are similar to what security companies reported earlier: e.g. reused email accounts for spearphishing and malware similarities

10/n
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Timo Steffens
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!