Scroll Top

North Korean hackers infiltrate prominent Russian missile manufacturer


A recent discovery has revealed that an elite group of North Korean hackers successfully breached the computer networks of a significant Russian missile developer for an extended period of at least five months last year. Technical evidence scrutinized by Reuters and analysis conducted by security researchers shed light on this cyber-espionage operation.

Security researchers have identified the cyber-espionage units associated with the North Korean government, specifically referred to as ScarCruft and Lazarus. These groups were found to have covertly implanted stealthy digital backdoors into the systems of NPO Mashinostroyeniya, a prominent rocket design bureau located in Reutov, a small town situated on the outskirts of Moscow.

It remains unclear whether any data was exfiltrated during the breach or what information may have been accessed. Following this digital intrusion, Pyongyang announced various advancements in its prohibited ballistic missile program. It remains uncertain whether these developments were connected to the breach.

This incident highlights the extent to which North Korea is willing to target even its allies, such as Russia, in its relentless pursuit of critical technologies.

NPO Mashinostroyeniya, also known as NPO Mash, has long been recognized as a pioneer developer in hypersonic missiles, satellite technologies, and next-generation ballistic armaments. These areas of expertise are of keen interest to North Korea as it endeavors to create an Intercontinental Ballistic Missile (ICBM) capable of reaching the mainland United States.

The breach reportedly commenced in late 2021 and persisted until May 2022, when internal communications within the company revealed the hackers’ activities. These breaches allowed the hackers to infiltrate the IT environment, granting them the ability to intercept email traffic, navigate between networks, and extract sensitive data.

The gravity of this incident emphasizes the critical nature of cybersecurity measures, even among alliances. As the landscape of cyber-espionage continues to evolve, vigilance in protecting sensitive information and critical technologies remains paramount. continues to provide up-to-date information and insights on cybersecurity matters, ensuring that readers stay informed about the evolving threats in the digital realm. This latest revelation underscores the persistent and evolving nature of cyber threats and the necessity of robust defensive strategies in today’s interconnected world.

Related Posts

Leave a comment

You must be logged in to post a comment.
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.