What is APT38?
APT38 is a North Korean state-sponsored threat group that conducts financially motivated cyberattacks against banks, cryptocurrency exchanges, and financial institutions worldwide. While most advanced persistent threats (APTs) focus on espionage or intellectual property theft, APT38 operates with the specific goal of stealing funds. This distinction is critical because their tactics align more closely with high-end bank heists than traditional intelligence gathering operations.
This financial mandate drives them to target high-value infrastructure where large sums can be moved quickly. Their targets have shifted over time from traditional SWIFT banking terminals to modern blockchain bridges and decentralized finance (DeFi) platforms.
Mandiant designated APT38 as a separate entity from the broader Lazarus Group due to its distinct financial focus, unique tooling, and specialized operational patterns targeting SWIFT banking infrastructure. The group has been active since at least 2014, initially compromising banks in Southeast Asia and Africa before expanding globally. Their ability to navigate complex financial networks indicates a deep understanding of banking protocols and transaction workflows.
Security teams must recognize that this adversary is well-resourced, patient, and willing to destroy victim environments to cover their tracks. Understanding their specific motivations helps defenders prioritize the protection of payment gateways, crypto wallets, and transaction authorization systems.
APT38's relationship to Lazarus Group and North Korean threat actors
Security researchers often use "Lazarus Group" as an umbrella term for multiple North Korean-linked operations, and APT38 is commonly described as a financially focused cluster that is related to (and sometimes discussed alongside) Lazarus tracking. This taxonomy helps practitioners distinguish between different mission objectives originating from the same state sponsor. While the groups may share malware families or infrastructure, their operational goals and targets differ significantly.
The organizational structure generally divides responsibilities: APT38 handles bank heists and cryptocurrency theft, while other sub-groups focus on different priorities. BlueNorOff (also known as Sapphire Sleet) is often cited as a specific subgroup or close affiliate focused on cryptocurrency targeting. Meanwhile, groups like Andariel typically conduct espionage operations against defense and political targets.
Various security vendors use different aliases to track these activities.
| Alias | Vendor |
|---|---|
| APT38 | Mandiant: financial ops |
| BlueNorOff/Sapphire Sleet | Microsoft designation for crypto-focused subset |
| Stardust Chollima | CrowdStrike designation |
| NICKEL GLADSTONE | Secureworks designation |
Public reporting may attribute the same incidents to different names depending on vendor taxonomy. For example, a CrowdStrike report on "Stardust Chollima" and a Mandiant report on "APT38" may describe overlapping activity. Defenders should focus on TTPs, techniques, and infrastructure indicators rather than relying solely on group labels. When investigating potential APT38 activity, search across all known aliases and cross-reference MITRE ATT&CK techniques to ensure comprehensive threat intelligence coverage.
This distinction matters for practitioners because different sub-groups use different tactics, techniques, and procedures (TTPs). A detection rule designed for Andariel's espionage tools might not catch APT38's financial manipulation scripts. Security teams should reference MITRE ATT&CK Group G0082 to review techniques publicly attributed to this cluster and related activity.
Major APT38 campaigns and attributed attacks
North Korean-linked operators have conducted dozens of confirmed operations across multiple continents, including extremely large cryptocurrency thefts such as the $1.5 billion Bybit incident described by the FBI.
The following table highlights some of the major attacks attributed to the group:
| Campaign | Year | Target | Outcome |
|---|---|---|---|
| Bangladesh Bank | 2016 | Central bank SWIFT network | $81M stolen (attempted $951M) |
| Far Eastern International Bank | 2017 | Taiwan bank SWIFT network | $60M stolen, partially recovered |
| Banco de Chile | 2018 | Bank SWIFT network | $10M stolen |
| Harmony Horizon Bridge | 2022 | Cryptocurrency bridge | $100M stolen |
| Axie Infinity/Ronin Bridge | 2022 | Gaming cryptocurrency bridge | $620M stolen |
The FBI has publicly attributed multiple cryptocurrency thefts to APT38 and the Lazarus Group, confirming their role in these massive losses. These represent only publicly confirmed operations; the actual scope of their activity is likely larger, as many compromises may go unreported or misattributed.
How Wiz helps defend against threat actors
Wiz Defend provides runtime detection for suspicious process execution and fileless-like techniques across cloud workloads, helping teams investigate behavior that blends into legitimate admin activity. By monitoring for anomalies in real-time, security teams can detect the subtle signs of "living off the land" tactics that traditional signature-based tools miss.
The Threat Center surfaces threat intelligence, enabling security teams to immediately assess exposure to emerging campaigns. When a new vulnerability is linked to threat actors, teams can instantly see which assets are exposed and prioritize remediation. Automated investigation capabilities correlate cloud events with runtime signals to build attack timelines without manual pivoting across disconnected log sources, countering the group's attempts to hide their tracks.
Wiz's identity risk analysis detects the credential theft, privilege escalation, and unusual access patterns that characterize lateral movement. Attack path analysis visualizes how initial access vectors connect to sensitive financial systems, allowing teams to proactively harden these paths before an attack occurs.
Schedule a demo to see how Wiz connects cloud posture, identity risk, and runtime signals into prioritized attack paths, so teams can focus on the exposures that actually enable theft.
Detect active cloud threats
Learn how Wiz Defend detects active threats using runtime signals and cloud context—so you can respond faster and with precision.
