| Type | Company | [sources] | |||
|---|---|---|---|---|---|
| Name | NPO Mashinostroyenia | [sources] | |||
| Other name | НПО МАШИНОСТРОЕНИЕ | [sources] | |||
| Incorporation date | not available | [sources] | |||
| Jurisdiction | not available | [sources] | |||
| Country | Russia | [sources] | |||
| Description | The Lazarus Group compromised internal IT infrastructure of NPO Mashinostroyenia, a Russian defense sector company, likely between late 2021 and May 2022. A DLL file, an OpenCarrot Windows OS backdoor used by the Lazarus Group, was identified on multiple internal NPO Mash networks. | [sources] | |||
| Registration number | not available | [sources] | |||
| Last change | Last processed | First seen | |||
A database of entities and events related to North Korea's sanctions evasion efforts.
United Kingdom · RUSI · non-official source
For experts: raw data explorer
OpenSanctions is free for non-commercial users. Businesses must acquire a data license to use the dataset.
No relationships to other entities found.