Revisiting the Lazarus Operator: Mapping Park Jin Hyok’s Digital Footprint Using StealthMole

This investigation revisits the trail of Park Jin Hyok, the North Korean programmer linked to some of the most consequential cyber operations of the past decade, using StealthMole’s darkweb intelligence platform.

In 2022, an anonymous user known as AgainstTheWest released a collection of emails, IPs, and aliases allegedly tied to the Lazarus Group (APT38). Most researchers dismissed it as an echo of the US Department of Justice’s (DOJ) 2018 indictment. However, when those same identifiers were analyzed through StealthMole, a different picture began to surface: one that connected old aliases to new leaks, dormant domains to live servers, and historic front companies to recent credential exposures.

This report does not seek to re-tell the Lazarus story, it reconstructs it. By tracing the remnants of Park’s known infrastructure through Combo Binder, Credential Lookout, and Darkweb Tracker, the investigation uncovers fragments of a network that refused to disappear quietly. Some addresses had long been sanctioned, others forgotten, yet each left behind just enough residue to outline a still-evolving web of identities, domains, and IP trails.

Incident Trigger and Initial Investigation

The investigation began with a trace on a known Ethereum (ETH) wallet previously sanctioned for its role in the Ronin Bridge exploit, an attack attributed to the Lazarus Group. When this address, 0x09************************f96, was queried through StealthMole’s Darkweb Tracker, it returned several associated wallets, each bearing transaction histories consistent with sanctioned clusters.

These addresses included:

  • 0x3cf********************************073
  • 0xa0***********************************e4b
  • 0x53***********************************fc1

All were tagged as OFAC-sanctioned or Ronin Bridge Exploiter entities on-chain, confirming alignment with previously attributed Lazarus infrastructure. The wallet activity pattern, timestamps, and funding paths matched the broader APT38 laundering model: initial funding from compromised exchanges, consolidation into secondary wallets, and gradual distribution through mixers and bridge contracts.

To validate whether these on-chain artifacts could connect to personal identifiers, the investigation pivoted toward off-chain indicators. StealthMole Telegram Tracker was used to surface any mentions of the group, revealing channels discussing Lazarus-linked scams and reposts of the FBI’s wanted bulletin for Park Jin Hyok. These independent mentions established that the operator’s identity remained a live subject of discussion within underground circles, a useful signal for attribution continuity.

From there, the keyword “Park Jin Hyok” was run through StealthMole’s Darkweb Tracker, returning historical mentions and leaked datasets containing one of the earliest associated email addresses: bu*********it@gmail.com. This discovery served as the pivot point for the next phase, a deep cross-correlation of leaked credentials, IP metadata, and domain associations tied to Park’s alias ecosystem.

Expanded Investigation and Findings

Following the Ethereum wallet correlation, the investigation expanded to examine identifiers historically tied to Park Jin Hyok. The process began with the StealthMole query on the email address bu*********it@gmail.com, which surfaced a 2022 BreachForums thread authored by the user AgainstTheWest (ATW). The post claimed to expose datasets related to APT38 and included a comprehensive list of emails, IP addresses, aliases, and domains allegedly connected to Park and the broader Lazarus network.

While the ATW thread was not new to the intelligence community, its contents provided a valuable foundation for re-validation. Each identifier listed in the post was independently re-run through StealthMole’s Combo Binder, Credential Lookout, ULP, and Compromised Data Set modules. This approach allowed verification of which accounts had appeared in credential leaks after 2022, signaling persistent exposure and possible continued operational or personal use.

Across multiple queries, several addresses including pk******@hotmail.com, su******d@hotmail.com, ha*****e@hotmail.com, and h****_u@hotmail.com, returned new credential leak results extending into 2024 and 2025. These findings indicate that the original identifiers were not isolated to legacy datasets but have re-emerged in newer breach compilations. This pattern suggests either ongoing credential reuse, alias persistence across different operations, or the continued recycling of Lazarus-linked data within underground trading communities.

Parallel to the email correlation, StealthMole’s Darkweb Tracker identified Telegram discussions and reposts referencing Lazarus Group, APT38, and Park Jin Hyok. Channels such as t.me/fr*****d, t.me/bi****jr, and t.me/laz*****ic contained repeated mentions of the group’s past exploits, including community warnings about scams allegedly conducted under the “Lazarus” label. While these channels do not provide direct attribution, their visibility reinforces that Lazarus-linked narratives remain active within dark-web ecosystems.

To verify the infrastructure components, the domain hoonet.com, publicly known as the operational facade of the Chosun Expo Joint Venture, was run through StealthMole’s Combo Binder. The search returned 26 credential entries tied to internal mailboxes such as r*****@hoonet.com and r*****k@hoonet.com. Although these accounts do not directly overlap with Park’s known aliases, the timeline continuity and domain ownership align closely with Chosun Expo’s historical operations, further connecting the dataset to the Lazarus infrastructure ecosystem.

Taken together, the findings highlight how fragments from old disclosures can retain analytical value when cross-verified through modern datasets. Each confirmed overlap adds credibility to the persistence of the Lazarus digital ecosystem, emphasizing the group’s long-term operational continuity across both cryptocurrency and credential-based activity.

Infrastructure Correlation and Analysis

With the verified datasets in place, the next phase focused on establishing infrastructure continuity, linking the accounts, domains, and IP ranges to known Lazarus and APT38 operations. Using StealthMole’s integrated tools, each verified indicator was cross-referenced across DNS, WHOIS, and credential datasets to identify overlapping ownership patterns and operational signatures.

1. Credential Exposure Analysis

StealthMole’s Combo Binder, Credential Lookout, and Compromised Data Set (CDS) modules revealed recurring exposure patterns across multiple Lazarus-linked email addresses. Each entry was cross-checked for leak source, date range, and password reuse, establishing continuity between historical identifiers and recent breach activity.

Email AddressPasswordsTimeline
pia*******23@163.com$1$8************1Oct 2016; Oct 2020
pkj******0@hotmail.coma***********rLeaked 12 Times Between April 2021 and February 2025
jon*********2@gmail.com"j******u"April 2016
sur*********d@hotmail.comPg******5; 1*****4; pg**********@Leaked 23 Times Between December 2022 and February 2025
ha********e@hotmail.commD********D; md********d; "ha*********e; GO************=Leaked 11 Times Between Oct 2013 and February 2025
hy*****_u@hotmail.com1q**********rLeaked Twice Between July 2023 and February 2025
gp*********3@gmail.comGp*********3July 2023

All seven email accounts originally cited in the ATW breach resurfaced in recent (2023–2025) credential datasets. The recurrence of these identifiers, especially those tied to Chosun Expo (gpcmarket) and Lazarus-linked aliases (hyon_u, hackgase), demonstrates operational persistence rather than isolated historical exposure. The combination of old and new leaks indicates ongoing credential circulation, either through data reuse by the actor or continued underground redistribution of legacy dumps.

2. Domain and Corporate Infrastructure

Domain analysis confirmed a recurring link between the Chosun Expo Joint Venture and its associated domain hoonet.com, both previously documented as Lazarus front entities. StealthMole’s Combo Binder results revealed multiple internal @hoonet.com accounts exposed between 2022 and 2025.

Domain / EntityAssociated AccountsLeakTimelineObserved PatternsNotes
hoonet.comr******@hoonet.com, ro****k@hoonet.com, nik******e@hoonet.com262022-2025Shared weak credential reuse (ro*****k, 12*****p)Domain historically owned by Chosun Expo JV; modern exposures indicate post-sanction persistence.
chosunexpo.comNo direct leaks foundDomain inactive but referenced in prior DOJ filingsFront entity of Lazarus; infrastructure inactive but continues to appear in secondary references.
oiaglobal.comReferenced (no confirmed ownership)Possibly spoofed or third-party used for relayRequires further correlation to confirm association.

The persistence of hoonet.com credentials long after its documented role as a Chosun Expo front strongly supports the hypothesis of infrastructure recycling. Even if no active hosting remains, its digital footprint continues to appear in modern combo lists and leak aggregations, suggesting reuse by derivative operators or persistence within underground data ecosystems.

3. Network Infrastructure and IP Correlation

IP intelligence provided additional validation of legacy Lazarus connectivity, matching known North Korea–linked and Chinese backbone addresses attributed to Chosun Expo operations.

IP AddressOrigin / ASNCountryAttribution ContextNotes
2**.5*.**9.1*7China Unicom Industrial Internet BackboneCNRecurrent in Lazarus operational rangesStrong correlation with DPRK-linked network infrastructure.
2**.5*.**9.**8China Unicom Industrial Internet BackboneCNIdentified in 2022 breach and corroborated in StealthMole dataConfirmed Lazarus network artifact.
2**.*2.**9.**3China Unicom Industrial Internet BackboneCNMatches Chosun Expo operational IP blockDirect alignment with historic Lazarus indicators.
2**.*6.**0.1*0LG DACOM CorporationKRLikely external relay or test nodePossible intermediary node; requires further review.
4.**8.**1.*5Microsoft Corp. (Azure)USPossible transient proxy or decoyMay represent external hosting during transient operations.

Taken together, the credential leaks, domain persistence, and IP correlations form a multi-dimensional dataset pointing to long-term survivability and adaptation within the Lazarus infrastructure.

While no single artifact conclusively confirms present-day actor activity, the aggregate evidence suggests that portions of the group’s operational footprint have remained active, repurposed, or unintentionally preserved across dark-web ecosystems.

Assessment

The collected evidence reinforces long-standing attributions connecting Park Jin Hyok and the Lazarus Group (APT38) to the broader infrastructure of Chosun Expo Joint Venture and its related digital assets. By revalidating previously known identifiers through StealthMole’s datasets, this investigation demonstrates that many of the group’s legacy elements, once thought to be inactive, continue to appear within contemporary leak and infrastructure records.

The findings do not introduce a new actor attribution but rather solidify and modernize an existing one. Multiple indicators, including reused email aliases (pk*****0@hotmail.com, hy***_u@hotmail.com, ha*****e@hotmail.com) and persistent infrastructure markers present clear continuity with the digital footprint documented in the 2018 U.S. Department of Justice indictment and the 2022 BreachForums dataset released by AgainstTheWest.

However, while this overlap substantiates Lazarus’ enduring infrastructure presence, it does not confirm current operator activity. Some identifiers may persist through data recirculation, archival breaches, or community reuse rather than through direct operational maintenance by DPRK entities.

Overall, the evidence establishes a high-confidence linkage between historical Lazarus identifiers and present-day data exposures. The persistence of known emails, domain artifacts, and IP blocks within StealthMole’s 2023–2025 datasets confirms that parts of this infrastructure remain discoverable and, potentially, intermittently utilized.

Conclusion

This investigation reaffirms that the digital footprint of Park Jin Hyok and the Lazarus Group (APT38) continues to manifest across modern dark-web and credential datasets. By re-examining legacy indicators through StealthMole’s analytical environment, fragments once confined to historical reports were correlated with fresh exposures, uncovering a clear pattern of infrastructure persistence and identifier reuse spanning more than a decade.

The convergence of credential leaks, domain metadata, and network indicators demonstrates that elements of Lazarus’ infrastructure have not entirely disappeared from the digital landscape. Instead, they continue to resurface across successive breach compilations and leak forums, suggesting either ongoing reuse by Lazarus-linked operators or sustained circulation of their historical assets within the underground ecosystem.

While none of the evidence points to active campaigns directly attributable to Park Jin Hyok at present, the persistence of these artifacts highlights the enduring analytical relevance of legacy indicators. What were once static evidentiary fragments now serve as dynamic correlation anchors for identifying derivative or successor operations.

The Lazarus infrastructure, though fractured and partially dormant, remains traceable in pieces. Each fragment contributes to the broader understanding of how state-linked actors preserve, repurpose, and outlive their exposed assets in the evolving threat landscape.

Editorial Note

As with all dark-web investigations, attribution remains an evolving process rather than a definitive conclusion. While the evidence presented here draws strong technical and temporal links between historical Lazarus infrastructure and modern data exposures, such connections must be interpreted within the broader context of data reuse, false flagging, and leak recirculation common in the underground ecosystem.

This analysis reflects a moment in time, a reconstruction based on available datasets, corroborated evidence, and StealthMole’s intelligence capabilities. Future discoveries may either reinforce or refine these linkages as additional sources emerge. The objective of this report is not to claim final attribution, but to demonstrate how methodical data correlation and platform-driven verification can transform historical intelligence into actionable contemporary insight.

To access the unmasked report or full details, please reach out to us separately.

Contact us: support@stealthmole.com

Labels:

Learn more about StealthMole

Talk to our team of experts today to learn how you can manage your dark web exposure.
Request demo More Reports

Share this report