- DontGetGot.
- Posts
- "Leave The World Behind" - Cyberattack by Who
"Leave The World Behind" - Cyberattack by Who
Behind Netflix's newest film

Good Morning!
A new Netflix movie, "The World We Left Behind," has recently dropped on Netflix, and without any spoilers, the movie is essentially about a cyber attack on the U.S. by nation-state hackers.
As conventional conflicts take a back seat, the global stage is witnessing a new kind of power play, where the weapons are lines of code, and the battleground is the internet. These groups are not confined to dusty government offices or military bases; they extend their reach to dissidents, political opponents, nonprofits, and private companies.
In this newsletter, we'll shine a light on some of the most formidable players in this field, unraveling the strategies and specialties that make them the architects of modern warfare.
But first, lets check in with this weeks sponsor, Bay Area Times 👇
Now back to the worlds most threatening hacker groups….
Cozy Bear (APT29) & Fancy Bear (APT28) – Russia
Allegiance: Russia
Active since: 2008
Specialty: Phishing, Psychological Operations
Cozy Bear, the psyop specialists, have a penchant for dictating outcomes. From influencing the 2016 US elections to the recent SolarWinds hack, they’re masters of espionage. Their focus? Unraveling secrets, influencing decisions, and spreading misinformation.
On the flip side, meet Fancy Bear, Russia's phishing operation. Their expertise lies in the art of sophisticated phishing attacks. This is the group allegedly responsible for hacking Hillary Clintons emails.
Lazarus Group (APT38) – North Korea💰
Allegiance: North Korea
Active since: 2010
Specialty: Crypto Heists, Financial Espionage
Lazarus Group, North Korea's hacking arm, have a thing for crypto and cold hard cash. Remember WannaCry? That was just the tip of the iceberg. Their forte is infiltrating banks and orchestrating massive cryptocurrency heists.
Double Dragon (APT41) – China 🐉🛡️💸
Allegiance: China
Active since: 2012
Specialty: Intellectual Property Theft, Cyber Espionage, Financial Crime
Double Dragon, the dual-threat from China, doesn’t play by the rules. They’re into stealing intellectual property, and targeting government institutions. Using whatever data they can steal to mimic and reproduce in their own economy without spending the research and development dollars to produce it. Whether it's top-secret plans or a bank vault, they've got their eyes on it.
Helix Kitten (APT34) – Iran 🏛️🇮🇷
Allegiance: Iran
Active since: 2007
Specialty: Regional Espionage, Cybercrime
Their focus? Regional dominance. Targeting industries in the Middle East, they play a strategic game, hitting dams, parliaments, and more. Leaks may have hit them, but they’re back, leaving their mark on the cyber landscape in 2020. With a goal to display strength and amass global respect, APT34 will seize any opportunity it can reach.
So, there you have it – the masterminds behind the keyboards. From influencing elections to orchestrating bank heists, each group has its own specialty, contributing to the ever-evolving landscape of global cyber threats.
Cheers to staying informed !
Don't Get Got
P.S. Your experiences matter. If you've encountered a hack/scam or have insights to share, we invite you to connect with us. Let's build a community that stands against cyber threats.
Email us : [email protected]