Assessed Cyber Structure and Alignments of North Korea in 2023
Security Officer Comments:
Suggested Correction(s):
Link(s):
Cyber Security Threat Summary:
North Korea’s state-sponsored hackers, under the direction of its ruling regime, are constantly improving their tactics for conducting cyber operations. This information comes from a recent report by Google’s Mandiant threat intelligence team. The report reveals how the Pyongyang-based regime, despite its small population of 25 million, utilizes cyber intrusions for both espionage and financial crimes, thereby bolstering its power and financing its cyber and kinetic capabilities.
Supreme Leader Kim Jong-Un leads the Democratic People's Republic of Korea (DPRK), which operates multiple state-sponsored hacking teams domestically and internationally. These teams gather intelligence on allies, enemies, and defectors, in addition to hacking banks and stealing cryptocurrency. The stolen funds play a crucial role in funding the country's long-range missile and nuclear weapons programs while also enriching its rulers, according to the United Nations. Over the past five years, U.S. officials estimate that the DPRK has pilfered more than $3 billion. This underscores the DPRK's significant influence in the realm of cyber operations and cybercrime, despite its relatively small population.
The United States consistently identifies North Korea as one of its top four online nation-state adversaries, with China and Russia as the primary ones, followed by Iran and North Korea. Mandiant, a cybersecurity firm, reports that North Korea's organization of its cyber operations has adapted in response to the COVID-19 pandemic. This shift has made its operations more flexible, likely because individuals operating from China and South Korea were isolated during quarantine measures. As a result, DPRK operations now involve individuals and tools being assembled into temporary task forces, mirroring the approach of more sophisticated operations seen in China. North Korean hackers continue to employ innovative methods, including the use of Linux and macOS malware, along with supply chain attacks. In one notable incident, researchers traced an attack on the X_Trader trading software package created by Trading Technologies. This attack extended to multiple other targets, including the insertion of information stealers into software developed by 3CX, a desktop phone developer with multinational corporate clients.
Security Officer Comments:
Researchers at Mandiant track various North Korean cyber operations, some financially motivated, others focusing on cyberespionage. When motivation is unclear, they're codenamed UNC (uncategorized).
These groups often overlap, making tracking North Korea's cyber operations complex. They may engage in temporary tasking, gathering intelligence before moving on to new targets or types of operations.
Suggested Correction(s):
Link(s):
https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023
https://www.bankinfosecurity.com/researchers-north-korean-hackers-gain-speed-flexibility-a-23275