A Study of North Korea’s Cyber Warfare: Actors, Tactics, and AI Integration

Abstract:

North Korea’s cyber threat operations have emerged as one of the most advanced and aggressive in the world. Over the past decade, the country has built a sophisticated cyber warfare capability, primarily aimed at financial gain, intelligence gathering, and disrupting adversaries. North Korea’s cyber activities are largely driven by its isolation from the global economy and its need to fund its regime amid international sanctions. These operations are conducted by highly skilled state-sponsored groups, most notably the Lazarus Group and APT38, both believed to be controlled by North Korea’s Reconnaissance General Bureau (RGB), the country’s primary intelligence agency. The Lazarus Group has been an umbrella term for various North Korean Threat actors. APT38 is a subset of the Lazarus Group, primarily focused on financially motivated cyber operations, especially targeting financial institutions. APT38 has been linked to bank heists and cryptocurrency theft, targeting institutions in more than 30 countries. The group’s operations have netted billions of dollars in stolen funds. North Korean cyber operatives have been linked to intrusions into U.S. defense contractors and other critical agencies, stealing sensitive military and strategic information. The current study provides a detailed analysis of the past cyber operations of North Korea, along with the tactics and techniques used. Commonalities are examined and projections regarding future operations are outlined.


AUTHORS

Photo of Dr. Chuck Easttom

Vanderbilt University and Georgetown University
Knoxville, Tennessee and Washington D.C., United States of America

Dr. Chuck Easttom is the author of 40 books, including several on computer security, forensics, and cryptography. His books are used at over 60 universities. He has also authored scientific papers (over 70 so far) on digital forensics, machine learning/AI, cyber warfare, cryptography, bioengineering, and applied mathematics. He is an inventor with 26 computer science patents. He holds a Doctor of Science (D.Sc.) in cyber security (dissertation topic: “A Comparative Study of Lattice Based Algorithms for Post Quantum Computing”) and a Ph.D. in Technology focused on nanotechnology (dissertation topic: “The Effects of Complexity on Carbon Nanotube Failures”), and a Ph.D. in computer science with emphasis on applied mathematics (dissertation topic: “A Systematic Framework for Network Forensics Using Graph Theory”), as well as four master’s degrees (one in applied computer science, one in education, one in strategic and defense studies, and one in systems engineering). He is a Senior Member of the IEEE and a Senior Member of the ACM as well. He is also a Distinguished Speaker of the ACM (Association of Computing Machinery). and a Distinguished Visitor of the IEEE Computer Society. Dr. Easttom is an adjunct professor for both Vanderbilt University and Georgetown University.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com