lazarusholic

Everyday is lazarus.dayβ

Profiling An Enigma: The Mystery Of North Korea's Cyber Threat Landscape

2014-08-27, HP
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.16.North_Korea_cyber_threat_landscape/HPSR%20SecurityBriefing_Episode16_NorthKorea.pdf
HPSR20SecurityBriefing_Episode16_NorthKorea.pdf, 3.5 MB

Contents

Companion report

HP Security Briefing
Episode 16, August 2014
Profiling an enigma: The
mystery of North Korea’s cyber
threat landscape
HP Security Research

Table of Contents
Introduction .................................................................................................................................................... 3
Research roadblocks ...................................................................................................................................... 4
Ideological and political context .................................................................................................................... 5
Juche and Songun...................................................................................................................................... 5
Tension and change on the Korean Peninsula .......................................................................................... 8
North Korean cyber capabilities and limitations ......................................................................................... 10
North Korean infrastructure.................................................................................................................... 10
An analysis of developments in North Korean cyberspace since 2010 .................................................. 14
North Korean cyber war and intelligence structure ................................................................................ 21
North Korean cyber and intelligence organizational chart ..................................................................... 26
North Korea’s cyber doctrine, strategies and goals ............................................................................... 26
Cyber warfare operations ........................................................................................................................ 27
Gaming for profit and pwnage ................................................................................................................ 29
Intelligence and counterintelligence ...................................................................................................... 29
Psychological operations ........................................................................................................................ 32
Electronic warfare ................................................................................................................................... 38
Training cyber warriors ........................................................................................................................... 39
Important political and military ties ............................................................................................................ 42
China ........................................................................................................................................................ 42
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such …