Threat profile - North Korea
Contents
Threat profileNorth Korea
Characterizing for North Korea in cyberspace, is that it showcases how possessing offensive cyber capabilities can be a very attractive way of countering conventional military strength, whilst keeping costs and risks relatively low. What is certainly unique to North Korea, is that it actively uses its cyber capabilities to steal money to fund its nuclear and ballistic missile programs.
- Strategic motives: Espionage, information theft, disruption, financial gain
- Strategic goals: Ensuring the continuity of the regime; becoming completely self-reliant
- Cyber capabilities: ★★★☆☆
- Number of known cyber operations: ★★☆☆☆
- Number of APTs: 11
Cyber capabilities
Highly advanced, mature and integrated in intelligence services
Offensive cyber capabilities are of primary importance to North Korea in modern conflict, as cyber operations enable North Korea to counter conventional military strength.[1] Moreover, cyber operations are relatively low-cost and low-risk in comparison to conventional military operations, because attribution is extremely difficult in cyberspace. Specifically, cyber operations enable North …
Characterizing for North Korea in cyberspace, is that it showcases how possessing offensive cyber capabilities can be a very attractive way of countering conventional military strength, whilst keeping costs and risks relatively low. What is certainly unique to North Korea, is that it actively uses its cyber capabilities to steal money to fund its nuclear and ballistic missile programs.
- Strategic motives: Espionage, information theft, disruption, financial gain
- Strategic goals: Ensuring the continuity of the regime; becoming completely self-reliant
- Cyber capabilities: ★★★☆☆
- Number of known cyber operations: ★★☆☆☆
- Number of APTs: 11
Cyber capabilities
Highly advanced, mature and integrated in intelligence services
Offensive cyber capabilities are of primary importance to North Korea in modern conflict, as cyber operations enable North Korea to counter conventional military strength.[1] Moreover, cyber operations are relatively low-cost and low-risk in comparison to conventional military operations, because attribution is extremely difficult in cyberspace. Specifically, cyber operations enable North …