Executive Summary

In early 2024, researchers from CrowdStrike revealed that the long-active North Korean threat group known as Labyrinth Chollima has formally split into three specialized entities: Labyrinth Chollima (espionage), Golden Chollima, and Pressure Chollima (both focused on cryptocurrency theft). This change followed observed divergences in tactics, malware usage, and sector targeting, with Labyrinth Chollima shifting focus to manufacturing, logistics, aerospace, and defense, often leveraging social engineering and sharing infrastructure with its counterparts. Notably, Pressure Chollima was behind the record-breaking $1.46 billion cryptocurrency heist in 2023, illustrating the scale and sophistication of the new operational structure.

This realignment signals increasing specialization and growth within North Korea's cyber apparatus, enabling more targeted attacks and efficient monetization strategies. Organizations in critical industries and the crypto sector face heightened risks as these groups adapt rapidly and circumvent international sanctions by fueling cyber operations with illicit gains.

Why This Matters Now

The strategic split of North Korea's cyber units enables more sophisticated, scalable, and industry-specific attack campaigns, increasing threat levels for defense, logistics, manufacturing, and cryptocurrency sectors. With state-backed groups innovating and broadening their reach amid geopolitical tensions and sanctions, organizations must rapidly adapt their cyber defenses to counter evolving TTPs and prevent high-impact data loss or financial theft.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The split increases specialization among North Korean groups, raising the likelihood of targeted attacks on both critical industries and the cryptocurrency sector.

Cloud Native Security Fabric Mitigations and ControlsCNSF

This incident directly illustrates CNSF and Zero Trust relevance: segmentation, strong identity controls, workload isolation, and rigorous egress governance could have restricted attacker movement, limited privilege escalation, detected malicious C2, and disrupted data exfiltration. Coordinated enforcement at each stage reduces blast radius and constrains techniques commonly exploited in sophisticated cloud/hybrid attacks.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Detection and containment of unauthorized access attempts via external services.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Restricted privilege escalation paths and rapid alerting on unauthorized role assumptions.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Containment or blocking of unauthorized east-west traffic between cloud workloads.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Visibility into and alerting on suspicious outbound C2 activity across cloud platforms.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Egress filtering or blocking of unauthorized data transfers and unusual encrypted traffic.

Impact (Mitigations)

Effective controls at earlier stages could have limited the scope of loss and business impact.

Impact at a Glance

Affected Business Functions

  • Manufacturing
  • Logistics
  • Defense
  • Aerospace
  • Cryptocurrency
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

Potential exposure of sensitive business and customer data due to espionage activities.

Recommended Actions

  • Deploy zero trust segmentation and granular east-west controls to constrain lateral movement within cloud and hybrid environments.
  • Implement centralized multicloud visibility and anomaly detection to rapidly detect suspicious automation and outbound C2 activity.
  • Enforce strict egress filtering with FQDN and application-level controls, paired with encryption visibility, to block unauthorized data exfiltration.
  • Apply real-time, inline IPS and distributed inspection to reduce the effectiveness of exploitation attempts and malicious payload delivery.
  • Regularly audit IAM posture and network policies for privilege minimization, ensuring credentials and access are strictly aligned with least privilege.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image