2026 Futuriom 50: Highlights →Explore

Executive Summary

North Korea's cyber program between 2021 and 2026 is the most financially successful state-sponsored hacking operation in history — measured not by espionage impact but by actual currency stolen. DPRK threat actors stole an estimated $3–6 billion USD in cryptocurrency during this period, funding approximately 40–50% of North Korea's weapons of mass destruction program according to UN Panel of Experts assessments.This is not espionage. This is a nation-state-run criminal enterprise where hacking is the primary funding mechanism for a nuclear weapons program.

The strategic shift in 2021–2026 compared to prior years: DPRK moved from opportunistic exchange hacks to precision, multi-vector financial heists targeting the entire DeFi/crypto ecosystem — exchanges, custodians, blockchain bridges, and individual holders. Simultaneously, they expanded their insider threat program to place DPRK intelligence officers as fake remote IT workers inside Western technology companies, providing persistent, authorized access while generating legitimate salary payments (secondary funding channel).Three campaigns define the period:

  1. 3CX Supply Chain (2023)

  2. Bybit Heist (2025)

  3. FAMOUS CHOLLIMA IT Worker Program (2022–2026)

This article analyzes that progression and translates it into concrete detection and defensive strategy guidance.Detection & Strategy DisclaimerThe thresholds and detection logic in this document are illustrative, not prescriptive. Values such as replay windows, exfil size limits, burst timing, or file modification rates must be tuned to your environment. Network design, workforce geography, cloud setup, logging depth, and normal user behavior all affect what is "anomalous." There is no universal threshold — only environment-calibrated detection.


Strategic Context: Why It Matters to Defenders

DPRK's offensive cyber units operate under the Reconnaissance General Bureau (RGB), Bureau 121 (Lazarus/cyber offensive), and Unit 180 (financial cybercrime). Unlike other nation-state adversaries whose primary objective is intelligence collection, DPRK's cyber program exists primarily to generate revenue for the regime under crushing international sanctions. This means their targeting is fundamentally different: they go where the money is. Between 2021 and 2026, that meant cryptocurrency, DeFi protocols, blockchain bridges, and the supply chains of software vendors whose customers handle digital assets.

Strategic Shift

The period marks DPRK's transition from direct exploitation (stealing hot wallet keys, phishing exchange employees) to infrastructure-layer attacks (compromising the software and services that cryptocurrency organizations depend on). The 3CX campaign demonstrated second-order supply chain compromise capability. The Bybit heist demonstrated the ability to subvert multi-signature wallet infrastructure at the frontend layer — making the attack invisible to signers who believed they were approving legitimate transactions. Simultaneously, FAMOUS CHOLLIMA operationalized a parallel strategy: place intelligence officers inside target organizations as employees, bypassing all perimeter defenses.

Operational Implication for SOC & Threat Hunters

  • Financial sector and crypto organizations are primary targets, not secondary. DPRK does not treat financial theft as a side mission — it is the core mission. If your organization touches cryptocurrency, you are in their primary targeting set.

  • Supply chain trust is the primary attack surface. Signature-based trust (code signing, vendor reputation) is insufficient. Behavioral monitoring of trusted applications — does 3CX contact GitHub? It shouldn't — is the primary detection layer.

  • Insider threat is now a nation-state program. FAMOUS CHOLLIMA means DPRK may already have employees inside your organization with legitimate, authorized access. External intrusion detection is insufficient; behavioral analytics for insider threat must be part of the detection stack.

  • Multi-signature does not mean multi-secure. The Bybit heist proved that UI-layer attacks can subvert multi-sig approval flows. Hardware wallet verification of raw transaction data is the only reliable control.

  • Speed of response matters more than speed of detection for crypto theft. Once funds leave a wallet, the laundering pipeline executes within 24–48 hours. Blockchain analytics firms must be engaged within 1 hour of discovery.


Part I — Strategic Pattern (2021 → 2026)

DPRK's cyber operations between 2021 and 2026 are characterized by:

  • Revenue-driven targeting: Every major campaign served the primary objective of generating foreign currency for the regime — even espionage-focused units (Kimsuky) increasingly supported financial theft infrastructure

  • Supply chain as preferred initial access: Direct phishing and exploitation gave way to supply chain compromise (3CX, Trading Technologies) and frontend infrastructure attacks (Bybit/Safe{Wallet})

  • Insider placement at scale: FAMOUS CHOLLIMA operationalized human intelligence tradecraft (stolen identities, deepfakes) to place hundreds of IT workers inside Western companies

  • Cryptocurrency ecosystem expertise: DPRK operators demonstrated deep understanding of DeFi protocols, multi-sig wallet flows, blockchain bridge architecture, and cryptocurrency laundering techniques

What Changed in DPRK Cyber Operations (2021–2026)

1. From Direct Exchange Hacking to Infrastructure-Layer Attacks

In 2021–2022, DPRK primarily targeted cryptocurrency exchanges directly — phishing exchange employees, stealing hot wallet keys, exploiting exchange APIs. By 2023–2025, the approach shifted to attacking the infrastructure layer: compromising software vendors (3CX/Trading Technologies), subverting wallet management platforms (Safe{Wallet}), and targeting blockchain bridges (Ronin, Harmony, Radiant Capital). This shift yields higher-value targets — a single Bybit heist netted $1.46 billion — while making attribution and detection harder because the attack surface is one layer removed from the victim.

Defensive takeaway: Monitor the behavior of every third-party application and infrastructure service your organization depends on. Behavioral baselines for trusted software are now a primary detection layer — not signature verification alone.

2. Second-Order Supply Chain Compromise Demonstrated

The 3CX campaign was the first publicly documented case of a supply chain attack inside a supply chain attack: DPRK compromised Trading Technologies to compromise 3CX to reach 3CX's 600,000+ enterprise customers. This demonstrates that DPRK is willing to invest in long-duration, multi-hop attack chains where the initial compromise may occur years before the final payload delivery.

Defensive takeaway: Supply chain risk assessment must extend beyond direct vendors to their dependencies. Binary reproducibility, build environment isolation, and code signing ceremony separation are essential for any organization in the software supply chain.

3. Frontend/UI-Layer Attacks Bypass Cryptographic Controls

The Bybit heist exploited a fundamental gap: multi-signature wallets provide cryptographic security for transaction authorization, but the human approval step relies on a UI that can be manipulated. DPRK injected JavaScript into Safe{Wallet}'s web frontend to display a legitimate-looking transaction while submitting a drain transaction to the blockchain. All signatures were valid — collected from signers who believed they were approving a routine transfer.

Defensive takeaway: For high-value multi-sig operations, signers must verify raw transaction data on hardware wallet screens — not the UI overlay. Implement Subresource Integrity (SRI) for all JavaScript bundles and monitor CDN/hosting infrastructure access logs for unauthorized modifications.

4. Nation-State Insider Threat at Industrial Scale

FAMOUS CHOLLIMA is not a handful of rogue operatives — it is a structured, scaled program with facilitator networks, laptop farms, deepfake technology, and hundreds of active placements. The 2024–2026 period saw the introduction of real-time deepfake video for interviews, making detection during the hiring process significantly harder. Workers who are discovered increasingly resort to data extortion — threatening to release stolen source code or customer data.

Defensive takeaway: Identity verification for remote workers must go beyond standard background checks. Device forwarding detection (remote access software on corporate devices), time-of-day access anomalies, and IP geolocation correlation are essential behavioral indicators.

5. Cryptocurrency Laundering Infrastructure Is Pre-Built and Rapid

DPRK's post-theft laundering chain — DEX swaps, chain hopping to Monero, Bitcoin mixers, OTC broker networks — executes within 24–48 hours. They operate under full awareness that blockchain analytics firms begin tracking immediately. The laundering infrastructure is prepared before the theft, not after.

Defensive takeaway: Response speed is critical. Blockchain analytics firms must be engaged within 1 hour. Major exchanges must be contacted with stolen fund addresses for deposit freezing. Every hour of delay reduces recovery probability.

Current Target Prioritization

Priority Tier

Target Category

Rationale

Tier 1

Cryptocurrency exchanges, custodians, DeFi protocols

Direct financial theft — primary revenue source for DPRK; Bybit-scale heists yield 9-figure USD returns

Tier 1

Blockchain bridge and wallet infrastructure providers

Infrastructure-layer attacks enable theft from multiple downstream victims; Safe{Wallet} compromise pattern

Tier 1

Remote-first technology companies (especially US/EU)

FAMOUS CHOLLIMA placement targets; insider access for IP theft and persistent backdoor access

Tier 2

Software vendors with financial sector customer base

Supply chain targeting (3CX model) — compromising vendor to reach their customers

Tier 2

Defense contractors, aerospace, nuclear research

Lazarus Group and Velvet Chollima espionage targeting; strategic intelligence for DPRK military programs

Tier 3

South Korean government, US think tanks, Korean peninsula policy researchers

Kimsuky intelligence collection — diplomatic and military decision-making support

Tier 3

Banks and traditional financial institutions

Legacy targeting; less emphasis as crypto yields higher returns with fewer controls

Detection Posture Adjustment

The following priorities should be elevated for organizations in the DPRK threat landscape:

  • Application behavioral baselining — Monitor every trusted third-party application for network connections, DLL loads, and child process spawns that deviate from the application's known baseline. The 3CX detection opportunity was 3CXDesktopApp.exe connecting to GitHub — a connection the legitimate application never makes.

  • JavaScript/frontend integrity monitoring — Implement Subresource Integrity (SRI) with Content-Security-Policy headers for all web applications handling financial transactions. Monitor CDN and hosting infrastructure (S3 buckets, CloudFront distributions) for any file modification outside the deployment pipeline.

  • Remote access software detection on corporate devices — Block or alert on AnyDesk, RustDesk, TeamViewer, Chrome Remote Desktop, and Parsec on corporate endpoints. FAMOUS CHOLLIMA workers install these within days of device receipt.

  • Time-of-day and geolocation correlation for remote workers — Flag authentication events at hours inconsistent with stated timezone, especially during DPRK business hours (02:00–10:00 UTC). Correlate VPN/proxy usage with claimed home location.

  • npm/package manager execution monitoring — Any node.exe spawning a shell that makes outbound network connections is near-certain malicious. Monitor preinstall/postinstall script execution on developer workstations. Focus when the execution happens outside of approved corporate directories, or when the downloaded payload is executed from \AppData\Local\Temp\ (Windows) or /tmp/ (Linux/macOS).

  • Cryptocurrency wallet file access monitoring — Alert on any non-wallet-application process accessing MetaMask extension data, wallet.dat files, seed phrase files, or BIP39 mnemonic clipboard patterns.


Threat Actor Landscape

Why aliases matter: DPRK threat actor naming is among the most confusing in the industry. A single group may appear under 5–8 different names depending on the vendor report you are reading. The table below maps every major alias so blue teamers can cross-reference across CrowdStrike, Microsoft, Mandiant and government reporting. When this document references an actor, it uses the format PRIMARY NAME (alias, alias) on first mention to aid recognition.

CrowdStrike

Microsoft

Mandiant / Google

Government / CISA

Other Vendor Aliases

Primary Mission

Primary Targets

LAZARUS GROUP

Diamond Sleet

TEMP.Hermit

HIDDEN COBRA (FBI/CISA), APT38 (financial subgroup)

Zinc (Microsoft legacy), Labyrinth Chollima (CrowdStrike legacy), Guardians of Peace, Whois Hacking Team, Andariel (subgroup)

Financial theft, strategic espionage, destructive attacks

Banks, crypto exchanges, defense, aerospace, media

PRESSURE CHOLLIMA

Jade Sleet

UNC4899

TraderTraitor (FBI/CISA)

Slow Pisces (Palo Alto), CryptoCore (ClearSky)

Cryptocurrency theft, financial crime

DeFi protocols, crypto exchanges, blockchain bridges

STARDUST CHOLLIMA

Citrine Sleet

UNC4736 (3CX cluster)

AppleJeus (FBI/CISA campaign name)

Gleaming Pisces (Palo Alto), Labyrinth Chollima (overlap)

Cryptocurrency theft via supply chain and trojanized apps

Software vendors with financial sector exposure

FAMOUS CHOLLIMA

Storm-0530

UNC5267

DPRK IT Workers (FBI/CISA/DOJ)

Wagemole (SentinelOne), Nickle Tempest (Microsoft legacy)

IT worker infiltration and revenue generation

US/EU tech companies, especially remote-first firms

SILENT CHOLLIMA

Emerald Sleet

APT43

Kimsuky (FBI/CISA), ARCHIPELAGO (Google TAG)

Velvet Chollima (CrowdStrike overlap), Thallium (Microsoft legacy), Black Banshee (PwC), SharpTongue (Volexity), Springtail (Symantec)

Strategic intelligence collection

South Korea Gov, US policy, nuclear/missiles research

VELVET CHOLLIMA

Ruby Sleet

ScarCruft / APT37 (CISA)

Reaper (FireEye legacy), Group123 (Cisco Talos), Ricochet Chollima (CrowdStrike), InkySquid (Volexity)

Defense/aerospace espionage, surveillance

Defense contractors, think tanks, nuclear research, North Korean defectors

Attribution note: DPRK's offensive cyber units operate under the RGB (Reconnaissance General Bureau), with Bureau 121 handling cyber offensive operations (Lazarus/sub-groups) and Unit 180 focused on financial cybercrime. The operational boundaries are fluid — the same infrastructure and personnel appear across "espionage" and "financial crime" campaigns. Microsoft's threat actor naming uses the "Sleet" designator for all DPRK-attributed groups (replacing legacy "Tempest"/"Thallium" names in 2023). CrowdStrike uses the "CHOLLIMA" designator for all DPRK groups. Mandiant uses UNC (uncategorized) numbers for clusters not yet formally attributed to a named group.


Part II — Campaign Evolution Analysis (2021–2026)

2021–2022: Exchange and Crypto Exchange Direct Targeting

  • Characteristic: Spear-phishing to deliver maldocs; direct exploitation of crypto exchange APIs and hot wallets; Ronin bridge hack ($600M)

  • Tooling: Macro-enabled Office documents, custom RATs (BLINDINGCAN, COPPERHEDGE), direct API manipulation, AppleJeus cryptocurrency trading application trojans

  • Detection profile: MEDIUM — maldoc execution triggers EDR, hot wallet thefts often detectable in real-time via blockchain analytics

  • Defining campaigns: Ronin bridge hack (March 2022, $600M); Harmony Horizon bridge ($100M); multiple exchange compromises via AppleJeus

2022–2023: Supply Chain Entry and ISO/LNK Weaponization

  • Characteristic: Supply chain compromise (3CX, Trading Technologies), ISO/IMG delivery to bypass MOTW, GitHub-hosted C2

  • Tooling: Trojanized legitimate software installers, LNK-based loaders, GitHub icon files as C2 beacon, ICONIC_STEALER

  • Detection profile: LOW–MEDIUM — bypass of signature trust via legitimate signing; MOTW bypass via ISO

  • Defining campaign: 3CX — demonstrated second-order supply chain compromise capability; the first publicly documented supply chain attack inside a supply chain attack

2023–2024: Operation Dream Job Evolution and DeFi Protocol Targeting at Scale

  • Characteristic: Developer-targeting via trojanized npm packages and GitHub-hosted "coding challenges"; targeting blockchain bridge protocols; FAMOUS CHOLLIMA scaling with laptop farm networks

  • Tooling: npm typosquat packages with malicious preinstall scripts, Python/Node.js projects with compromised imports, smart contract exploitation, DeFi protocol logic abuse, front-end JS injection (precursor to Bybit)

  • Detection profile: LOW for developer-targeting (package execution appears legitimate); MEDIUM for DeFi attacks (blockchain analytics can trace)

  • Defining campaigns: Radiant Capital ($50M), PlayDapp ($290M), multiple bridge hacks; DOJ indictment of IT worker facilitator network (300+ placements)

2025–2026: Multi-Sig Infrastructure Attacks and Insider Program Maturation

  • Characteristic: Bybit-style front-end injection targeting multi-sig wallet approvers; FAMOUS CHOLLIMA IT worker program at scale with real-time deepfake video interviews; post-discovery extortion tactics

  • Tooling: JavaScript injection into wallet management platforms (Safe{Wallet} S3 bucket compromise), deepfake video generation, data extortion upon discovery

  • Detection profile: VERY LOW for multi-sig frontend attacks (UI injection invisible to standard security tools); MEDIUM for IT worker infiltration (behavioral indicators)

  • Defining campaigns: Bybit heist ($1.46B — largest single cryptocurrency theft in history); FAMOUS CHOLLIMA data extortion escalation pattern; FBI/IC3 advisory on DPRK social engineering targeting crypto industry


Part III — Full Kill Chain: Phase-by-Phase TTPs with Detection Logic

Phase 1 — Reconnaissance & Social Engineering Setup

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Recon

Establish Fake Professional Profiles

T1585.001

Operation Dream Job, FAMOUS CHOLLIMA

HR/Recruiting: Reverse image search all profile photos; verify SSN/identity through commercial background check AND manual government verification; check references independently via public sources (not candidate-provided); request biometrics-verified identity verification before device issuance

HR Identity Verification Systems / OSINT

Recon

Reconnaissance of Crypto Platform Architecture

T1591

Bybit heist — DPRK studied Safe{Wallet}'s architecture, identified CDN-hosted JavaScript as attack surface

Monitor for systematic API testing from new IP ranges (unusual API call patterns exploring all endpoints without legitimate workflow); review blockchain analytics for test transactions from known DPRK-linked addresses

WAF / API Gateway / Blockchain Analytics

Phase 2 — Initial Access

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Initial Access

Phishing via Social Media / Professional Networks

T1566.003

Operation Dream Job LinkedIn recruitment lures

Prevention: Security awareness training (unsolicited job offers delivering files = suspicious); endpoint control to prevent execution from Downloads folder; sandbox all email attachments AND external downloads before execution

EDR / Secure Web Gateway (SWG) / Sandbox / Email Security

Initial Access

Supply Chain Compromise — Software Vendor

T1195.002

3CX campaign — vendor build/distribution compromise

Sysmon Event ID 3: 3CXDesktopApp.exe connects to http://github.com or http://raw.githubusercontent.com (legitimate app does not contact GitHub); Sysmon Event ID 7: app loads DLL from own directory where DLL hash does not match known-good version

EDR / NDR / Proxy Logs / SIEM

Initial Access

Supply Chain Compromise — Vendor-Side Detection

T1195.002

3CX campaign — build environment compromise

Binary reproducibility checks (same source → different binaries = compromised build); code signing ceremony in isolated environment; monitor for unexpected processes in CI/CD

CI/CD Security Posture Management / FIM

Initial Access

Trojanized npm Package

T1195.002

Dream Job developer-targeting via npm typosquats

EDR + Package Manager Logs: npm install of package not in approved dependency list AND published <30 days ago AND <100 downloads AND contains preinstall/postinstall scripts

Software Composition Analysis (SCA) / EDR

Phase 3 — Execution & Persistence

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Execution

Malicious Script Execution via npm preinstall

T1059.007

DPRK npm-based initial access

Sysmon Event ID 1: ParentImage = node.exe OR npm.cmd AND child = cmd.exe/powershell.exe/sh AND CommandLine contains download patterns (curl, wget, Invoke-WebRequest). Node.js spawning a download tool is almost always malicious.

EDR / Command-Line Analytics

Persistence

Registry Run Key / Startup Folder

T1547.001

Lazarus Group standard Windows persistence

Sysmon Event ID 13: TargetObject contains HKCU or HKLM ...\CurrentVersion\Run AND value points to executable in AppData/Temp/Users\Public/ProgramData AND setting process is NOT a known installer

EDR / FIM / SIEM

Persistence

CI/CD Pipeline Persistence

T1072

3CX post-exploitation — CI/CD pipeline modification for persistent build-time injection

CI/CD audit logs: New workflow file created or modified by account that has not previously modified workflows; workflow references external actions not in approved list; build agent makes outbound connection to unapproved IP

CI/CD Security Tooling / Cloud SIEM

Phase 4 — Privilege Escalation & Defense Evasion

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Defense Evasion

MOTW Bypass via ISO Containers

T1553.005

Lazarus Group 2022–2023 ISO/IMG delivery

Sysmon Event ID 1: ParentImage = isoburn.exe OR Explorer.exe AND child = cmd.exe/powershell.exe/wscript.exe AND child executes from mounted ISO path (e.g., D:, E:). Any script execution from a mounted ISO path is high-confidence malicious.

EDR

Defense Evasion

DLL Sideloading — BLINDINGCAN / COPPERHEDGE

T1574.002

Lazarus Group standard DLL sideloading

Sysmon Event ID 7: Legitimate signed app loads DLL from same directory AND DLL is NOT signed by same publisher AND DLL was created within 7 days AND DLL exports unexpected functions

EDR (Behavioral Engine)

Phase 5 — Credential Access

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Credential Access

Browser Credential Theft — ICONIC_STEALER...

T1555.003

3CX post-exploitation targeting Chrome, Edge, Brave, Firefox credential stores

Sysmon Event ID 10: TargetImage = browser process AND SourceImage is NOT browser extension/antivirus AND GrantedAccess includes 0x10 (PROCESS_VM_READ). Sysmon Event ID 11: Access to browser Login Data files from non-browser process.

EDR

Credential Access

Cryptocurrency Wallet Seed Phrase Extraction

T1552

Lazarus Group crypto-focused credential access targeting MetaMask, hardware wallet backups, seed phrase files

Sysmon Event ID 11 (via SACL): Access to files named seed/mnemonic/wallet/recovery in MetaMask/Exodus/Electrum paths from non-wallet process. Clipboard monitoring: process reads BIP39 mnemonic pattern from clipboard.

EDR (File & Clipboard Monitoring) / DLP

Phase 6 — Lateral Movement: CI/CD Pipeline Targeting

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Lateral Movement

Compromise Build Server → Trojanize Software Output

T1195.002

Full 3CX attack chain — CI/CD pipeline as pivot to source code, signing certs, cloud creds, package registries, and customer distribution

Build system logs: build runner creates/modifies files outside expected workspace; build runner connects to unapproved IPs; pipeline modification not traceable to approved code review; signed binaries produced outside scheduled build windows; code signing tool invoked by unauthorized account

CI/CD Security Tooling / NDR / Code Repo Audit Logs

Phase 7 — Collection: Cryptocurrency Kill Chain

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Collection

Pre-Theft Reconnaissance

T1591

Multiple crypto heists — systematic study of target platform architecture

Monitor for systematic API testing from new IP ranges; review blockchain analytics for test transactions from DPRK-linked addresses to your platform

WAF / API Gateway / SIEM

Collection

JavaScript / Frontend Injection

T1195.003 (derived)

Bybit heist — Safe{Wallet} JavaScript modification

SRI for all JavaScript bundles via Content-Security-Policy with sha256 hashes; CDN/hosting access log review — any JS bundle modification outside deployment pipeline = alert; monitor S3/storage bucket access via CloudTrail

Cloud SIEM / WAF / CSP Monitoring

Collection

Transaction Manipulation / Wallet Drain

T1565.002

Bybit heist — multi-sig signers approved fraudulent transaction

ALL multi-sig signers MUST verify raw transaction data on hardware wallet screen, NOT UI overlay; for transactions >$1M: require independent verification from physically separate signer; blockchain analytics: flag transactions to addresses with no prior relationship

Hardware Wallets (Procedural Control) / Blockchain Analytics API

Collection

Post-Theft Laundering

T1020.001 (derived)

Multiple crypto heists — documented DPRK laundering tradecraft

Time-critical: submit to blockchain analytics firms within 1 hour; file FBI IC3/CISA reports; contact major exchanges with stolen fund addresses for deposit freeze; monitor blockchain for DEX swaps, chain bridges, mixer inputs

Blockchain Analytics / SOAR

Collection

GitHub-Hosted C2 (Icon Files)

T1105

ICONIC_STEALER (3CX) — GitHub repos with .ico files containing encrypted C2 payloads

Sysmon Event ID 3: 3CXDesktopApp.exe (or any business app) connects to http://raw.githubusercontent.com — legitimate communication apps do not contact GitHub

EDR / SWG / Proxy Logs

Phase 8 — Insider Threat: FAMOUS CHOLLIMA Detection

Phase

TTP

MITRE ID

Derived From

Detection / Controls

Tooling Category

Insider — Hiring

Deepfake Video Interview

FAMOUS CHOLLIMA 2024–2026 evolution

HR: Require candidate to perform unprompted physical movements (turn head, hold up specific object) to validate live video; E-Verify for all remote workers; SSN validation against IRS TIN matching; independently locate references via public sources

HR Identity Platforms / Fraud Detection Systems

Insider — Post-Hire

Device Session Forwarding

FAMOUS CHOLLIMA laptop farm operations

MDM/EDR: Corporate device has remote access app (AnyDesk, RustDesk, TeamViewer, Chrome Remote Desktop) AND device connects to corporate network from one IP geolocation AND those apps connect from a different geolocation = investigate

MDM / EDR / Network FW

Insider — Post-Hire

Off-Hours Access from Wrong Timezone

FAMOUS CHOLLIMA operators working DPRK business hours

Azure AD / VPN logs: Logins at hours inconsistent with stated location (e.g., 2–6am EST for US-claimed worker). Correlate with DPRK/China timezone business hours (02:00–10:00 UTC).

IAM / VPN Logs / UEBA

Insider — Post-Hire

Excessive Data Access Beyond Role

FAMOUS CHOLLIMA IP theft and backdoor operations

SIEM/DLP: Access to production source code, customer data, or cloud resources beyond role scope within first weeks; large file downloads; repository clones >1GB in single session

DLP / CASB / SIEM


Detection Engineering Master Matrix

Phase

TTP

MITRE ID

Log Source

Key Event ID / Indicator

Actor

Initial Access

Dream Job LinkedIn phishing

T1566.003

EDR / Sandbox

ISO/LNK execution from Downloads folder

LAZARUS / VELVET CHOLLIMA

Initial Access

Trojanized supply chain installer

T1195.002

Sysmon 7

3CX app loads oversized d3dcompiler_47.dll

STARDUST CHOLLIMA

Initial Access

npm typosquat package

T1195.002

Sysmon 1

node.exe spawns download via preinstall

LAZARUS

Execution

ISO/LNK MOTW bypass

T1553.005

Sysmon 1

Script/binary execution from mounted ISO path

LAZARUS

Execution

Malicious npm preinstall

T1059.007

Sysmon 1

node.exe spawns curl/PowerShell

LAZARUS

Persistence

Registry Run key

T1547.001

Sysmon 13

Run key value in user-writable path

All DPRK

Persistence

CI/CD pipeline modification

T1072

CI/CD audit logs

Workflow modification outside approved process

STARDUST CHOLLIMA

Defense Evasion

DLL sideloading

T1574.002

Sysmon 7

Legitimate app loads unsigned DLL from app dir

All DPRK

Credential Access

Browser credential theft

T1555.003

Sysmon 10

Non-browser process accesses browser Login Data

ICONIC_STEALER

Credential Access

Seed phrase extraction

T1552

EDR behavioral

Process reads files matching BIP39 pattern

PRESSURE CHOLLIMA

Lateral Movement

CI/CD pipeline as pivot

T1195.002

CI/CD + network

Build runner makes unexpected external connections

STARDUST CHOLLIMA

Collection

GitHub-hosted C2 (icon files)

T1105

Sysmon 3

3CX app connects to GitHub · Change is constant. GitHub keeps you ahead.

STARDUST CHOLLIMA

Collection

Wallet drain via JS injection

T1565.002

CDN audit logs

JavaScript bundle modification outside deploy pipeline

PRESSURE CHOLLIMA

Insider Threat

Device forwarding via RMM

MDM/EDR

Corporate device running remote access software

FAMOUS CHOLLIMA

Insider Threat

Off-hours access from wrong timezone

Azure AD / VPN logs

Authentication at hours inconsistent with stated location

FAMOUS CHOLLIMA

Exfiltration

Large data download from repo

T1030

Git/SIEM

1GB download from source code repo in single session

FAMOUS CHOLLIMA


Part IV — Threat Hunt Hypotheses

The following hunt hypotheses are designed to proactively identify DPRK-linked activity in your environment. Each hypothesis specifies the data sources required, the detection logic, and the alert threshold for escalation.These hunts complement EDR/ITDR alerting. Mature platforms may detect portions or most of this activity, but correlation, tuning, and escalation logic determine whether intrusion is caught pre-impact or post-compromise

Hunt 1: 3CX-Style Supply Chain C2 — Application Contacting Unexpected Infrastructure

Hypothesis: A trojanized legitimate application (e.g., 3CX, VoIP client, business communications software) is making network connections that the clean version of that application would never make — specifically to GitHub raw content or bare IP addresses.

Note: This detection requires application behavioral baselines — you must know what network connections each trusted application normally makes. Without baselines, this hunt produces excessive false positives.

Core Detection Logic:

  • Identify network connections initiated by known communication/business applications (3CXDesktopApp.exe, Teams.exe, Zoom.exe, Slack.exe, or equivalent)

  • Flag connections where the destination is: raw.githubusercontent.com or objects.githubusercontent.com (ICONIC_STEALER C2 via GitHub icon files); a bare IP address (no resolved hostname) on port 443; any domain outside the application vendor's documented infrastructure

  • Cross-check: is the flagged connection to a domain the application has NEVER contacted in your baseline? First-ever connection to an unusual domain from a trusted app = strong indicator

  • Validation: Pull destination URL from proxy logs — if the response is a valid .ico file with extra data appended after the image boundary (file size > expected ICO dimensions), it confirms ICONIC_STEALER infrastructure

Alert Threshold: Any connection from a business communications application to GitHub raw content = immediate high-severity alert. ICONIC_STEALER's entire C2 model depends on this path.


Hunt 2: FAMOUS CHOLLIMA — Device Forwarding Detection

Hypothesis: A FAMOUS CHOLLIMA IT worker has installed remote access software on their corporate device to forward the session to a DPRK operator, who is performing the actual work from a foreign location.

Core Detection Logic:

  • Identify corporate devices where any of the following processes are actively running: AnyDesk.exe, RustDesk.exe, TeamViewer.exe, remoting_host.exe (Chrome Remote Desktop), Parsec.exe, LogMeIn.exe

  • Correlate: on the same device, is there network traffic originating from or attributed to a foreign country (particularly East Asia IP ranges)? Corporate device connects to corporate network from a US IP (the forwarding laptop) but application traffic routes through a secondary connection to APAC IP ranges

  • Flag: any corporate device that installed remote access software within the first 7 days of employment — FAMOUS CHOLLIMA workers frequently set up forwarding immediately upon receiving the device

  • Time-of-day anomaly: device is actively in use at hours corresponding to DPRK business hours (02:00–10:00 UTC) while the employee claims to be US-based

Alert Threshold: Any corporate device running remote access software AND having APAC-origin network sessions = investigate immediately. Device forwarding has near-zero legitimate use on non-IT-support roles.


Hunt 3: Cryptocurrency Seed Phrase / Wallet Access Targeting

Hypothesis: A PRESSURE CHOLLIMA operator on a compromised endpoint is systematically searching for cryptocurrency wallet files, seed phrases, and private key material.

Core Detection Logic:

  • File path-based detection: Monitor access events on paths associated with cryptocurrency wallets — %APPDATA%\MetaMask\, %APPDATA%\Exodus\, %APPDATA%\Electrum\wallets\, .bitcoin\wallet.dat, any file containing wallet/seed/mnemonic/keystore/recovery in filename accessed by non-wallet process

  • Keyword search pattern detection: A process (cmd, PowerShell, or unknown binary) traversing user directories looking for wallet-related filename patterns within a short time window — PRESSURE CHOLLIMA operators run automated wallet harvesting scripts

  • Clipboard monitoring: Any process reading clipboard content matching BIP39 mnemonic pattern (12 or 24 dictionary words separated by spaces) from a non-wallet-application

Alert Threshold: Any non-wallet-application process accessing wallet database files = high severity. Clipboard pattern match to BIP39 wordlist by non-wallet process = high severity.


Hunt 4: npm Package Execution with Unexpected Network Activity

Hypothesis: A developer workstation installed a DPRK-trojanized npm package containing a malicious preinstall or post-install script that spawned a shell and made outbound network connections to download a second-stage payload.

Core Detection Logic:

  • Identify process chains where node.exe spawns a shell interpreter (cmd.exe, powershell.exe, sh, bash) OR a download utility (curl.exe, wget.exe, certutil.exe)

  • Narrow to cases where the node.exe parent's command-line includes npm, node_modules, or npx — confirming spawn originated from a package script (preinstall/postinstall hooks)

  • For any npm-triggered shell spawn that makes an outbound network connection: flag unconditionally. Legitimate package install scripts do not download external executables.

  • Secondary signal: node.exe making outbound HTTPS connections to IPs/domains with no prior history for that endpoint

Alert Threshold: Any node.exe → shell → network download chain = CRITICAL. This pattern has no legitimate use in standard npm package installation.


Hunt 5: CI/CD Pipeline Unauthorized Modification

Hypothesis: DPRK has compromised a developer or service account and is modifying pipeline configuration to inject malicious build steps — repeating the SUNSPOT/3CX supply chain injection model against your build environment.

Core Detection Logic:

  • GitHub/GitLab/Bitbucket pipeline audit events: new CI/CD secrets created or modified; new workflow/pipeline file created (.github/workflows/*.yml); existing workflow modified to add new steps/external action references/network destinations; branch protection rules weakened; new org member added or member granted elevated permissions

  • Behavioral anomalies: any of the above events performed by an account that has not previously performed that action type, authenticated from a new IP/country, was created within 30 days, or made changes outside business hours for account's registered timezone

  • Build artifact integrity: signed binary hash does not match expected reproducible build output

Alert Threshold: Workflow modification from a first-time actor = HIGH. New secret addition from foreign IP = CRITICAL. Pipeline step that adds a network download to an unknown endpoint = CRITICAL.


Hunt 6: ICONIC_STEALER / GitHub Icon File C2 Beacon

Hypothesis: An endpoint infected via 3CX-style supply chain attack is beaconing to DPRK C2 infrastructure by downloading apparently-valid icon files from GitHub repositories, with commands encoded after the legitimate image data.

Core Detection Logic:

  • Identify HTTP GET requests to ‘http://raw.githubusercontent.com' or 'objects.githubusercontent.com’ where requested path ends in .ico

  • Correlate: is the requesting process a known business application with no documented reason to retrieve icon files from GitHub?

  • Enrich: does the GitHub repository correspond to a legitimate open-source project? ICONIC_STEALER used newly-created or obscure repos with no stars/forks hosting only icon files

  • Size anomaly: .ico file larger than expected size for declared dimensions suggests appended payload data

  • Frequency: ICONIC_STEALER polls periodically — regular interval requests to the same GitHub path

Alert Threshold: Business application + GitHub raw .ico download = immediate investigation. Any non-browser/non-developer process downloading from GitHub raw = investigate.


Part V — Leadership Briefing: Strategic Threat Posture

The Strategic Reality

DPRK's cyber program serves one primary function: generating foreign currency to fund the weapons program in the face of international sanctions. This is not espionage infrastructure — it is the financial backbone of North Korea's nuclear deterrent. The actors are highly motivated (failure means severe consequences in DPRK), technically skilled (many trained at elite DPRK computer science programs), and operationally patient.The key leadership insight: DPRK's threat to financial and technology organizations is not theoretical — it is active, aggressive, and measurably successful. They have demonstrated they can steal $1.46 billion in a single operation.

Three Things Leadership Must Understand

1. If you operate in the crypto space, you are a primary DPRK target.DPRK does not focus on traditional espionage against most organizations. If your organization touches cryptocurrency — exchange, custodian, DeFi protocol, blockchain infrastructure, crypto-adjacent fintech — you are in their primary targeting set. The Bybit heist demonstrated that even technically sophisticated organizations with multi-sig controls are vulnerable when the attack targets the web frontend, not the keys themselves.Investment priority: Subresource Integrity (SRI) for all JavaScript, strict Content Security Policy, CDN/hosting audit logging, and independent transaction verification procedures for all high-value multi-sig operations.

2. Your software supply chain is an attack surface you don't control.3CX was a trusted enterprise communications provider. Trading Technologies was a trusted financial software vendor. Neither was a security-naive organization. DPRK compromised them to reach their customers.Every piece of third-party software in your environment is a potential delivery mechanism. You cannot audit all of them — but you can monitor their behavior. Behavioral anomaly detection on known-trusted applications (does 3CX contact GitHub? It shouldn't.) catches supply chain attacks that signature-based security cannot.Investment priority: Application behavior baselining and network egress monitoring by application, not just by host.

3. DPRK may already have an employee inside your organization.FAMOUS CHOLLIMA is a documented, active, large-scale insider placement program. If your organization hires remote IT workers, software developers, or cloud engineers — especially for roles allowing access to source code, production infrastructure, or customer data — you have attack surface for FAMOUS CHOLLIMA.The FBI and DOJ have confirmed that hundreds of workers were placed successfully. Most were detected because they tried to extort their employer upon being identified (a known FAMOUS CHOLLIMA escalation pattern) — not because of proactive detection.Investment priority: Enhanced identity verification for remote workers, device forwarding detection, behavioral analytics for unusual access patterns.

Risk Prioritization by Actor

Actor

Likelihood

Impact

Your Asset at Risk

PRESSURE CHOLLIMA / Jade Sleet

CRITICAL (if crypto/fintech)

CRITICAL

Cryptocurrency holdings, smart contract funds

STARDUST CHOLLIMA / Citrine Sleet

MEDIUM (software vendors)

HIGH

Build pipeline, customer trust, distribution channels

FAMOUS CHOLLIMA / Storm-0530

MEDIUM (tech/remote-first companies)

HIGH

Source code, intellectual property, persistent access

LAZARUS GROUP / Diamond Sleet

HIGH (defense, crypto, finance)

HIGH

IP, credentials, cryptocurrency assets

Kimsuky / Emerald Sleet

LOW (unless Korea policy/defense)

MEDIUM

Research data, government policy documents

This document reflects threat intelligence through March 2026. DPRK's cryptocurrency theft operations are among the most rapidly evolving in the threat landscape — as DeFi protocols add security controls, DPRK adapts to target adjacent infrastructure. Detection strategies should be reviewed monthly for cryptocurrency-exposed organizations.


Master References Index

Annual Threat Intelligence Reports

Report

Year

CrowdStrike Global Threat Report

2022 - 2025

CrowdStrike Threat Hunting Report

2021 - 2025

Mandiant M-Trends Report

2021 - 2025

Microsoft Digital Defense Report

2021 - 2025

Chainalysis & TRM Labs Crypto Crime Reports

2025 - 2026

IBM X-Force Threat Intelligence Index

2022 - 2026

CheckPoint Cybersecurity Report

2022 - 2026

ODNI Annual Threat Assessment

2022 - 2025

FBI Internet Crime Report

2021 - 2024

Additional Vendor Reports

Report

Year

PaloAlto Global Incident Response Report 2026

2026

Red Canary Threat Detection Report 2025

2025

Sophos Threat Report 2025

2025

Trellix Advanced Threat Research Report 2024

2024

Government & Regulatory Advisories

Identifier

Title

Publisher

Year

AA22-108A

TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies

CISA / FBI / Treasury

2022

AA21-048A

AppleJeus: Analysis of North Korea's Cryptocurrency Malware

CISA / FBI / Treasury

2021

Alert

Supply Chain Attack Against 3CXDesktopApp

CISA

2023

PSA240903

North Korea Aggressively Targeting Crypto Industry with Well-Disguised Social Engineering Attacks

FBI IC3

2024

PSA250123

North Korean IT Workers Conducting Data Extortion

FBI IC3

2025

Press Release

Two North Korean Nationals and Three Facilitators Indicted for Fraudulent Remote IT Worker Scheme

DOJ

2024

Coordinated Actions

Justice Department Announces Coordinated Nationwide Actions to Combat North Korean Remote IT Worker Fraud

DOJ

2024

OFAC SDN

Lazarus Group Designation — Specially Designated Nationals List

Treasury / OFAC

2019 (updated)

Virtual Currency Mixer Sanctions

Treasury Sanctions Virtual Currency Mixer Used by DPRK

Treasury / OFAC

2022

DPRK Threat Overview

North Korea Cyber Threat Overview

CISA

Ongoing

UN Panel Report S/2024/215

Panel of Experts Final Report — DPRK Sanctions

UN Security Council

2024

MSMT Reports

Multilateral Sanctions Monitoring Team — DPRK Cyber and IT Worker Activities

MSMT (11-nation coalition)

2025

Campaign-Specific Vendor Reporting (2021–2026)

Campaign / Actor

Report Title

Publisher

Year

3CX Supply Chain

3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise

Mandiant / Google Cloud

2023

3CX / ICONIC_STEALER

SmoothOperator: Ongoing Campaign Trojanizes 3CX Software in Software Supply Chain Attack

SentinelOne

2023

Bybit Heist

Collaboration in the Wake of Record-Breaking Bybit Theft

Chainalysis

2025

DPRK Crypto Laundering

North Korea and the Industrialization of Cryptocurrency Theft

TRM Labs

2024

Lazarus / DeathNote

Following the Lazarus Group by Tracking DeathNote Campaign

Kaspersky (Securelist)

2023

Operation Dream Job

Gotta Fly: Lazarus Targets the UAV Sector

ESET (WeLiveSecurity)

2025

Diamond Sleet / Supply Chain

Diamond Sleet Supply Chain Compromise Distributes a Modified CyberLink Installer

Microsoft Threat Intelligence

2023

Emerald Sleet / Jade Sleet

East Asia Threat Actors: Same Targets, New Playbooks

Microsoft Security Insider

2024

Kimsuky / Security Researchers

Active North Korean Campaign Targeting Security Researchers

Google Threat Analysis Group

2023

DPRK Social Engineering

Joint CSA: DPRK Social Engineering

NSA / FBI / State Department

2023

MITRE ATT&CK Group Profiles

Add a comment

Deepak Mangipudi
Deepak Mangipudi

Staff Engineer - Detection and Response, Aviatrix

Deepak is a Staff Engineer, Detection & Response at Aviatrix, specializing in detection engineering and adversary behavior analysis. He collaborates with cross-functional teams to identify emerging threats, design high-signal detections, and strengthen response capabilities across complex cloud and hybrid infrastructures.

Read Full Bio
PODCAST

Altitude

Secure The Connections Between Your Clouds and Cloud Workloads

Leverage a security fabric to meet compliance and reduce cost, risk, and complexity.

Cta pattren Image