Executive Summary
North Korea's cyber program between 2021 and 2026 is the most financially successful state-sponsored hacking operation in history — measured not by espionage impact but by actual currency stolen. DPRK threat actors stole an estimated $3–6 billion USD in cryptocurrency during this period, funding approximately 40–50% of North Korea's weapons of mass destruction program according to UN Panel of Experts assessments.This is not espionage. This is a nation-state-run criminal enterprise where hacking is the primary funding mechanism for a nuclear weapons program.
The strategic shift in 2021–2026 compared to prior years: DPRK moved from opportunistic exchange hacks to precision, multi-vector financial heists targeting the entire DeFi/crypto ecosystem — exchanges, custodians, blockchain bridges, and individual holders. Simultaneously, they expanded their insider threat program to place DPRK intelligence officers as fake remote IT workers inside Western technology companies, providing persistent, authorized access while generating legitimate salary payments (secondary funding channel).Three campaigns define the period:
3CX Supply Chain (2023)
Bybit Heist (2025)
FAMOUS CHOLLIMA IT Worker Program (2022–2026)
This article analyzes that progression and translates it into concrete detection and defensive strategy guidance.Detection & Strategy DisclaimerThe thresholds and detection logic in this document are illustrative, not prescriptive. Values such as replay windows, exfil size limits, burst timing, or file modification rates must be tuned to your environment. Network design, workforce geography, cloud setup, logging depth, and normal user behavior all affect what is "anomalous." There is no universal threshold — only environment-calibrated detection.
Strategic Context: Why It Matters to Defenders
DPRK's offensive cyber units operate under the Reconnaissance General Bureau (RGB), Bureau 121 (Lazarus/cyber offensive), and Unit 180 (financial cybercrime). Unlike other nation-state adversaries whose primary objective is intelligence collection, DPRK's cyber program exists primarily to generate revenue for the regime under crushing international sanctions. This means their targeting is fundamentally different: they go where the money is. Between 2021 and 2026, that meant cryptocurrency, DeFi protocols, blockchain bridges, and the supply chains of software vendors whose customers handle digital assets.
Strategic Shift
The period marks DPRK's transition from direct exploitation (stealing hot wallet keys, phishing exchange employees) to infrastructure-layer attacks (compromising the software and services that cryptocurrency organizations depend on). The 3CX campaign demonstrated second-order supply chain compromise capability. The Bybit heist demonstrated the ability to subvert multi-signature wallet infrastructure at the frontend layer — making the attack invisible to signers who believed they were approving legitimate transactions. Simultaneously, FAMOUS CHOLLIMA operationalized a parallel strategy: place intelligence officers inside target organizations as employees, bypassing all perimeter defenses.
Operational Implication for SOC & Threat Hunters
Financial sector and crypto organizations are primary targets, not secondary. DPRK does not treat financial theft as a side mission — it is the core mission. If your organization touches cryptocurrency, you are in their primary targeting set.
Supply chain trust is the primary attack surface. Signature-based trust (code signing, vendor reputation) is insufficient. Behavioral monitoring of trusted applications — does 3CX contact GitHub? It shouldn't — is the primary detection layer.
Insider threat is now a nation-state program. FAMOUS CHOLLIMA means DPRK may already have employees inside your organization with legitimate, authorized access. External intrusion detection is insufficient; behavioral analytics for insider threat must be part of the detection stack.
Multi-signature does not mean multi-secure. The Bybit heist proved that UI-layer attacks can subvert multi-sig approval flows. Hardware wallet verification of raw transaction data is the only reliable control.
Speed of response matters more than speed of detection for crypto theft. Once funds leave a wallet, the laundering pipeline executes within 24–48 hours. Blockchain analytics firms must be engaged within 1 hour of discovery.
Part I — Strategic Pattern (2021 → 2026)
DPRK's cyber operations between 2021 and 2026 are characterized by:
Revenue-driven targeting: Every major campaign served the primary objective of generating foreign currency for the regime — even espionage-focused units (Kimsuky) increasingly supported financial theft infrastructure
Supply chain as preferred initial access: Direct phishing and exploitation gave way to supply chain compromise (3CX, Trading Technologies) and frontend infrastructure attacks (Bybit/Safe{Wallet})
Insider placement at scale: FAMOUS CHOLLIMA operationalized human intelligence tradecraft (stolen identities, deepfakes) to place hundreds of IT workers inside Western companies
Cryptocurrency ecosystem expertise: DPRK operators demonstrated deep understanding of DeFi protocols, multi-sig wallet flows, blockchain bridge architecture, and cryptocurrency laundering techniques
What Changed in DPRK Cyber Operations (2021–2026)
1. From Direct Exchange Hacking to Infrastructure-Layer Attacks
In 2021–2022, DPRK primarily targeted cryptocurrency exchanges directly — phishing exchange employees, stealing hot wallet keys, exploiting exchange APIs. By 2023–2025, the approach shifted to attacking the infrastructure layer: compromising software vendors (3CX/Trading Technologies), subverting wallet management platforms (Safe{Wallet}), and targeting blockchain bridges (Ronin, Harmony, Radiant Capital). This shift yields higher-value targets — a single Bybit heist netted $1.46 billion — while making attribution and detection harder because the attack surface is one layer removed from the victim.
Defensive takeaway: Monitor the behavior of every third-party application and infrastructure service your organization depends on. Behavioral baselines for trusted software are now a primary detection layer — not signature verification alone.
2. Second-Order Supply Chain Compromise Demonstrated
The 3CX campaign was the first publicly documented case of a supply chain attack inside a supply chain attack: DPRK compromised Trading Technologies to compromise 3CX to reach 3CX's 600,000+ enterprise customers. This demonstrates that DPRK is willing to invest in long-duration, multi-hop attack chains where the initial compromise may occur years before the final payload delivery.
Defensive takeaway: Supply chain risk assessment must extend beyond direct vendors to their dependencies. Binary reproducibility, build environment isolation, and code signing ceremony separation are essential for any organization in the software supply chain.
3. Frontend/UI-Layer Attacks Bypass Cryptographic Controls
The Bybit heist exploited a fundamental gap: multi-signature wallets provide cryptographic security for transaction authorization, but the human approval step relies on a UI that can be manipulated. DPRK injected JavaScript into Safe{Wallet}'s web frontend to display a legitimate-looking transaction while submitting a drain transaction to the blockchain. All signatures were valid — collected from signers who believed they were approving a routine transfer.
Defensive takeaway: For high-value multi-sig operations, signers must verify raw transaction data on hardware wallet screens — not the UI overlay. Implement Subresource Integrity (SRI) for all JavaScript bundles and monitor CDN/hosting infrastructure access logs for unauthorized modifications.
4. Nation-State Insider Threat at Industrial Scale
FAMOUS CHOLLIMA is not a handful of rogue operatives — it is a structured, scaled program with facilitator networks, laptop farms, deepfake technology, and hundreds of active placements. The 2024–2026 period saw the introduction of real-time deepfake video for interviews, making detection during the hiring process significantly harder. Workers who are discovered increasingly resort to data extortion — threatening to release stolen source code or customer data.
Defensive takeaway: Identity verification for remote workers must go beyond standard background checks. Device forwarding detection (remote access software on corporate devices), time-of-day access anomalies, and IP geolocation correlation are essential behavioral indicators.
5. Cryptocurrency Laundering Infrastructure Is Pre-Built and Rapid
DPRK's post-theft laundering chain — DEX swaps, chain hopping to Monero, Bitcoin mixers, OTC broker networks — executes within 24–48 hours. They operate under full awareness that blockchain analytics firms begin tracking immediately. The laundering infrastructure is prepared before the theft, not after.
Defensive takeaway: Response speed is critical. Blockchain analytics firms must be engaged within 1 hour. Major exchanges must be contacted with stolen fund addresses for deposit freezing. Every hour of delay reduces recovery probability.
Current Target Prioritization
Priority Tier | Target Category | Rationale |
Tier 1 | Cryptocurrency exchanges, custodians, DeFi protocols | Direct financial theft — primary revenue source for DPRK; Bybit-scale heists yield 9-figure USD returns |
Tier 1 | Blockchain bridge and wallet infrastructure providers | Infrastructure-layer attacks enable theft from multiple downstream victims; Safe{Wallet} compromise pattern |
Tier 1 | Remote-first technology companies (especially US/EU) | FAMOUS CHOLLIMA placement targets; insider access for IP theft and persistent backdoor access |
Tier 2 | Software vendors with financial sector customer base | Supply chain targeting (3CX model) — compromising vendor to reach their customers |
Tier 2 | Defense contractors, aerospace, nuclear research | Lazarus Group and Velvet Chollima espionage targeting; strategic intelligence for DPRK military programs |
Tier 3 | South Korean government, US think tanks, Korean peninsula policy researchers | Kimsuky intelligence collection — diplomatic and military decision-making support |
Tier 3 | Banks and traditional financial institutions | Legacy targeting; less emphasis as crypto yields higher returns with fewer controls |
Detection Posture Adjustment
The following priorities should be elevated for organizations in the DPRK threat landscape:
Application behavioral baselining — Monitor every trusted third-party application for network connections, DLL loads, and child process spawns that deviate from the application's known baseline. The 3CX detection opportunity was 3CXDesktopApp.exe connecting to GitHub — a connection the legitimate application never makes.
JavaScript/frontend integrity monitoring — Implement Subresource Integrity (SRI) with Content-Security-Policy headers for all web applications handling financial transactions. Monitor CDN and hosting infrastructure (S3 buckets, CloudFront distributions) for any file modification outside the deployment pipeline.
Remote access software detection on corporate devices — Block or alert on AnyDesk, RustDesk, TeamViewer, Chrome Remote Desktop, and Parsec on corporate endpoints. FAMOUS CHOLLIMA workers install these within days of device receipt.
Time-of-day and geolocation correlation for remote workers — Flag authentication events at hours inconsistent with stated timezone, especially during DPRK business hours (02:00–10:00 UTC). Correlate VPN/proxy usage with claimed home location.
npm/package manager execution monitoring — Any node.exe spawning a shell that makes outbound network connections is near-certain malicious. Monitor preinstall/postinstall script execution on developer workstations. Focus when the execution happens outside of approved corporate directories, or when the downloaded payload is executed from
\AppData\Local\Temp\(Windows) or/tmp/(Linux/macOS).Cryptocurrency wallet file access monitoring — Alert on any non-wallet-application process accessing MetaMask extension data, wallet.dat files, seed phrase files, or BIP39 mnemonic clipboard patterns.
Threat Actor Landscape
Why aliases matter: DPRK threat actor naming is among the most confusing in the industry. A single group may appear under 5–8 different names depending on the vendor report you are reading. The table below maps every major alias so blue teamers can cross-reference across CrowdStrike, Microsoft, Mandiant and government reporting. When this document references an actor, it uses the format PRIMARY NAME (alias, alias) on first mention to aid recognition.
CrowdStrike | Microsoft | Mandiant / Google | Government / CISA | Other Vendor Aliases | Primary Mission | Primary Targets |
LAZARUS GROUP | Diamond Sleet | TEMP.Hermit | HIDDEN COBRA (FBI/CISA), APT38 (financial subgroup) | Zinc (Microsoft legacy), Labyrinth Chollima (CrowdStrike legacy), Guardians of Peace, Whois Hacking Team, Andariel (subgroup) | Financial theft, strategic espionage, destructive attacks | Banks, crypto exchanges, defense, aerospace, media |
PRESSURE CHOLLIMA | Jade Sleet | UNC4899 | TraderTraitor (FBI/CISA) | Slow Pisces (Palo Alto), CryptoCore (ClearSky) | Cryptocurrency theft, financial crime | DeFi protocols, crypto exchanges, blockchain bridges |
STARDUST CHOLLIMA | Citrine Sleet | UNC4736 (3CX cluster) | AppleJeus (FBI/CISA campaign name) | Gleaming Pisces (Palo Alto), Labyrinth Chollima (overlap) | Cryptocurrency theft via supply chain and trojanized apps | Software vendors with financial sector exposure |
FAMOUS CHOLLIMA | Storm-0530 | UNC5267 | DPRK IT Workers (FBI/CISA/DOJ) | Wagemole (SentinelOne), Nickle Tempest (Microsoft legacy) | IT worker infiltration and revenue generation | US/EU tech companies, especially remote-first firms |
SILENT CHOLLIMA | Emerald Sleet | APT43 | Kimsuky (FBI/CISA), ARCHIPELAGO (Google TAG) | Velvet Chollima (CrowdStrike overlap), Thallium (Microsoft legacy), Black Banshee (PwC), SharpTongue (Volexity), Springtail (Symantec) | Strategic intelligence collection | South Korea Gov, US policy, nuclear/missiles research |
VELVET CHOLLIMA | Ruby Sleet | — | ScarCruft / APT37 (CISA) | Reaper (FireEye legacy), Group123 (Cisco Talos), Ricochet Chollima (CrowdStrike), InkySquid (Volexity) | Defense/aerospace espionage, surveillance | Defense contractors, think tanks, nuclear research, North Korean defectors |
Attribution note: DPRK's offensive cyber units operate under the RGB (Reconnaissance General Bureau), with Bureau 121 handling cyber offensive operations (Lazarus/sub-groups) and Unit 180 focused on financial cybercrime. The operational boundaries are fluid — the same infrastructure and personnel appear across "espionage" and "financial crime" campaigns. Microsoft's threat actor naming uses the "Sleet" designator for all DPRK-attributed groups (replacing legacy "Tempest"/"Thallium" names in 2023). CrowdStrike uses the "CHOLLIMA" designator for all DPRK groups. Mandiant uses UNC (uncategorized) numbers for clusters not yet formally attributed to a named group.
Part II — Campaign Evolution Analysis (2021–2026)
2021–2022: Exchange and Crypto Exchange Direct Targeting
Characteristic: Spear-phishing to deliver maldocs; direct exploitation of crypto exchange APIs and hot wallets; Ronin bridge hack ($600M)
Tooling: Macro-enabled Office documents, custom RATs (BLINDINGCAN, COPPERHEDGE), direct API manipulation, AppleJeus cryptocurrency trading application trojans
Detection profile: MEDIUM — maldoc execution triggers EDR, hot wallet thefts often detectable in real-time via blockchain analytics
Defining campaigns: Ronin bridge hack (March 2022, $600M); Harmony Horizon bridge ($100M); multiple exchange compromises via AppleJeus
2022–2023: Supply Chain Entry and ISO/LNK Weaponization
Characteristic: Supply chain compromise (3CX, Trading Technologies), ISO/IMG delivery to bypass MOTW, GitHub-hosted C2
Tooling: Trojanized legitimate software installers, LNK-based loaders, GitHub icon files as C2 beacon, ICONIC_STEALER
Detection profile: LOW–MEDIUM — bypass of signature trust via legitimate signing; MOTW bypass via ISO
Defining campaign: 3CX — demonstrated second-order supply chain compromise capability; the first publicly documented supply chain attack inside a supply chain attack
2023–2024: Operation Dream Job Evolution and DeFi Protocol Targeting at Scale
Characteristic: Developer-targeting via trojanized npm packages and GitHub-hosted "coding challenges"; targeting blockchain bridge protocols; FAMOUS CHOLLIMA scaling with laptop farm networks
Tooling: npm typosquat packages with malicious preinstall scripts, Python/Node.js projects with compromised imports, smart contract exploitation, DeFi protocol logic abuse, front-end JS injection (precursor to Bybit)
Detection profile: LOW for developer-targeting (package execution appears legitimate); MEDIUM for DeFi attacks (blockchain analytics can trace)
Defining campaigns: Radiant Capital ($50M), PlayDapp ($290M), multiple bridge hacks; DOJ indictment of IT worker facilitator network (300+ placements)
2025–2026: Multi-Sig Infrastructure Attacks and Insider Program Maturation
Characteristic: Bybit-style front-end injection targeting multi-sig wallet approvers; FAMOUS CHOLLIMA IT worker program at scale with real-time deepfake video interviews; post-discovery extortion tactics
Tooling: JavaScript injection into wallet management platforms (Safe{Wallet} S3 bucket compromise), deepfake video generation, data extortion upon discovery
Detection profile: VERY LOW for multi-sig frontend attacks (UI injection invisible to standard security tools); MEDIUM for IT worker infiltration (behavioral indicators)
Defining campaigns: Bybit heist ($1.46B — largest single cryptocurrency theft in history); FAMOUS CHOLLIMA data extortion escalation pattern; FBI/IC3 advisory on DPRK social engineering targeting crypto industry
Part III — Full Kill Chain: Phase-by-Phase TTPs with Detection Logic
Phase 1 — Reconnaissance & Social Engineering Setup
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Recon | Establish Fake Professional Profiles | T1585.001 | Operation Dream Job, FAMOUS CHOLLIMA | HR/Recruiting: Reverse image search all profile photos; verify SSN/identity through commercial background check AND manual government verification; check references independently via public sources (not candidate-provided); request biometrics-verified identity verification before device issuance | HR Identity Verification Systems / OSINT |
Recon | Reconnaissance of Crypto Platform Architecture | T1591 | Bybit heist — DPRK studied Safe{Wallet}'s architecture, identified CDN-hosted JavaScript as attack surface | Monitor for systematic API testing from new IP ranges (unusual API call patterns exploring all endpoints without legitimate workflow); review blockchain analytics for test transactions from known DPRK-linked addresses | WAF / API Gateway / Blockchain Analytics |
Phase 2 — Initial Access
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Initial Access | Phishing via Social Media / Professional Networks | T1566.003 | Operation Dream Job LinkedIn recruitment lures | Prevention: Security awareness training (unsolicited job offers delivering files = suspicious); endpoint control to prevent execution from Downloads folder; sandbox all email attachments AND external downloads before execution | EDR / Secure Web Gateway (SWG) / Sandbox / Email Security |
Initial Access | Supply Chain Compromise — Software Vendor | T1195.002 | 3CX campaign — vendor build/distribution compromise | Sysmon Event ID 3: 3CXDesktopApp.exe connects to http://github.com or http://raw.githubusercontent.com (legitimate app does not contact GitHub); Sysmon Event ID 7: app loads DLL from own directory where DLL hash does not match known-good version | EDR / NDR / Proxy Logs / SIEM |
Initial Access | Supply Chain Compromise — Vendor-Side Detection | T1195.002 | 3CX campaign — build environment compromise | Binary reproducibility checks (same source → different binaries = compromised build); code signing ceremony in isolated environment; monitor for unexpected processes in CI/CD | CI/CD Security Posture Management / FIM |
Initial Access | Trojanized npm Package | T1195.002 | Dream Job developer-targeting via npm typosquats | EDR + Package Manager Logs: npm install of package not in approved dependency list AND published <30 days ago AND <100 downloads AND contains preinstall/postinstall scripts | Software Composition Analysis (SCA) / EDR |
Phase 3 — Execution & Persistence
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Execution | Malicious Script Execution via npm preinstall | T1059.007 | DPRK npm-based initial access | Sysmon Event ID 1: ParentImage = node.exe OR npm.cmd AND child = cmd.exe/powershell.exe/sh AND CommandLine contains download patterns (curl, wget, Invoke-WebRequest). Node.js spawning a download tool is almost always malicious. | EDR / Command-Line Analytics |
Persistence | Registry Run Key / Startup Folder | T1547.001 | Lazarus Group standard Windows persistence | Sysmon Event ID 13: TargetObject contains HKCU or HKLM ...\CurrentVersion\Run AND value points to executable in AppData/Temp/Users\Public/ProgramData AND setting process is NOT a known installer | EDR / FIM / SIEM |
Persistence | CI/CD Pipeline Persistence | T1072 | 3CX post-exploitation — CI/CD pipeline modification for persistent build-time injection | CI/CD audit logs: New workflow file created or modified by account that has not previously modified workflows; workflow references external actions not in approved list; build agent makes outbound connection to unapproved IP | CI/CD Security Tooling / Cloud SIEM |
Phase 4 — Privilege Escalation & Defense Evasion
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Defense Evasion | MOTW Bypass via ISO Containers | T1553.005 | Lazarus Group 2022–2023 ISO/IMG delivery | Sysmon Event ID 1: ParentImage = isoburn.exe OR Explorer.exe AND child = cmd.exe/powershell.exe/wscript.exe AND child executes from mounted ISO path (e.g., D:, E:). Any script execution from a mounted ISO path is high-confidence malicious. | EDR |
Defense Evasion | DLL Sideloading — BLINDINGCAN / COPPERHEDGE | T1574.002 | Lazarus Group standard DLL sideloading | Sysmon Event ID 7: Legitimate signed app loads DLL from same directory AND DLL is NOT signed by same publisher AND DLL was created within 7 days AND DLL exports unexpected functions | EDR (Behavioral Engine) |
Phase 5 — Credential Access
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Credential Access | Browser Credential Theft — ICONIC_STEALER... | T1555.003 | 3CX post-exploitation targeting Chrome, Edge, Brave, Firefox credential stores | Sysmon Event ID 10: TargetImage = browser process AND SourceImage is NOT browser extension/antivirus AND GrantedAccess includes 0x10 (PROCESS_VM_READ). Sysmon Event ID 11: Access to browser Login Data files from non-browser process. | EDR |
Credential Access | Cryptocurrency Wallet Seed Phrase Extraction | T1552 | Lazarus Group crypto-focused credential access targeting MetaMask, hardware wallet backups, seed phrase files | Sysmon Event ID 11 (via SACL): Access to files named seed/mnemonic/wallet/recovery in MetaMask/Exodus/Electrum paths from non-wallet process. Clipboard monitoring: process reads BIP39 mnemonic pattern from clipboard. | EDR (File & Clipboard Monitoring) / DLP |
Phase 6 — Lateral Movement: CI/CD Pipeline Targeting
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Lateral Movement | Compromise Build Server → Trojanize Software Output | T1195.002 | Full 3CX attack chain — CI/CD pipeline as pivot to source code, signing certs, cloud creds, package registries, and customer distribution | Build system logs: build runner creates/modifies files outside expected workspace; build runner connects to unapproved IPs; pipeline modification not traceable to approved code review; signed binaries produced outside scheduled build windows; code signing tool invoked by unauthorized account | CI/CD Security Tooling / NDR / Code Repo Audit Logs |
Phase 7 — Collection: Cryptocurrency Kill Chain
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Collection | Pre-Theft Reconnaissance | T1591 | Multiple crypto heists — systematic study of target platform architecture | Monitor for systematic API testing from new IP ranges; review blockchain analytics for test transactions from DPRK-linked addresses to your platform | WAF / API Gateway / SIEM |
Collection | JavaScript / Frontend Injection | T1195.003 (derived) | Bybit heist — Safe{Wallet} JavaScript modification | SRI for all JavaScript bundles via Content-Security-Policy with sha256 hashes; CDN/hosting access log review — any JS bundle modification outside deployment pipeline = alert; monitor S3/storage bucket access via CloudTrail | Cloud SIEM / WAF / CSP Monitoring |
Collection | Transaction Manipulation / Wallet Drain | T1565.002 | Bybit heist — multi-sig signers approved fraudulent transaction | ALL multi-sig signers MUST verify raw transaction data on hardware wallet screen, NOT UI overlay; for transactions >$1M: require independent verification from physically separate signer; blockchain analytics: flag transactions to addresses with no prior relationship | Hardware Wallets (Procedural Control) / Blockchain Analytics API |
Collection | Post-Theft Laundering | T1020.001 (derived) | Multiple crypto heists — documented DPRK laundering tradecraft | Time-critical: submit to blockchain analytics firms within 1 hour; file FBI IC3/CISA reports; contact major exchanges with stolen fund addresses for deposit freeze; monitor blockchain for DEX swaps, chain bridges, mixer inputs | Blockchain Analytics / SOAR |
Collection | GitHub-Hosted C2 (Icon Files) | T1105 | ICONIC_STEALER (3CX) — GitHub repos with .ico files containing encrypted C2 payloads | Sysmon Event ID 3: 3CXDesktopApp.exe (or any business app) connects to http://raw.githubusercontent.com — legitimate communication apps do not contact GitHub | EDR / SWG / Proxy Logs |
Phase 8 — Insider Threat: FAMOUS CHOLLIMA Detection
Phase | TTP | MITRE ID | Derived From | Detection / Controls | Tooling Category |
Insider — Hiring | Deepfake Video Interview | — | FAMOUS CHOLLIMA 2024–2026 evolution | HR: Require candidate to perform unprompted physical movements (turn head, hold up specific object) to validate live video; E-Verify for all remote workers; SSN validation against IRS TIN matching; independently locate references via public sources | HR Identity Platforms / Fraud Detection Systems |
Insider — Post-Hire | Device Session Forwarding | — | FAMOUS CHOLLIMA laptop farm operations | MDM/EDR: Corporate device has remote access app (AnyDesk, RustDesk, TeamViewer, Chrome Remote Desktop) AND device connects to corporate network from one IP geolocation AND those apps connect from a different geolocation = investigate | MDM / EDR / Network FW |
Insider — Post-Hire | Off-Hours Access from Wrong Timezone | — | FAMOUS CHOLLIMA operators working DPRK business hours | Azure AD / VPN logs: Logins at hours inconsistent with stated location (e.g., 2–6am EST for US-claimed worker). Correlate with DPRK/China timezone business hours (02:00–10:00 UTC). | IAM / VPN Logs / UEBA |
Insider — Post-Hire | Excessive Data Access Beyond Role | — | FAMOUS CHOLLIMA IP theft and backdoor operations | SIEM/DLP: Access to production source code, customer data, or cloud resources beyond role scope within first weeks; large file downloads; repository clones >1GB in single session | DLP / CASB / SIEM |
Detection Engineering Master Matrix
Phase | TTP | MITRE ID | Log Source | Key Event ID / Indicator | Actor |
Initial Access | Dream Job LinkedIn phishing | T1566.003 | EDR / Sandbox | ISO/LNK execution from Downloads folder | LAZARUS / VELVET CHOLLIMA |
Initial Access | Trojanized supply chain installer | T1195.002 | Sysmon 7 | 3CX app loads oversized d3dcompiler_47.dll | STARDUST CHOLLIMA |
Initial Access | npm typosquat package | T1195.002 | Sysmon 1 | node.exe spawns download via preinstall | LAZARUS |
Execution | ISO/LNK MOTW bypass | T1553.005 | Sysmon 1 | Script/binary execution from mounted ISO path | LAZARUS |
Execution | Malicious npm preinstall | T1059.007 | Sysmon 1 | node.exe spawns curl/PowerShell | LAZARUS |
Persistence | Registry Run key | T1547.001 | Sysmon 13 | Run key value in user-writable path | All DPRK |
Persistence | CI/CD pipeline modification | T1072 | CI/CD audit logs | Workflow modification outside approved process | STARDUST CHOLLIMA |
Defense Evasion | DLL sideloading | T1574.002 | Sysmon 7 | Legitimate app loads unsigned DLL from app dir | All DPRK |
Credential Access | Browser credential theft | T1555.003 | Sysmon 10 | Non-browser process accesses browser Login Data | ICONIC_STEALER |
Credential Access | Seed phrase extraction | T1552 | EDR behavioral | Process reads files matching BIP39 pattern | PRESSURE CHOLLIMA |
Lateral Movement | CI/CD pipeline as pivot | T1195.002 | CI/CD + network | Build runner makes unexpected external connections | STARDUST CHOLLIMA |
Collection | GitHub-hosted C2 (icon files) | T1105 | Sysmon 3 | 3CX app connects to GitHub · Change is constant. GitHub keeps you ahead. | STARDUST CHOLLIMA |
Collection | Wallet drain via JS injection | T1565.002 | CDN audit logs | JavaScript bundle modification outside deploy pipeline | PRESSURE CHOLLIMA |
Insider Threat | Device forwarding via RMM | — | MDM/EDR | Corporate device running remote access software | FAMOUS CHOLLIMA |
Insider Threat | Off-hours access from wrong timezone | — | Azure AD / VPN logs | Authentication at hours inconsistent with stated location | FAMOUS CHOLLIMA |
Exfiltration | Large data download from repo | T1030 | Git/SIEM | 1GB download from source code repo in single session | FAMOUS CHOLLIMA |
Part IV — Threat Hunt Hypotheses
The following hunt hypotheses are designed to proactively identify DPRK-linked activity in your environment. Each hypothesis specifies the data sources required, the detection logic, and the alert threshold for escalation.These hunts complement EDR/ITDR alerting. Mature platforms may detect portions or most of this activity, but correlation, tuning, and escalation logic determine whether intrusion is caught pre-impact or post-compromise
Hunt 1: 3CX-Style Supply Chain C2 — Application Contacting Unexpected Infrastructure
Hypothesis: A trojanized legitimate application (e.g., 3CX, VoIP client, business communications software) is making network connections that the clean version of that application would never make — specifically to GitHub raw content or bare IP addresses.
Note: This detection requires application behavioral baselines — you must know what network connections each trusted application normally makes. Without baselines, this hunt produces excessive false positives.
Core Detection Logic:
Identify network connections initiated by known communication/business applications (3CXDesktopApp.exe, Teams.exe, Zoom.exe, Slack.exe, or equivalent)
Flag connections where the destination is:
raw.githubusercontent.comorobjects.githubusercontent.com(ICONIC_STEALER C2 via GitHub icon files); a bare IP address (no resolved hostname) on port 443; any domain outside the application vendor's documented infrastructureCross-check: is the flagged connection to a domain the application has NEVER contacted in your baseline? First-ever connection to an unusual domain from a trusted app = strong indicator
Validation: Pull destination URL from proxy logs — if the response is a valid
.icofile with extra data appended after the image boundary (file size > expected ICO dimensions), it confirms ICONIC_STEALER infrastructure
Alert Threshold: Any connection from a business communications application to GitHub raw content = immediate high-severity alert. ICONIC_STEALER's entire C2 model depends on this path.
Hunt 2: FAMOUS CHOLLIMA — Device Forwarding Detection
Hypothesis: A FAMOUS CHOLLIMA IT worker has installed remote access software on their corporate device to forward the session to a DPRK operator, who is performing the actual work from a foreign location.
Core Detection Logic:
Identify corporate devices where any of the following processes are actively running: AnyDesk.exe, RustDesk.exe, TeamViewer.exe, remoting_host.exe (Chrome Remote Desktop), Parsec.exe, LogMeIn.exe
Correlate: on the same device, is there network traffic originating from or attributed to a foreign country (particularly East Asia IP ranges)? Corporate device connects to corporate network from a US IP (the forwarding laptop) but application traffic routes through a secondary connection to APAC IP ranges
Flag: any corporate device that installed remote access software within the first 7 days of employment — FAMOUS CHOLLIMA workers frequently set up forwarding immediately upon receiving the device
Time-of-day anomaly: device is actively in use at hours corresponding to DPRK business hours (02:00–10:00 UTC) while the employee claims to be US-based
Alert Threshold: Any corporate device running remote access software AND having APAC-origin network sessions = investigate immediately. Device forwarding has near-zero legitimate use on non-IT-support roles.
Hunt 3: Cryptocurrency Seed Phrase / Wallet Access Targeting
Hypothesis: A PRESSURE CHOLLIMA operator on a compromised endpoint is systematically searching for cryptocurrency wallet files, seed phrases, and private key material.
Core Detection Logic:
File path-based detection: Monitor access events on paths associated with cryptocurrency wallets — %APPDATA%\MetaMask\, %APPDATA%\Exodus\, %APPDATA%\Electrum\wallets\, .bitcoin\wallet.dat, any file containing wallet/seed/mnemonic/keystore/recovery in filename accessed by non-wallet process
Keyword search pattern detection: A process (cmd, PowerShell, or unknown binary) traversing user directories looking for wallet-related filename patterns within a short time window — PRESSURE CHOLLIMA operators run automated wallet harvesting scripts
Clipboard monitoring: Any process reading clipboard content matching BIP39 mnemonic pattern (12 or 24 dictionary words separated by spaces) from a non-wallet-application
Alert Threshold: Any non-wallet-application process accessing wallet database files = high severity. Clipboard pattern match to BIP39 wordlist by non-wallet process = high severity.
Hunt 4: npm Package Execution with Unexpected Network Activity
Hypothesis: A developer workstation installed a DPRK-trojanized npm package containing a malicious preinstall or post-install script that spawned a shell and made outbound network connections to download a second-stage payload.
Core Detection Logic:
Identify process chains where node.exe spawns a shell interpreter (cmd.exe, powershell.exe, sh, bash) OR a download utility (curl.exe, wget.exe, certutil.exe)
Narrow to cases where the node.exe parent's command-line includes npm, node_modules, or npx — confirming spawn originated from a package script (preinstall/postinstall hooks)
For any npm-triggered shell spawn that makes an outbound network connection: flag unconditionally. Legitimate package install scripts do not download external executables.
Secondary signal: node.exe making outbound HTTPS connections to IPs/domains with no prior history for that endpoint
Alert Threshold: Any node.exe → shell → network download chain = CRITICAL. This pattern has no legitimate use in standard npm package installation.
Hunt 5: CI/CD Pipeline Unauthorized Modification
Hypothesis: DPRK has compromised a developer or service account and is modifying pipeline configuration to inject malicious build steps — repeating the SUNSPOT/3CX supply chain injection model against your build environment.
Core Detection Logic:
GitHub/GitLab/Bitbucket pipeline audit events: new CI/CD secrets created or modified; new workflow/pipeline file created (.github/workflows/*.yml); existing workflow modified to add new steps/external action references/network destinations; branch protection rules weakened; new org member added or member granted elevated permissions
Behavioral anomalies: any of the above events performed by an account that has not previously performed that action type, authenticated from a new IP/country, was created within 30 days, or made changes outside business hours for account's registered timezone
Build artifact integrity: signed binary hash does not match expected reproducible build output
Alert Threshold: Workflow modification from a first-time actor = HIGH. New secret addition from foreign IP = CRITICAL. Pipeline step that adds a network download to an unknown endpoint = CRITICAL.
Hunt 6: ICONIC_STEALER / GitHub Icon File C2 Beacon
Hypothesis: An endpoint infected via 3CX-style supply chain attack is beaconing to DPRK C2 infrastructure by downloading apparently-valid icon files from GitHub repositories, with commands encoded after the legitimate image data.
Core Detection Logic:
Identify HTTP GET requests to ‘http://raw.githubusercontent.com' or 'objects.githubusercontent.com’ where requested path ends in .ico
Correlate: is the requesting process a known business application with no documented reason to retrieve icon files from GitHub?
Enrich: does the GitHub repository correspond to a legitimate open-source project? ICONIC_STEALER used newly-created or obscure repos with no stars/forks hosting only icon files
Size anomaly: .ico file larger than expected size for declared dimensions suggests appended payload data
Frequency: ICONIC_STEALER polls periodically — regular interval requests to the same GitHub path
Alert Threshold: Business application + GitHub raw .ico download = immediate investigation. Any non-browser/non-developer process downloading from GitHub raw = investigate.
Part V — Leadership Briefing: Strategic Threat Posture
The Strategic Reality
DPRK's cyber program serves one primary function: generating foreign currency to fund the weapons program in the face of international sanctions. This is not espionage infrastructure — it is the financial backbone of North Korea's nuclear deterrent. The actors are highly motivated (failure means severe consequences in DPRK), technically skilled (many trained at elite DPRK computer science programs), and operationally patient.The key leadership insight: DPRK's threat to financial and technology organizations is not theoretical — it is active, aggressive, and measurably successful. They have demonstrated they can steal $1.46 billion in a single operation.
Three Things Leadership Must Understand
1. If you operate in the crypto space, you are a primary DPRK target.DPRK does not focus on traditional espionage against most organizations. If your organization touches cryptocurrency — exchange, custodian, DeFi protocol, blockchain infrastructure, crypto-adjacent fintech — you are in their primary targeting set. The Bybit heist demonstrated that even technically sophisticated organizations with multi-sig controls are vulnerable when the attack targets the web frontend, not the keys themselves.Investment priority: Subresource Integrity (SRI) for all JavaScript, strict Content Security Policy, CDN/hosting audit logging, and independent transaction verification procedures for all high-value multi-sig operations.
2. Your software supply chain is an attack surface you don't control.3CX was a trusted enterprise communications provider. Trading Technologies was a trusted financial software vendor. Neither was a security-naive organization. DPRK compromised them to reach their customers.Every piece of third-party software in your environment is a potential delivery mechanism. You cannot audit all of them — but you can monitor their behavior. Behavioral anomaly detection on known-trusted applications (does 3CX contact GitHub? It shouldn't.) catches supply chain attacks that signature-based security cannot.Investment priority: Application behavior baselining and network egress monitoring by application, not just by host.
3. DPRK may already have an employee inside your organization.FAMOUS CHOLLIMA is a documented, active, large-scale insider placement program. If your organization hires remote IT workers, software developers, or cloud engineers — especially for roles allowing access to source code, production infrastructure, or customer data — you have attack surface for FAMOUS CHOLLIMA.The FBI and DOJ have confirmed that hundreds of workers were placed successfully. Most were detected because they tried to extort their employer upon being identified (a known FAMOUS CHOLLIMA escalation pattern) — not because of proactive detection.Investment priority: Enhanced identity verification for remote workers, device forwarding detection, behavioral analytics for unusual access patterns.
Risk Prioritization by Actor
Actor | Likelihood | Impact | Your Asset at Risk |
PRESSURE CHOLLIMA / Jade Sleet | CRITICAL (if crypto/fintech) | CRITICAL | Cryptocurrency holdings, smart contract funds |
STARDUST CHOLLIMA / Citrine Sleet | MEDIUM (software vendors) | HIGH | Build pipeline, customer trust, distribution channels |
FAMOUS CHOLLIMA / Storm-0530 | MEDIUM (tech/remote-first companies) | HIGH | Source code, intellectual property, persistent access |
LAZARUS GROUP / Diamond Sleet | HIGH (defense, crypto, finance) | HIGH | IP, credentials, cryptocurrency assets |
Kimsuky / Emerald Sleet | LOW (unless Korea policy/defense) | MEDIUM | Research data, government policy documents |
This document reflects threat intelligence through March 2026. DPRK's cryptocurrency theft operations are among the most rapidly evolving in the threat landscape — as DeFi protocols add security controls, DPRK adapts to target adjacent infrastructure. Detection strategies should be reviewed monthly for cryptocurrency-exposed organizations.
Master References Index
Annual Threat Intelligence Reports
Report | Year |
CrowdStrike Global Threat Report | 2022 - 2025 |
CrowdStrike Threat Hunting Report | 2021 - 2025 |
Mandiant M-Trends Report | 2021 - 2025 |
Microsoft Digital Defense Report | 2021 - 2025 |
Chainalysis & TRM Labs Crypto Crime Reports | 2025 - 2026 |
IBM X-Force Threat Intelligence Index | 2022 - 2026 |
CheckPoint Cybersecurity Report | 2022 - 2026 |
ODNI Annual Threat Assessment | 2022 - 2025 |
FBI Internet Crime Report | 2021 - 2024 |
Additional Vendor Reports
Report | Year |
PaloAlto Global Incident Response Report 2026 | 2026 |
Red Canary Threat Detection Report 2025 | 2025 |
Sophos Threat Report 2025 | 2025 |
Trellix Advanced Threat Research Report 2024 | 2024 |
Government & Regulatory Advisories
Identifier | Title | Publisher | Year |
TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies | CISA / FBI / Treasury | 2022 | |
AppleJeus: Analysis of North Korea's Cryptocurrency Malware | CISA / FBI / Treasury | 2021 | |
Supply Chain Attack Against 3CXDesktopApp | CISA | 2023 | |
North Korea Aggressively Targeting Crypto Industry with Well-Disguised Social Engineering Attacks | FBI IC3 | 2024 | |
North Korean IT Workers Conducting Data Extortion | FBI IC3 | 2025 | |
Two North Korean Nationals and Three Facilitators Indicted for Fraudulent Remote IT Worker Scheme | DOJ | 2024 | |
Justice Department Announces Coordinated Nationwide Actions to Combat North Korean Remote IT Worker Fraud | DOJ | 2024 | |
Lazarus Group Designation — Specially Designated Nationals List | Treasury / OFAC | 2019 (updated) | |
Treasury Sanctions Virtual Currency Mixer Used by DPRK | Treasury / OFAC | 2022 | |
North Korea Cyber Threat Overview | CISA | Ongoing | |
Panel of Experts Final Report — DPRK Sanctions | UN Security Council | 2024 | |
Multilateral Sanctions Monitoring Team — DPRK Cyber and IT Worker Activities | MSMT (11-nation coalition) | 2025 |
Campaign-Specific Vendor Reporting (2021–2026)
Campaign / Actor | Report Title | Publisher | Year |
3CX Supply Chain | 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise | Mandiant / Google Cloud | 2023 |
3CX / ICONIC_STEALER | SmoothOperator: Ongoing Campaign Trojanizes 3CX Software in Software Supply Chain Attack | SentinelOne | 2023 |
Bybit Heist | Chainalysis | 2025 | |
DPRK Crypto Laundering | North Korea and the Industrialization of Cryptocurrency Theft | TRM Labs | 2024 |
Lazarus / DeathNote | Kaspersky (Securelist) | 2023 | |
Operation Dream Job | ESET (WeLiveSecurity) | 2025 | |
Diamond Sleet / Supply Chain | Diamond Sleet Supply Chain Compromise Distributes a Modified CyberLink Installer | Microsoft Threat Intelligence | 2023 |
Emerald Sleet / Jade Sleet | Microsoft Security Insider | 2024 | |
Kimsuky / Security Researchers | Google Threat Analysis Group | 2023 | |
DPRK Social Engineering | NSA / FBI / State Department | 2023 |
MITRE ATT&CK Group Profiles
Group ID | Name | Profile Link |
G0032 | Lazarus Group | |
G0094 | Kimsuky | |
G0067 | APT37 (Reaper) | |
G0115 | GOLD SOUTHFIELD (related) |
Add a comment












