An exploratory analysis of the DPRK cyber threat landscape using publicly available reports

被引:0
作者
Lyu, Jeonggak [1 ]
Song, Ahyun [2 ]
Seo, Euiseong [2 ]
Kim, Gibum [1 ]
机构
[1] Sungkyunkwan Univ, Dept Forens, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
Cyber threat intelligence; Cyberattack; DPRK threat actors; Lazarus; Open-source intelligence; INTELLIGENCE;
D O I
10.1007/s10207-025-00980-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber activities have evolved to mirror real-world operations, prompting state-sponsored intelligence agencies to pivot swiftly to cyberspace. Notably, Democratic People's Republic of Korea (DPRK) state-sponsored threat actors have emerged as significant global players, targeted not only the Republic of Korea but also engaged in espionage activities worldwide. Their activities have expanded to include ransomware distribution and cryptocurrency heists, indicating a pursuit of financial gain. To comprehensively understand and track their activities, the research utilized exploratory analysis of publicly available reports. This research involved meticulous analysis of over 2000 publicly available reports spanning a significant period from 2009 to May 2024. Our analysis focused on identifying the code names employed in these reports to denote DPRK state-sponsored threat actors. By analyzing the naming conventions used by cyber threat intelligence companies, the study clustered groups believed to represent the same entity. This approach identified 160 distinct code names for these actors. Additionally, the threat actors were categorized into seven widely recognized groups in the threat intelligence industry. Furthermore, 154 notable incidents attributed to these actors were extracted and documented. Detailed analysis of these incidents, including motivations, targeted sectors, and related factors, provided valuable insights into the evolving tactics of DPRK state-sponsored threat actors. In a concerted effort to contribute to the cybersecurity community, our findings have been openly shared as a dataset and presented through a dedicated website for easy access. This initiative aims to significantly enhance the understanding of researchers interested in their activities. The dataset, now publicly available, serves as a valuable resource for researchers seeking comprehensive material on their activities. Openly sharing the findings aims to foster collaboration and further research in the cybersecurity community to effectively combat emerging threats.
引用
收藏
页数:14
相关论文
共 73 条
[1]   Current approaches and future directions for Cyber Threat Intelligence sharing: A survey [J].
Alaeifar, Poopak ;
Pal, Shantanu ;
Jadidi, Zahra ;
Hussain, Mukhtar ;
Foo, Ernest .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
[2]  
Aliprandi C, 2014, 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), P665, DOI 10.1109/ASONAM.2014.6921656
[3]   Processing tweets for cybersecurity threat awareness [J].
Alves, Fernando ;
Bettini, Aurelien ;
Ferreira, Pedro M. ;
Bessani, Alysson .
INFORMATION SYSTEMS, 2021, 95
[4]  
[Anonymous], 2024, S2024215 UN SEC COUN
[5]  
[Anonymous], 2022, UN: S2022/132 final report of the panel of experts
[6]  
[Anonymous], 2021, UNIT42: Crooked pisces
[7]  
[Anonymous], 2013, Diablo2Wiki
[8]  
[Anonymous], 2014, FLASHPOINT
[9]  
[Anonymous], 2016, Novetta: operation blockbuster: unraveling the long thread of the sony attack
[10]  
[Anonymous], 2023, Medium