North Korea's Cybercrime is Statecraft, Report Warns

New Report Analyzes North Korea's Use of Cybercrime as a Tool of Statecraft Following UN Panel Dissolution

INFORMATIONAL
November 29, 2025
4m read
Threat IntelligenceThreat ActorPolicy and Compliance

Related Entities

Threat Actors

Organizations

North KoreaCYFIRMA Russia

Full Report

Executive Summary

A strategic report from the intelligence firm CYFIRMA, published on November 28, 2025, provides a comprehensive assessment of how the Democratic People's Republic of Korea (DPRK) has integrated cybercrime into its national strategy. This analysis highlights that for Pyongyang, cyber operations are not merely criminal acts but a vital tool of statecraft used to generate revenue, evade international sanctions, and project power. The report is particularly significant in the wake of Russia's March 2024 veto of a United Nations resolution, which effectively terminated the mandate of the UN Panel of Experts on North Korea, the primary independent body monitoring the regime's illicit activities.

Strategic Context: The Monitoring Vacuum

For 15 years, the UN Panel of Experts provided the international community with detailed, credible reports on North Korea's methods for bypassing sanctions. A major focus of these reports was the regime's use of state-sponsored cyberattacks to steal hundreds of millions of dollars annually. With the panel now dissolved, a critical source of public accountability and intelligence is gone. Reports like this one from CYFIRMA and other private-sector firms are now essential for filling the void and providing visibility into the DPRK's evolving cyber threat.

Key Findings of the Report

The report outlines how North Korea's cyber apparatus functions as a self-funding arm of the state, with clear objectives:

  • Revenue Generation: The primary driver is financial. Cybercrime directly funds the DPRK's nuclear and ballistic missile programs, as well as luxury goods for the elite, in defiance of global sanctions.
  • Intelligence Gathering: Espionage operations target government, defense, and technology sectors worldwide to steal strategic information and intellectual property.
  • Destructive Attacks: At times, operations shift to disruption and destruction, as seen in historical attacks against financial institutions and media companies.

Operational Methodologies

The report details the tactics of prolific North Korean threat actors like the Lazarus Group and its various subgroups (e.g., Andariel, BlueNoroff). Their operations are characterized by:

  • Sophisticated Targeting: They conduct extensive reconnaissance to identify and exploit vulnerabilities in the cryptocurrency, banking (SWIFT), and defense sectors.
  • Living off the Land: Increasing use of legitimate tools and built-in operating system features to evade detection.
  • Supply Chain Attacks: Compromising software vendors to distribute malware to a wide array of downstream targets.
  • Ransomware and Cryptocurrency Theft: A major focus is on large-scale cryptocurrency exchange heists and, more recently, deploying their own ransomware variants or partnering with RaaS platforms.

Implications for Global Security

The absence of the UN monitoring body, combined with the DPRK's growing cyber capabilities, presents a significant threat. The regime is now less constrained by international oversight and more reliant on cybercrime to achieve its strategic goals. This increases the risk of more frequent and audacious attacks on the global financial system and critical infrastructure. The report serves as a warning that private and public sector organizations must enhance their defenses and threat intelligence capabilities to counter this persistent and highly motivated state actor.

Timeline of Events

1
March 28, 2024
Russia vetoes a UN resolution, ending the mandate of the Panel of Experts monitoring North Korea sanctions.
2
November 28, 2025
CYFIRMA publishes its strategic report on North Korea's use of cybercrime as statecraft.
3
November 29, 2025
This article was published

Sources & References

NORTH KOREAN CYBER CRIME AS A STATECRAFT TOOL
CYFIRMA (cyfirma.com) November 28, 2025
Cyber Briefing: 2025-11-28
YouTube (youtube.com) November 28, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

north koreadprklazarus groupcybercrimestate-sponsoredthreat intelligencesanctions

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading