A strategic report from the intelligence firm CYFIRMA, published on November 28, 2025, provides a comprehensive assessment of how the Democratic People's Republic of Korea (DPRK) has integrated cybercrime into its national strategy. This analysis highlights that for Pyongyang, cyber operations are not merely criminal acts but a vital tool of statecraft used to generate revenue, evade international sanctions, and project power. The report is particularly significant in the wake of Russia's March 2024 veto of a United Nations resolution, which effectively terminated the mandate of the UN Panel of Experts on North Korea, the primary independent body monitoring the regime's illicit activities.
For 15 years, the UN Panel of Experts provided the international community with detailed, credible reports on North Korea's methods for bypassing sanctions. A major focus of these reports was the regime's use of state-sponsored cyberattacks to steal hundreds of millions of dollars annually. With the panel now dissolved, a critical source of public accountability and intelligence is gone. Reports like this one from CYFIRMA and other private-sector firms are now essential for filling the void and providing visibility into the DPRK's evolving cyber threat.
The report outlines how North Korea's cyber apparatus functions as a self-funding arm of the state, with clear objectives:
The report details the tactics of prolific North Korean threat actors like the Lazarus Group and its various subgroups (e.g., Andariel, BlueNoroff). Their operations are characterized by:
The absence of the UN monitoring body, combined with the DPRK's growing cyber capabilities, presents a significant threat. The regime is now less constrained by international oversight and more reliant on cybercrime to achieve its strategic goals. This increases the risk of more frequent and audacious attacks on the global financial system and critical infrastructure. The report serves as a warning that private and public sector organizations must enhance their defenses and threat intelligence capabilities to counter this persistent and highly motivated state actor.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats