TY - GEN
T1 - The All-Purpose Sword
T2 - 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019
AU - Ji-Young, Kong
AU - Lim, Jong In
AU - Kyoung Gon, Kim
PY - 2019/5/1
Y1 - 2019/5/1
N2 - According to a 2013 briefing from the South Korean National Assembly by the South Korean National Intelligence Service, North Korean leader Kim Jong-un stated, 'Cyberwarfare is an all-purpose sword that guarantees the North Korean People's Armed Forces ruthless striking capability, along with nuclear weapons and missiles.' Kim has secretly executed all-purpose cyberattacks to achieve his agenda, regardless of North Korea's diplomatic and economic situation. The 'all-purpose sword' has been adapted to the different purposes it has pursued against North Korea's adversaries, such as creating ransomware for financial gain, a cyberweapon to destroy computer systems, and an invisible espionage tool to accumulate sensitive information. This paper is divided into three parts. The first section discusses the will of North Korea to use cyber warfare for different purposes by explaining how its administrative agencies take charge of different fields but carry out cyber operations to achieve their goals. The second section describes and analyzes the interconnectivity in North Korea's suspected cyber operations: specifically, Campaign Kimsuky, Operation KHNP, Operation DarkSeoul, Operation Blockbuster, the Bangladesh Central Bank Heist, and Wannacry. The operations will be categorized by operational goals, showing North Korea's success at achieving its various purposes by these means. In the last section, we suggest a future cyber strategy direction for North Korea based on our analysis of its tactics, techniques and procedures; and how North Korea cooperates with other countries, including countermeasures for countries around the world.
AB - According to a 2013 briefing from the South Korean National Assembly by the South Korean National Intelligence Service, North Korean leader Kim Jong-un stated, 'Cyberwarfare is an all-purpose sword that guarantees the North Korean People's Armed Forces ruthless striking capability, along with nuclear weapons and missiles.' Kim has secretly executed all-purpose cyberattacks to achieve his agenda, regardless of North Korea's diplomatic and economic situation. The 'all-purpose sword' has been adapted to the different purposes it has pursued against North Korea's adversaries, such as creating ransomware for financial gain, a cyberweapon to destroy computer systems, and an invisible espionage tool to accumulate sensitive information. This paper is divided into three parts. The first section discusses the will of North Korea to use cyber warfare for different purposes by explaining how its administrative agencies take charge of different fields but carry out cyber operations to achieve their goals. The second section describes and analyzes the interconnectivity in North Korea's suspected cyber operations: specifically, Campaign Kimsuky, Operation KHNP, Operation DarkSeoul, Operation Blockbuster, the Bangladesh Central Bank Heist, and Wannacry. The operations will be categorized by operational goals, showing North Korea's success at achieving its various purposes by these means. In the last section, we suggest a future cyber strategy direction for North Korea based on our analysis of its tactics, techniques and procedures; and how North Korea cooperates with other countries, including countermeasures for countries around the world.
KW - cyber strategies
KW - mixing tactics
KW - North Korea
KW - North Korean cyber forces
KW - state-sponsored cyber operations
KW - techniques and procedures
UR - http://www.scopus.com/inward/record.url?scp=85069187829&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85069187829&partnerID=8YFLogxK
U2 - 10.23919/CYCON.2019.8756954
DO - 10.23919/CYCON.2019.8756954
M3 - Conference contribution
AN - SCOPUS:85069187829
T3 - International Conference on Cyber Conflict, CYCON
BT - 2019 11th International Conference on Cyber Conflict
A2 - Signoretti, Massimiliano
A2 - Tolga, Ihsan
A2 - Minarik, Tomas
A2 - Visky, Gabor
A2 - Alatalu, Siim
A2 - Biondi, Stefano
PB - NATO CCD COE Publications
Y2 - 28 May 2019 through 31 May 2019
ER -