The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Kong Ji-Young, Jong In Lim, Kim Kyoung Gon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

According to a 2013 briefing from the South Korean National Assembly by the South Korean National Intelligence Service, North Korean leader Kim Jong-un stated, 'Cyberwarfare is an all-purpose sword that guarantees the North Korean People's Armed Forces ruthless striking capability, along with nuclear weapons and missiles.' Kim has secretly executed all-purpose cyberattacks to achieve his agenda, regardless of North Korea's diplomatic and economic situation. The 'all-purpose sword' has been adapted to the different purposes it has pursued against North Korea's adversaries, such as creating ransomware for financial gain, a cyberweapon to destroy computer systems, and an invisible espionage tool to accumulate sensitive information. This paper is divided into three parts. The first section discusses the will of North Korea to use cyber warfare for different purposes by explaining how its administrative agencies take charge of different fields but carry out cyber operations to achieve their goals. The second section describes and analyzes the interconnectivity in North Korea's suspected cyber operations: specifically, Campaign Kimsuky, Operation KHNP, Operation DarkSeoul, Operation Blockbuster, the Bangladesh Central Bank Heist, and Wannacry. The operations will be categorized by operational goals, showing North Korea's success at achieving its various purposes by these means. In the last section, we suggest a future cyber strategy direction for North Korea based on our analysis of its tactics, techniques and procedures; and how North Korea cooperates with other countries, including countermeasures for countries around the world.

Original languageEnglish
Title of host publication2019 11th International Conference on Cyber Conflict
Subtitle of host publicationSilent Battle, CyCon 2019
EditorsMassimiliano Signoretti, Ihsan Tolga, Tomas Minarik, Gabor Visky, Siim Alatalu, Stefano Biondi
PublisherNATO CCD COE Publications
ISBN (Electronic)9789949990443
DOIs
Publication statusPublished - 2019 May 1
Event11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019 - Tallinn, Estonia
Duration: 2019 May 282019 May 31

Publication series

NameInternational Conference on Cyber Conflict, CYCON
Volume2019-May
ISSN (Print)2325-5366
ISSN (Electronic)2325-5374

Conference

Conference11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019
Country/TerritoryEstonia
CityTallinn
Period19/5/2819/5/31

Keywords

  • cyber strategies
  • mixing tactics
  • North Korea
  • North Korean cyber forces
  • state-sponsored cyber operations
  • techniques and procedures

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'The All-Purpose Sword: North Korea's Cyber Operations and Strategies'. Together they form a unique fingerprint.

Cite this