Files / North Korea

North Korea's Cyber Weapon Capabilities: Implications for International Security

Focus, and the three core actions, analyze the strategic logic, technical characteristics of North Korea's cyber operations, and their impact on the security order in Northeast Asia and globally.

Detail

Published

23/12/2025

Key Chapter Title List

  1. Introduction
  2. The Strategic Significance of North Korea's Development of Cyber Weapon Capabilities
  3. Examination of the Current State of North Korea's Cyber Weapon Development
  4. North Korea's Cyber Weapon Capabilities: A Case Study of Denial-of-Service Attacks
  5. Operation Kimsuky
  6. Operation Lazarus
  7. Operation Advanced Persistent Threat 37
  8. Assessment of the Impact of North Korea's Cyber Weapon Capabilities on International Security
  9. Conclusion

Document Introduction

Although North Korea is ranked among the world's poorest countries in terms of GDP growth and has an extremely low internet penetration rate, it maintains a key influence in the international order due to the deterrence its nuclear arsenal poses to the US-led Western bloc and its increasingly sophisticated cyber operation capabilities. North Korea's cyber capabilities are characterized by significant opportunism, and its leadership's concept of cyber operations in military conflicts blends grand narratives with traditional thinking, with no clear evidence of a nuclear doctrine currently available. The core aim of this study is to systematically examine North Korea's cyber weapon capabilities and their potential impact on international security by analyzing three key operations: Kimsuky, Lazarus, and Advanced Persistent Threat (APT) 37.

The motivations for North Korea's development of cyber weapon capabilities are mainly reflected in three dimensions: first, to create global chaos by disrupting critical information infrastructure; second, to conduct long-term espionage activities targeting core areas such as defense and security to obtain strategic intelligence; third, to generate revenue through methods like cyberattacks on multinational financial institutions to provide funding for subsequent operations. These cyber operations exhibit distinct characteristics of asymmetric warfare. North Korea funds domestic hacker groups to operate abroad, uses foreign IP addresses to conceal operations, and has developed a diversified cyber weapon system including malware, ransomware, and denial-of-service (DoS) attacks.

The report provides in-depth case analyses of three core cyber operations: The 2013 Operation Kimsuky used IP addresses from China's Jilin and Liaoning provinces to conduct cyber espionage against institutions such as the Korea Institute for Defense Analyses and the Sejong Institute, causing $750 million in economic losses to South Korea. The 2016 Bangladesh Bank heist led by the Lazarus Group involved implanting viruses via phishing emails in an attempt to transfer $10 billion, ultimately causing approximately $81 million in losses. APT37 (also known as ScarCruft, Group 123), since 2014, has focused on South Korean military, government, and private entities, conducting precise data theft through custom malware and exploiting software vulnerabilities, demonstrating a high degree of technical complexity.

In terms of international security impact, South Korea, as the primary target of North Korean cyber operations, faces continuous threats to its key areas such as military secrets and energy infrastructure. China and Russia, due to their network connections with North Korea, have been accused of indirectly facilitating some North Korean cyber operations. The United States lists North Korea as one of its four major cyber threats, concerned about the potential risks it poses to critical infrastructure and national security information. These actions not only impact the strategic stability of the Northeast Asian region but also pose severe challenges to global cyberspace governance and data security systems.

Based on the theory of cyber power in geopolitics and combined with empirical analysis of specific cases, this study reveals how North Korea uses cyberspace as a core domain for projecting soft power. The study argues that in the context of deepening global interdependence, there is an urgent need to establish a transnational coordinated cybersecurity regulatory framework to address the non-traditional security threat of state-sponsored cyberattacks and maintain the stability of the international security order.