North Korea

Four Foreign Forces: A CTI Analysis of APTs Targeting the U.S.

Abstract:

This paper analyzes the cyber threat landscape posed by advanced persistent threats (APTs) attributed to China, Iran, North Korea, and Russia. It focuses on active groups and their cyber activities targeting the United States. Utilizing cyber threat intelligence data from authoritative sources such as Cybersecurity and Infrastructure Security Agency (CISA), Office of the Director of National Intelligence (ODNI), Mandiant, and MITRE, this study identifies twelve key APT groups attributed to the four adversarial nations and creates a quick profile for each nation and group. It explores the common techniques and sub-techniques employed by each nation and then across all four nations. Examination of these nations, groups, and techniques then informs a list of six actionable mitigations that will enhance cybersecurity defenses targeting these adversarial groups in an efficient manner: User Training, Restrict Web-Based Content, Privileged Account Management, Network Intrusion Prevention, Execution Prevention, and Antivirus/Antimalware.

South Korea’s Options in Responding to North Korean Cyberattacks

Abstract:

North Korea has increasingly mounted cyberattacks against South Korea. This paper first examines the dramatic differences between North and South Korea in cyberspace and the history of North Korean cyberattacks. Most of these attacks are easy to attribute for three reasons: they often come from addresses known to be used by North Korea; they often occur on Korean anniversaries; and they often use similar methods and attack code. In this article, the authors discuss possible responses by South Korea. Responses to these attacks begin with invoking  international  law  and  imposing  sanctions.  Next,  South  Korea  can  strengthen  its defences by improving coordination between the government and the private sector. Finally, South Korea could, justifiably, launch counterattacks.

Manipulating the Architecture of Cultural Control: A Conceptual Model for Strategic Influence Operations in North Korea

ABSTRACT

The deep structural and cultural changes taking place in North Korea provide an opportunity to conduct influence operations to shape that country’s culture and society, either to destabilize the government or to prepare the population for a regime change. This paper presents a conceptual model of how contradictions between top down, imposed culture and organic, indigenous culture can be exploited to destabilize the system, and eventually re-pattern the culture.  The process includes the following steps: identification of the cultural type; understanding relevant cultural forms; identification of vulnerable targets; evaluation of the information system; identification of effective elements of persuasion; mapping of the architecture of social control; and introduction of new “attractors” to damage or destroy the constituent cultural myths.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com