{"title":"NORTH KOREA’S CYBER CAPABILITIES","authors":"Bartosz Smutek","doi":"10.5604/01.3001.0053.8030","DOIUrl":null,"url":null,"abstract":"The purpose of the article is to show the most important attacks from North Korea and theiroffensive and defensive capabilities. The structure of cyber organizations and their operations arepresented. Nowadays North Korea is seen head on as a military threat, the work aims to presenttheir potential cyber capabilities and the attacks they have made. The beginning of the workdescribes issues related to the organization of the structures, their structure, role and purpose. Thenext section presents the most interesting attacks related to spying and information extraction,cyber-terrorism operations and financial extraction, which are most often used to strengthenmilitary capabilities. This was followed by a closer look at the Lazarus group's activities, theirtactics, tasks and the attacks they have committed. The subject of Poland, which has also been thetarget of attacks, was also touched upon. Finally, the topic of the future strategy of cyber forceswas discussed.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"129 16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity & Cybercrime","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0053.8030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The purpose of the article is to show the most important attacks from North Korea and theiroffensive and defensive capabilities. The structure of cyber organizations and their operations arepresented. Nowadays North Korea is seen head on as a military threat, the work aims to presenttheir potential cyber capabilities and the attacks they have made. The beginning of the workdescribes issues related to the organization of the structures, their structure, role and purpose. Thenext section presents the most interesting attacks related to spying and information extraction,cyber-terrorism operations and financial extraction, which are most often used to strengthenmilitary capabilities. This was followed by a closer look at the Lazarus group's activities, theirtactics, tasks and the attacks they have committed. The subject of Poland, which has also been thetarget of attacks, was also touched upon. Finally, the topic of the future strategy of cyber forceswas discussed.