Microsoft Threat Intelligence Podcast cover image

North Korea Threat Landscape Update

Microsoft Threat Intelligence Podcast

00:00

North Korean Cyber Operations: Evolution over Revolution

The chapter discusses the factors that have led North Korea to become a first-tier Advanced Persistent Threat (APT) actor, highlighting their mindset of evolution rather than revolution. It explores the diverse techniques employed by North Korean cyber groups, including tactics from previous attacks, software supply chain attacks, social media tactics, and social engineering techniques. The chapter also delves into the heavy emphasis on cryptocurrency collection in North Korea's state-sponsored cyber operations and the challenges of laundering the stolen money.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app