

Between Two Gregs: An Update on the North Korean Threat Landscape
Nov 20, 2024
In this discussion, Greg Lesnewich, a Senior Threat Researcher at Proofpoint, and Greg Schloemer, a Senior Threat Intelligence Analyst at Microsoft, dive deep into North Korea's unique state-sponsored cyber activities. They explore the alarming use of stolen cryptocurrency to fund missile tests and the intense pressure operating on DPRK cyber actors. From unconventional tactics like personal identity targeting to the risks of hiring remote North Korean IT workers, their insights provide a chilling look into the geopolitical implications of this persistent threat.
AI Snips
Chapters
Transcript
Episode notes
Target Prioritization
- North Korean threat actors prioritize high-value targets, even individuals, if they offer better access to cryptocurrency.
- They bypass traditional enterprise targets, focusing on personal accounts and devices to achieve their financial goals.
Crypto Focus
- North Korean actors pursue diverse approaches for cryptocurrency acquisition.
- They target individuals and exchanges, showcasing their adaptability and determination for revenue generation.
Geopolitical Impact
- North Korean cyber activity has a significant geopolitical impact, funding missile tests and potentially influencing international conflicts.
- Their focus on cryptocurrency theft finances their regime's broader ambitions, elevating their importance on the global threat landscape.