Insider Threats (DPRK)
Authored by:
This framework serves as an entry point to understanding the organizational and personal risks related to "Insider Threats," most commonly (though not exclusively) associated with "DPRK IT Workers" - the North Korean hacker-freelancers. This framework is targeted at projects affected by insider threat actors as well as projects wanting to harden their posture against these actors.
Throughout this module, we will discuss:
- Who insider threat actors are and what they do
- How to recognize insider threat actors
- How to interact with a potential threat actor
- How to mitigate the risks and impact of insider threat actors
- How to harden your defenses against insider threat actors
- Potential consequences of insider threats for you and your organization
Table of Contents
- General Information
- Techniques, Tactics, and Procedures
- Mitigating DPRK IT Workers
- Case Studies
- Summary
Overview of risks to your organization
- Defrauding the company: The company is paying someone whose identity they do not know.
- Subpar operational security: DPRK IT workers share credentials among themselves in open channels, have a poor command of Git, and unintentionally or intentionally leak the access they are granted to third parties.
- Extortion: They may try to extort more money after a job is finished.
- Future hacking activities: They may use the knowledge gained for future hacking activities.
- Sanctions violations: The DPRK is a sanctioned entity. No company can legally transfer funds to DPRK-related operations.
- Contribution to the North Korean Military: DPRK IT worker salaries directly contribute to the Military Ministry of North Korea. The workers do not keep the salaries for themselves.
- Supply-chain compromise: DPRK IT Workers may intentionally introduce vulnerabilities that impact down-stream projects that depend on your software / services (e.g. SafeWallet UI in the ByBit hack).
- Reputational damage: To your brand and loss of trust of your users and customers.
- Asset freeze / loss of access to financial services: your assets may be frozen or seized, and financial institutions (e.g. banks, exchanges) may terminate your access if you are suspected of funding sanctioned entities.
- Criminal investigations: Law enforcement may investigate your involvement and impose fines or press criminal charges against your organization.