Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: North Korean Cyber Group Splits to Target Multiple Sectors
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

North Korean Cyber Group Splits to Target Multiple Sectors

Highlights

  • North Korea's Labyrinth Chollima split into three focused cyber groups.

  • Espionage and cryptocurrency theft remain main objectives for the new entities.

  • CrowdStrike advises targeted defense strategies based on sector-specific risks.

Ethan Moreno
Last updated: 29 January, 2026 - 2:19 pm 2:19 pm
Ethan Moreno 1 hour ago
Share
SHARE

Contents
How Do Labyrinth Chollima and Its Offshoots Operate?What Is the Impact on International Security?What Is CrowdStrike’s Assessment?

Security analysts are closely watching as Labyrinth Chollima, a North Korea-linked cyber threat group active since 2009, has restructured into three differentiated entities, each assigned to specific operational roles. This move, revealed in a Thursday report by cybersecurity firm CrowdStrike, suggests a deliberate strategy to broaden North Korea’s reach in both espionage and financial cybercrime. Increasing specialization among these groups reflects shifting priorities and the need for adaptability in the evolving cybersecurity landscape.

CrowdStrike’s findings build on previous intelligence that associated many North Korean cyber activities with the broader Lazarus Group label. However, recent investigations indicate a clearer division of labor than was observed in earlier years, highlighting more distinct malware toolsets and objectives among North Korea-linked outfits. The emergence of Golden Chollima and Pressure Chollima, which have operated in parallel with Labyrinth Chollima since 2020, marks a shift towards more targeted attacks and complex cooperative structures. Recent incidents, such as major cryptocurrency thefts, further illustrate these groups’ technical advancement and adaptive tactics.

How Do Labyrinth Chollima and Its Offshoots Operate?

Labyrinth Chollima, originally responsible for diverse cyber operations, has shifted its primary focus to espionage by targeting sectors including manufacturing, logistics, defense, and aerospace. The new offshoots, Golden Chollima and Pressure Chollima, are primarily involved in large-scale theft of cryptocurrency, with part of their gains believed to support North Korea’s broader cyber agendas. Shared tools and infrastructure between the three entities point to some level of centralized coordination, though increasing specialization enhances their respective missions.

What Is the Impact on International Security?

The divergence among these groups allows North Korea to multiply its cyber influence, impacting a range of industries globally. Labyrinth Chollima has been linked to recent intrusions into European aerospace and U.S. critical infrastructure, including targets like hydroelectric power providers. Employment-themed social engineering tactics have also been employed, illustrating the group’s adaptability in luring victims. Golden Chollima and Pressure Chollima’s crypto-targeted campaigns present heightened risks for global financial systems, especially as North Korea seeks alternative revenue streams amid ongoing sanctions.

What Is CrowdStrike’s Assessment?

CrowdStrike currently tracks a total of eight threat groups tied to North Korea, with the inclusion of these newly distinct teams. The firm expects the cryptocurrency-focused groups to escalate activities due to financial pressures facing North Korea.

“What we’re seeing down range is now aligned with what we’ve seen from a bureaucratic perspective up range,”

stated Adam Meyers, CrowdStrike’s head of counter adversary operations. He also noted,

“You need to know who the threats are to your specific industry and geolocation, because you can’t defend against all the threats all the time.”

CrowdStrike has presented indicators of compromise and malware samples to help potential targets recognize these evolving tactics.

Recent research and industry tracking confirm that Labyrinth Chollima and its counterparts have demonstrated increasing sophistication, with tactics evolving from broad-spectrum attacks to niche operations. Compared to earlier attributions when analysts often grouped North Korea’s cyber efforts under the umbrella of the Lazarus Group, newer reporting distinguishes between specific operational objectives and technical methods. These insights help clarify the landscape for defenders, urging more customized defensive postures and sector-specific monitoring.

Labyrinth Chollima’s split demonstrates how nation-state cyber groups can improve effectiveness by pursuing specialized missions. For organizations at risk, awareness of sector-specific threats and constant updating of threat intelligence are crucial to defense. Companies in finance, defense, and infrastructure may benefit from partnerships with cybersecurity firms such as CrowdStrike to access timely threat indicators. Distinguishing between espionage-motivated and financially driven actors enables more focused responses and better allocation of resources. As North Korea’s cyber strategy evolves, staying informed and vigilant remains essential for minimizing the impact of these operations.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Hackers Bypass FortiCloud SSO, Target Fortinet Security Products

Cybercriminals and State Groups Target WinRAR Vulnerability, Google Confirms

Experts Question CISA’s Quantum-Resistant Tech Guidance for Agencies

Cybercriminals Use Voice-Phishing to Breach SSO Accounts and Demand Ransom

Researchers Warn ChatGPT Extensions Steal User Data and Credentials

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article AT&T Offers Complete IoT Solution for Businesses on AWS Marketplace

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

AT&T Offers Complete IoT Solution for Businesses on AWS Marketplace
IoT
Tesla Ends Model S and Model X Production, Shifts to Optimus Robot
Electric Vehicle
Tesla Ends Model S and X, Focuses on Robotaxi and Optimus Growth
Electric Vehicle
Analysts Project Only a Few Companies Will Deploy Humanoid Robots by 2028
Robotics
Tesla Invests $2 Billion in xAI to Advance AI Goals
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?