RUSI JournalVOLUME 170ISSUE 4members only

How DPRK IT Workers Exploit Identity Management Vulnerabilities

Illegal cyber operations – such as ransomware attacks, cryptocurrency theft and financial network exploitation – provide 40% of DPRK’s WMD revenue. Courtesy of Mykhailo Polenok/Alamy

Illegal cyber operations – such as ransomware attacks, cryptocurrency theft and financial network exploitation – provide 40% of DPRK’s WMD revenue. Courtesy of Mykhailo Polenok/Alamy


North Korean IT workers exploit vulnerabilities to generate illicit revenues and undermine global financial integrity.

Please wait while we verify your account can view this article.


WRITTEN BY

Chandana Seshadri

Former Research Analyst, Counter Proliferation Financing

View profile

Footnotes


Explore our related content