Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 14, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 14, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 14, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 14, 2025

      I test a lot of AI coding tools, and this stunning new OpenAI release just saved me days of work

      May 14, 2025

      How to use your Android phone as a webcam when your laptop’s default won’t cut it

      May 14, 2025

      The 5 most customizable Linux desktop environments – when you want it your way

      May 14, 2025

      Gen AI use at work saps our motivation even as it boosts productivity, new research shows

      May 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Strategic Cloud Partner: Key to Business Success, Not Just Tech

      May 14, 2025
      Recent

      Strategic Cloud Partner: Key to Business Success, Not Just Tech

      May 14, 2025

      Perficient’s “What If? So What?” Podcast Wins Gold at the 2025 Hermes Creative Awards

      May 14, 2025

      PIM for Azure Resources

      May 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 24H2’s Settings now bundles FAQs section to tell you more about your system

      May 14, 2025
      Recent

      Windows 11 24H2’s Settings now bundles FAQs section to tell you more about your system

      May 14, 2025

      You can now share an app/browser window with Copilot Vision to help you with different tasks

      May 14, 2025

      Microsoft will gradually retire SharePoint Alerts over the next two years

      May 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Kim Jong Un Now has a Cyber Army of 8,400 Hackers, South Korean Intelligence Reportedly Said

    Kim Jong Un Now has a Cyber Army of 8,400 Hackers, South Korean Intelligence Reportedly Said

    July 31, 2024

    North Korea’s cyber capabilities are expanding at an alarming rate, posing a significant threat to global security. Local media in South Korea citing a recent intelligence report, confirmed that the reclusive nation has bolstered its cyber workforce by 20% in just two years, bringing the total number of hackers to a staggering 8,400. This number stood at 6,800 personnel, as per the Defense Whitepaper 2022.

    This rapid growth, fueled by economic desperation and Kim Jong Un’s strategic vision, has transformed cyber warfare into a cornerstone of the regime’s ambitions.

    North Korea’s ‘Hacker University’

    The Reconnaissance General Bureau, the regime’s intelligence arm, is at the heart of this cyber expansion. Operating under the direct supervision of Kim Jong Un, the bureau has established a “hacker university” to cultivate a new generation of cyber talent. By relaxing strict social hierarchies, North Korea has opened up opportunities for individuals from all walks of life to join the program, creating a deep pool of potential recruits.

    Jong Un reportedly instructed to not consider background while training hackers and select only talented individuals. In North Korea, social status, such as residence and occupation, is usually strictly determined based on bloodline, but he declared that exceptions would be made for only those who join the hacking training program. Pyongyang’s leadership is on the lookout of young math and computer talents to lead them down the path of cybercrime.

    The regime’s motivation is clear: financial gain. With international sanctions crippling the North Korean economy, cybercrime has emerged as a critical revenue stream. Hacking groups such as Lazarus and Kimsuky, linked to the Reconnaissance General Bureau, have become notorious for their audacious attacks, targeting everything from cryptocurrency exchanges to government agencies. The proceeds from these cyberheists are funneled directly into the regime’s nuclear and missile programs.

    A senior intelligence source referring to the mount of money that hacking can bring, assessed that “the North Korean leadership has high expectations [from these hackers].”

    Developing Malware with Russia?

    The burgeoning partnership between North Korea and Russia is another cause of serious concerns. The recent signing of a comprehensive strategic partnership treaty, which includes provisions for cooperation in information and communications technology security, suggests a formal framework for cyber collaboration. The intelligence authorities believe that the two have already laid the foundation for joint research and mutual education on hacking technology through this treaty. 

    A government source said, “It appears that North Korea and Russia are jointly developing or sharing core malware used in hacking.” This alliance could lead to a dangerous exchange of expertise and resources, potentially elevating the threat level posed by both nations.

    Experts warn that North Korea’s cyber tactics are becoming increasingly sophisticated and aggressive. The regime is no longer content with targeting specific, high-value targets. Instead, it is adopting a broader, more indiscriminate approach, casting a wider net in search of vulnerable systems. This shift in strategy, coupled with the rapid growth of its cyber workforce, makes North Korea a formidable and unpredictable adversary in the digital realm. 

    As North Korea continues to invest heavily in its cyber capabilities, the international community must remain vigilant. Developing robust cybersecurity defenses, sharing intelligence, and imposing stricter sanctions on the regime are essential steps in mitigating this growing threat.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAmerican States Move to Limit Liability for Healthcare Organizations in Data Breaches
    Next Article Justice Department Appeals Against Former BreachForums Owner Conor Fitzpatrick’s Light Sentencing

    Related Posts

    Machine Learning

    Georgia Tech and Stanford Researchers Introduce MLE-Dojo: A Gym-Style Framework Designed for Training, Evaluating, and Benchmarking Autonomous Machine Learning Engineering (MLE) Agents

    May 15, 2025
    Machine Learning

    A Step-by-Step Guide to Build an Automated Knowledge Graph Pipeline Using LangGraph and NetworkX

    May 15, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    A Deep Dive into YouTube’s Layout 2.0

    Development

    Over 8 billion game hours were spent with Blizzard in 2024

    Development

    How is AI Transforming Customer Experience in Banking

    Development

    Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks

    Development

    Highlights

    5 Chromecast features you’re not using enough on your TV (including a smart home buff)

    March 18, 2025

    Google’s reliable casting device has been around for over a decade, and while it will…

    How Bill Gates, the Altair 8800 and BASIC propelled me into the PC revolution

    April 3, 2025

    How to check apps draining the most battery on Windows 11

    April 7, 2025

    This simple (and actually useful) AI tool is my favorite new Pixel feature (it’s in iOS 18, too)

    August 13, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.