North Korea's LABYRINTH CHOLLIMA Splinters into Three Specialized Cyber Units

North Korea's LABYRINTH CHOLLIMA Splinters into Three Specialized Cyber Units

CrowdStrike Intelligence has reclassified LABYRINTH CHOLLIMA, the North Korean threat group behind the 2017 WannaCry ransomware attack, into three distinct operational units with specialized missions, malware, and targeting patterns.

The new attribution framework recognizes GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and a narrower core LABYRINTH CHOLLIMA group as separate adversaries that emerged between 2018-2020.

Source: Crowdstrike

The Three Groups

GOLDEN CHOLLIMA focuses on consistent, smaller-value cryptocurrency thefts targeting fintech and crypto entities in the U.S., Canada, South Korea, India, and Western Europe. The group likely provides baseline revenue generation for the North Korean regime.

Key capabilities include cloud-focused tradecraft, Chromium zero-day exploitation, and malware families like Jeus/AppleJeus, SnakeBaker, and NodalBaker. In late 2024, the group compromised a European fintech company through recruitment fraud, pivoted to cloud infrastructure, and diverted cryptocurrency to DPRK-controlled wallets.

PRESSURE CHOLLIMA conducts high-profile, high-value cryptocurrency heists regardless of geography—including the two largest cryptocurrency thefts on record. The group deploys sophisticated, low-prevalence implants and has evolved into one of the DPRK's most technically advanced adversaries.

LABYRINTH CHOLLIMA (core group) now focuses narrowly on espionage operations targeting manufacturing, defense, logistics, and critical infrastructure. Throughout 2024-2025, the group persistently targeted European aerospace corporations and defense manufacturers using employment-themed lures and zero-day exploits. Recent targeting includes logistics companies and U.S. critical infrastructure entities in specialized areas like hydroelectric power.

Source: Crowdstrike

Shared Origins, Separate Missions

All three groups trace their lineage to the KorDLL malware framework (2009-2015), which spawned epoch-defining malware including Dozer, Brambul, Joanap, and eventually the Hawup framework used by modern LABYRINTH CHOLLIMA operations.

Despite operational separation, the groups share tools and infrastructure. FudModule, a rootkit employing direct kernel manipulation and zero-day exploits, has been observed in both LABYRINTH CHOLLIMA and GOLDEN CHOLLIMA operations—indicating centralized coordination within the DPRK cyber ecosystem.

Common Tradecraft

All three adversaries employ similar techniques reflecting their shared origins:

  • Supply chain compromises
  • HR and recruitment-themed social engineering
  • Trojanized legitimate software
  • Malicious Node.js and Python packages
  • WhatsApp as an initial compromise vector

Why This Matters

The segmentation represents a strategic evolution allowing North Korea to simultaneously pursue revenue generation (GOLDEN and PRESSURE CHOLLIMA) and intelligence collection (core LABYRINTH CHOLLIMA). CrowdStrike assesses financial motivation will intensify as international sanctions continue, with the regime requiring funds for military projects including new destroyers, nuclear submarines, and reconnaissance satellites.

Targeted Sectors

GroupPrimary Targets
GOLDEN CHOLLIMACryptocurrency, fintech
PRESSURE CHOLLIMAHigh-value digital asset holders
LABYRINTH CHOLLIMADefense, aerospace, manufacturing, logistics

Indicators of Compromise

Selected Malware Hashes (SHA-256):

LABYRINTH CHOLLIMA:

FudModule: cbd1634cf7c638f2faf5e3ec79137db6704ec9de8df798fc46aeeed38de3da9b
Hoplight: 05feed9762bc46b47a7dc5c469add9f163c16df4ddaafe81983a628da5714461
Manuscrypt: dced1acbbe11db2b9e7ae44a617f3c12d6613a8188f6a1ece0451e4cd4205156

PRESSURE CHOLLIMA:

Scuzzyfuss: b9f6a9d4f837f5b8a5dc9987a91ba44bc7ae7f39aa692b5b21dba460f935a0ae
SparkDownloader: 9ba02f8a985ec1a99ab7b78fa678f26c0273d91ae7cbe45b814e6775ec477598
TwoPence Electric: 081804b491c70bfa63ecdbe9fd4618d3570706ad8b71dba13e234069648e5e48

GOLDEN CHOLLIMA:

Jeus: fe948451df90df80c8028b969bf89ecbf501401e7879805667c134080976ce2e
SnakeBaker: b6995c31a7ee88392fc25fd6d1a3a7975b3cb4ec3a9a318c3fcfaaf89eb65ce1
NodalBaker: 0518a163b90e7246a349440164d02d10f31d514a7e5cce842b6cf5b3a0cc1bfa

Recommendations

  • Train employees to recognize recruitment-themed social engineering, particularly via WhatsApp and unsolicited job offers
  • Prohibit execution of software from untrusted sources
  • Vet all third-party Node.js and Python dependencies before deployment
  • Monitor cloud environments for unusual IAM enumeration or modification
  • Implement multi-signature wallets and time-locked transfers for cryptocurrency operations
  • Prioritize patching of RCE and SSRF vulnerabilities in public-facing applications

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire