Part 7/12:
Expansion into Security-Cleared Sectors: The goal may shift from simple monetary gain to more strategic infiltration into sectors with national security implications.
Potential for Kinetic or Cyber Warfare: As operations evolve, the regime could leverage stolen credentials or native operatives to launch disruptive cyberattacks or other actions.
Even current activities, like stealing cryptographic assets or sensitive data, contribute to North Korea’s arsenal, and the shadowy operations may expand if undetected.
Gaps in Corporate and Government Defense
A recurring theme in the discussion is the underestimation or lack of awareness among companies: