- North Korea has established a new piracy department of AI
- The new group will be called ‘Research Center 227’
- North Korea carried out many cyber offensives in 2024, including a false interview campaign
The Democratic Popular Republic of Korea (North Korea) has established the “Research Center 227” according to reports from NK daily.
According to reports, this research center plans to operate “throughout the day” to immediately respond to real -time information from North Korea’s intelligence agencies.
“At the end of February, the Supreme Commander issued an order to the RGB under the Department of General Personnel to improve information war abilities abroad. This order included instructions to establish the 227 Research Center for the investigation of piracy technology.” NK daily.
Persistent operations
It is likely that the research center will focus on “strengthening piracy capacities” and developing piracy technologies and programs to neutralize Western cyber security systems and critical infrastructure.
These offensives will mainly aim to steal information and interrupt adverse computer networks.
According to the reports, the center will recruit around 90 computers and graduates of high -profile university and doctoral programs, confirmed the source;
“These are not cyber warriors who directly carry out information war of information in foreign locations, but the internal research personnel who develop offensive programs. With the establishment of the 227 Research Center, the Cybernetic Operational Capabilities of RGB will be strengthened significantly in the future.”
Cybernetic operations in North Korea have been launched more and more in recent times, especially the notorious group of Lázaro, which has been observed spreading malware through several large -scale attacks and the deployment of infants infants to obtain credentials from Western organizations.
In particular, North Korea computer pirates have been executing the ‘contagious interview’ campaign with false interviews or job ads that require victims to download malware disguised as videoconference software.
A series of cybercriminals who falsify their identities to assume software work are also included in this campaign, most likely to obtain access to critical services and information systems from large western companies or other fraudulent behavior.