- LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group.
- GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their operations; core LABYRINTH CHOLLIMA operations continue to focus on espionage, targeting industrial, logistics, and defense companies.
- Despite operating independently, these three adversaries share tools and infrastructure, indicating centralized coordination and resource allocation within the DPRK cyber ecosystem.
LABYRINTH CHOLLIMA is among the most prolific DPRK-nexus adversaries that CrowdStrike Intelligence tracks and is responsible for some of North Korea’s most notable intrusions including destructive attacks against South Korean and U.S. entities, and the global WannaCry ransomware incident.
CrowdStrike Intelligence assesses that three distinct, highly specialized operational subgroups have emerged since 2018, each with specialized malware, objectives, and tradecraft. This assessment reflects a comprehensive re-evaluation of historical data and a deliberate challenge to our previous LABYRINTH CHOLLIMA attribution framework. We now track these subgroups as GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and the core LABYRINTH CHOLLIMA group. Effective intelligence demands we constantly reassess established assumptions, relentlessly pursuing an objective, actionable depiction of the threat landscape.
LABYRINTH CHOLLIMA’s History and Evolution
LABYRINTH CHOLLIMA activity originates from the KorDLL malware framework (active 2009-2015), a source code repository containing implant templates, command-and-control (C2) protocols, libraries for common tasks, and code for various obfuscation techniques. This framework spawned several epoch-defining malware families, including Dozer, Brambul, Joanap, KorDLL Bot, and Koredos, and would evolve into the Hawup and TwoPence frameworks used by LABYRINTH CHOLLIMA and STARDUST CHOLLIMA, respectively.
GOLDEN CHOLLIMA
GOLDEN CHOLLIMA targets economically developed regions with significant cryptocurrency and fintech presence, including the U.S., Canada, South Korea, India, and Western Europe. The adversary typically conducts smaller-value thefts at a more consistent operational tempo, suggesting responsibility for ensuring baseline revenue generation for the DPRK regime.
The adversary’s malware originates with Jeus in 2018 (and its macOS variant, AppleJeus), which originally masqueraded as a cryptocurrency application purportedly developed by the fictitious company Celas Limited. CrowdStrike Intelligence has observed eight different Jeus and AppleJeus variants in campaigns targeting cryptocurrency entities as well as shellcode overlaps between PipeDown, DevobRAT, HTTPHelper, and Anycon — forming a specialized fintech targeting toolkit.
GOLDEN CHOLLIMA’s recent operations demonstrate cloud-focused tradecraft. In late 2024, the adversary delivered malicious Python packages via recruitment fraud to a European fintech company. They pivoted to the victim’s cloud environment to access IAM configurations and associated cloud resources, and ultimately managed to divert the victim’s cryptocurrency to adversary-controlled wallets.
CrowdStrike Intelligence has also observed GOLDEN CHOLLIMA leveraging Chromium zero-days to deliver malware, and CrowdStrike OverWatch threat hunting detected several deployments of SnakeBaker and its JS variant NodalBaker at fintech firms throughout June 2025.
PRESSURE CHOLLIMA
PRESSURE CHOLLIMA conducted the DPRK’s highest-profile cryptocurrency heists, including the two largest cryptocurrency thefts on record. Public reporting links additional high-value thefts ranging from $52 million USD to $120 million USD to PRESSURE CHOLLIMA based on reused cryptocurrency wallets.2
Unlike GOLDEN CHOLLIMA’s consistent operations, PRESSURE CHOLLIMA pursues high-payout opportunities regardless of geography, focusing on organizations with significant digital asset holdings. PRESSURE CHOLLIMA deploys sophisticated, low-prevalence implants and has evolved into one of the DPRK’s most technically advanced adversaries.
PRESSURE CHOLLIMA operations likely diverged from LABYRINTH CHOLLIMA in February 2019 with experimental SwDownloader deployment, quickly replaced by SparkDownloader (tracked publicly as TraderTraitor). Recent campaigns leverage malicious Node.js and Python projects to deliver Scuzzyfuss and TwoPence Electric malware.
LABYRINTH CHOLLIMA Moving Forward
CrowdStrike Intelligence now tracks LABYRINTH CHOLLIMA more narrowly as espionage operations using malware with a Hoplight lineage. Modern LABYRINTH CHOLLIMA operations emerged in 2020, coinciding with GOLDEN and PRESSURE CHOLLIMA’s divergence, likely indicating that blockchain malware experts and intelligence collection specialists moved into separate units.
The 2022 emergence of FudModule represents a significant development for LABYRINTH CHOLLIMA’s malware capabilities. FudModule employs direct kernel manipulation for stealth and has leveraged zero-day exploits in vulnerable drivers, Chrome, and Windows. GOLDEN CHOLLIMA has also reportedly used FudModule, indicating shared tool access despite operational separation.3
LABYRINTH CHOLLIMA operations prioritize targets in the manufacturing and defense sectors, particularly European defense entities and U.S., Japanese, and Italian manufacturing organizations. Throughout 2024 and into 2025, LABYRINTH CHOLLIMA persistently targeted European aerospace corporations using employment-themed lures and exploited zero-day vulnerabilities against defense manufacturers. In the first half of 2025, CrowdStrike Intelligence also observed a growing interest by LABYRINTH CHOLLIMA in logistics and shipping companies. The adversary has also targeted U.S.-based manufacturing companies, including critical infrastructure entities in specialized areas such as hydroelectric power.
LABYRINTH CHOLLIMA’s 2025 operations have demonstrated diverse delivery mechanisms. WhatsApp messaging — which the adversary has used to deliver malicious ZIP files containing trojanized applications — has emerged as a primary initial compromise vector. Likely due to the method’s high success rate, the adversary has used employment-themed social engineering in multiple campaigns, tailoring lures to target specific industries and roles.
Outlook
CrowdStrike Intelligence assesses these three groups very likely operate as distinct organizational units within the DPRK cyber apparatus. This assessment is made with high confidence and supported by specialized malware development, distinct targeting patterns, and differences in operational tempo.
Shared infrastructure elements and tool cross-pollination indicate these units maintain close coordination. All three adversaries employ remarkably similar tradecraft — including supply chain compromises, HR-themed social engineering campaigns, trojanized legitimate software, and malicious Node.js and Python packages — that reflects their common origins in the KorDLL and Hawup frameworks.
LABYRINTH CHOLLIMA’s segmentation into specialized operational units represents a strategic evolution that enhances the DPRK regime’s ability to simultaneously pursue multiple objectives.
The financial motivation for GOLDEN CHOLLIMA and PRESSURE CHOLLIMA operations will likely intensify as international sanctions continue to cripple the DPRK’s economy. Despite improving trade relations with Russia, the DPRK requires additional revenue to fund ambitious military plans that include constructing new destroyers, building nuclear-powered submarines, and launching additional reconnaissance satellites.4
These three adversaries remain fundamentally interconnected through shared tactical DNA and collaborative infrastructure. The cross-pollination of tools such as FudModule in GOLDEN CHOLLIMA and LABYRINTH CHOLLIMA operations, combined with malware families’ code similarities among these adversaries, demonstrates how these adversaries continue to operate as components of a unified strategic apparatus despite their distinct mission sets.
Organizations in the cryptocurrency, fintech, defense, and logistics sectors should practice heightened vigilance for DPRK social engineering campaigns, particularly employment-themed lures and trojanized legitimate software delivered via messaging platforms.
Recommendations
These recommendations are designed to help protect against the activity described and are customized to address the specific tradecraft and objectives of GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and LABYRINTH CHOLLIMA.
Mitigate Social Engineering
- Implement strict validation for all incoming communication, especially for job-related or external inquiries. Train employees to be highly suspicious of unsolicited messages via platforms like WhatsApp and unexpected recruitment emails containing attachments or links to trojanized software.
- Enforce a security policy that prohibits the download and execution of software from untrusted sources, particularly third-party versions of legitimate software like SumatraPDF or TightVNC clients.
- Address supply chain and open-source abuse:
- Scan and vet all third-party and open-source dependencies (e.g., malicious Node.js and Python packages) before deployment. Utilize tools that analyze package metadata, author reputation, and code for malicious or obfuscated functionality.
- Implement software supply chain security practices to monitor for unauthorized changes in build and deployment environments.
Cloud and Identity Security
- Monitor CloudTrail and GuardDuty logs for suspicious activity related to the adversary’s common post-compromise actions, such as:
- Unusual usage of the cloud environment command line interface.
- Abnormal enumeration or modification of cloud-based identity and access management (IAM) users, roles, or policies.
- Unexpected access patterns to cloud file storage, Kubernetes clusters, and cloud compute instances.
- Enforce the principle of least privilege across all cloud-based IAM users and service roles to limit the blast radius of a compromised credential.
- Implement multifactor authentication (MFA) for all cloud accounts, especially for root and administrative users.
General Recommendations
- Patch management:
- Prioritize the patching of known remote code execution (RCE) and server-side request forgery (SSRF) vulnerabilities, particularly in public-facing applications and commonly targeted software like web browsers (e.g., Chromium).
- Maintain all operating systems, hypervisors, drivers, and edge devices at a recent, supported software level to mitigate zero-day exploitation of kernel-level vulnerabilities (e.g., FudModule).
- Cryptocurrency defense:
- For organizations dealing with digital assets, implement multi-signature wallet requirements and time-locked transfers to increase the difficulty and detection time for large-scale crypto thefts.
- Isolate cryptocurrency management systems from the corporate network and apply the most stringent security controls to these environments.
IOCs
Exemplar samples of malware mentioned in this blog are provided below to enable community tracking of GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and LABYRINTH CHOLLIMA activity.
| Malware | Attribution | Exemplar SHA256 Hash |
| Dozer | LABYRINTH CHOLLIMA | 7dee2bd4e317d12c9a2923d0531526822cfd37eabfd7aecc74258bb4f2d3a643 |
| Brambul | LABYRINTH CHOLLIMA | d2359630e84f59984ac7ddebdece9313f0c05f4a1e7db90abadfd86047c12dd6 |
| Joanap | LABYRINTH CHOLLIMA | 4fe3c853ab237005f7d62324535dd641e1e095d1615a416a9b39e042f136cf6b |
| KorDLL Bot | LABYRINTH CHOLLIMA | 73edc54abb3d6b8df6bd1e4a77c373314cbe99a660c8c6eea770673063f55503 |
| Koredos | LABYRINTH CHOLLIMA | a795964bc2be442f142f5aea9886ddfd297ec898815541be37f18ffeae02d32f |
| Hawup RAT | LABYRINTH CHOLLIMA | 453d8bd3e2069bc50703eb4c5d278aad02304d4dc5d804ad2ec00b2343feb7a4 |
| Hoplight | LABYRINTH CHOLLIMA | 05feed9762bc46b47a7dc5c469add9f163c16df4ddaafe81983a628da5714461 |
| Manuscrypt | LABYRINTH CHOLLIMA | dced1acbbe11db2b9e7ae44a617f3c12d6613a8188f6a1ece0451e4cd4205156 |
| HTTPHoplight | LABYRINTH CHOLLIMA | ceccb2339088fa2d6337082704bbf67f84eeb0d0b60ce5ab0ab7e1824002fa4c |
| OpenSSL Downloader | LABYRINTH CHOLLIMA | f749c7e84809ffc3939eaed06ad90e15b0e11375f98d7348c0aa1bf35d3f0b8e |
| UnderGroundRAT | LABYRINTH CHOLLIMA | f9586fdf4e0a65b17ee32bc3c3f493a055409abde373720d594d27fd24adffa0 |
| NedDnLoader | LABYRINTH CHOLLIMA | 512877c98fd83cd51bb287da4462b44f9d276d7ce51890f4ded1b915a6d2d5e1 |
| Stackeyflate | LABYRINTH CHOLLIMA | d2e743216d17e97c8d1913d376d46095b740015f26a3c62a05e286573721d26c |
| HiberRAT | LABYRINTH CHOLLIMA | 58f2972c6a8fc743543f7b8c4df085c5cf2c6e674e5601e85eec60cd269cfb3c |
| WinWebDown | LABYRINTH CHOLLIMA | fc885b323172106ab6f2f0cc77b609987384a38e3af41ad888d5389610d29daf |
| FudModule | LABYRINTH CHOLLIMA, GOLDEN CHOLLIMA | cbd1634cf7c638f2faf5e3ec79137db6704ec9de8df798fc46aeeed38de3da9b |
| Scuzzyfuss | PRESSURE CHOLLIMA | b9f6a9d4f837f5b8a5dc9987a91ba44bc7ae7f39aa692b5b21dba460f935a0ae |
| MataNet | PRESSURE CHOLLIMA | 357c9daf6c4343286a9a85a27bc25defdc056877ce1be2943d2e8ede3bce022c |
| SwDownloader | PRESSURE CHOLLIMA | a61ecbe8a5372c85dcf5d077487f09d01e144128243793d2b97012440dcf106e |
| SparkDownloader | PRESSURE CHOLLIMA | 9ba02f8a985ec1a99ab7b78fa678f26c0273d91ae7cbe45b814e6775ec477598 |
| TwoPence Electric | PRESSURE CHOLLIMA | 081804b491c70bfa63ecdbe9fd4618d3570706ad8b71dba13e234069648e5e48 |
| MagikCookie | PRESSURE CHOLLIMA | 1579347265f948f9646931335d57e7960fe65dd429394be84b4ae15bca73dfde |
| StatusSymbol | PRESSURE CHOLLIMA | 666c50b8b772101b0e2e35ff1de52a278c2727027b54858e457571d296fec50b |
| GhostShip | PRESSURE CHOLLIMA | 56e51244e258c39293463c8cf02f5dddb085be90728fab147a60741cf014aa4d |
| AlertConf | PRESSURE CHOLLIMA | e0aa5ef3af26681a8c8b46d95656580779d0ff3c2fe531b95a59ee918686e443 |
| Jeus | GOLDEN CHOLLIMA | fe948451df90df80c8028b969bf89ecbf501401e7879805667c134080976ce2e |
| HTTPHelper | GOLDEN CHOLLIMA | ff32bc1c756d560d8a9815db458f438d63b1dcb7e9930ef5b8639a55fa7762c9 |
| SnakeBaker | GOLDEN CHOLLIMA | b6995c31a7ee88392fc25fd6d1a3a7975b3cb4ec3a9a318c3fcfaaf89eb65ce1 |
| NodalBaker | GOLDEN CHOLLIMA | 0518a163b90e7246a349440164d02d10f31d514a7e5cce842b6cf5b3a0cc1bfa |
| PipeDown | GOLDEN CHOLLIMA | 2ef212f433b722b734d80b41a2364a41ca0453dbfe3e6ec8b951eca795075a02 |
| DevobRAT | GOLDEN CHOLLIMA | fde50c3a373ebc2661e08c99c1cb50dc34efc022a3880c317ab5b84108ef83aa |
| Anycon | GOLDEN CHOLLIMA | 2110a6e89d98a626f846ec8deccbac057300d194933ae0cbf1ef4831a4cc829e |
| CitriLoader | GOLDEN CHOLLIMA | d0cf9c1f87eac9b8879684a041dd6a2e1a0c15e185d4814a51adda19f9399a9b |
Sources
1. https://reports.dtexsystems.com/DTEX-Exposing+DPRK+Cyber+Syndicate+and+Hidden+IT+Workforce.pdf
2. https://www.halborn.com/blog/post/explained-the-bingx-hack-september-2024 || https://www.halborn.com/blog/post/explained-the-phemex-hack-january-2025
4. https://www.reuters.com/business/aerospace-defense/new-pier-completed-north-korea-rocket-launch-site-satellite-imagery-shows-2025-07-17/ || https://kcnawatch.org/newstream/1753150192-897597368/let-us-remain-true-to-our-partys-line-of-building-military-giant-by-building-mighty-new-type-warship-nampho-shipyard-vows-to-build-choe-hyon-class-destroyer-no-3-till-wpk-founding-anniversary-of-nex/




