Skip to main content
Privacy 3 min read

North Korea-backed cyber group prying into critical US infrastructure!

Brad Slavin
Brad Slavin General Manager
Updated August 22, 2025

Quick Answer

A North Korea-backed cyber-espionage group, tracked as Andariel by US agencies, APT45 by Google Mandiant, and Onyx Sleet by Microsoft, is targeting US aerospace, defense, engineering, nuclear, and healthcare organizations to feed Pyongyang's military and nuclear programs and fund operations through ransomware. The group also targets Japan, India, and South Korea. Stolen material includes data on combat ships, self-propelled howitzers, tanks, autonomous underwater vehicles, missiles, fighter aircraft, radars, missile defense systems, nano-satellites, uranium processing and storage, robotics, shipbuilding, and 3D printing. The US has indicted Rim Jong Hyok over attacks on US Air Force bases and NASA, with a $10 million reward for information. CISA, FBI, and NSA have published a joint advisory noting Andariel has shifted from spear-phishing to vulnerability exploitation, then uses custom tools and malware for remote access, lateral movement, and exfiltration. Mandiant assesses the group active since 2009; Microsoft tracks it from 2014. Recommended defenses: harden email authentication, protect against web shells, and lock down remote access.

North Korea-backed cyber group prying into critical US infrastructure!

cybersecurity

A cyber-espionage group backed by North Korea has been sneaking into the vital intellectual property and technical information of the US. The group is a part of North Korea’s foreign intelligence service. From aerospace to defense, engineering companies to nuclear science, the group has been prying into critical infrastructures. Their core purpose is to amplify their North Korean military and nuclear programs. As per the US government, the group targets US healthcare centers and leverages ransomware to financially compensate the campaign.

The CISA (US Cybersecurity and Infrastructure Security Agency), the FBI, and the NSA (National Security Agency) are working together to combat this situation. As per their information, the North Korea-backed group is targeting the USA as well as other countries such as Japan, India, and South Korea.

The key player in this malicious campaign is Rim Jong Hyok. The US government has announced a $10 million reward to anyone who can bring valid information regarding Rim Jong Hyok’s arrest. Rim Jong Hyok is indicted with charges of cyberattacks on US air force bases and NASA.

cyberattack

The North Korean cyber campaign that goes by the name Andariel is eyeing broad and varied information this time. They have been accessing information related to defense departments such as combat ships, self-propelled howitzers, heavy and light tanks, autonomous underwater vehicles, and so on. 

From aerospace companies, Andariel is stealing information pertaining to missiles, fighter aircraft, radars, missile defense systems, nano-satellite, and so on. They are also prying into the nuclear sector for vital information related to material waste, uranium processing, storage, etc. Lastly, from engineering firms, the North Korean cyber group is stealing information such as robotics, shipbuilding, 3D printing, additive printing, etc.

Proper cybersecurity measures are being taken, such as strengthening email authentication, protection against web shells, and remote access protection

phishing protection

From Google’s Mandiant to Microsoft, everyone is tracking Andariel. The former believes that the cyber group has been active since 2009. As per the Microsoft team, Andariel has been active since 2014. 

Google Mandiant tracks Andariel as APT45 and has emphasized the group’s increasing ransomware attacks in recent times. Microsoft tracks Andariel as Onyx Sleet and has recently shared an update which focuses on the threat actor’s shift from spear-phishing to leveraging vulnerability exploits in order to gain illegitimate access to critical information of national importance.

As per the US government advisory__, Andariel is actively exploiting vulnerabilities to break into US defense and other critical sectors. As soon as they access a specific network, Andariel threat actors utilize different types of custom tools as well as malware in order to gain remote access, facilitate lateral movement, and eventually steal vital data. The advisory also mentions other tactics and strategies deployed by Andariel in detail. The core idea of releasing the advisory is to enable relevant authorities to take significant precautionary measures and protect critical information. The detailed advisory also contains signs that organizations can look up to in order to ensure that the threat actor is actually lurking on their systems and networks.

Topics

NewsSecurityUpdates
Brad Slavin
Brad Slavin

General Manager

General Manager at DuoCircle. Product strategy and commercial lead across the email security portfolio.

Secure your email infrastructure

Protect, authenticate, and deliver. Contact our team to find the right solution.