Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Labyrinth Chollima Evolves into Three North Korean Hacking Groups
News

Labyrinth Chollima Evolves into Three North Korean Hacking Groups

Team-CWDBy Team-CWDJanuary 30, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


One of the most prolific North Korean-linked cyber threat groups, Labyrinth Chollima, has recently evolved to make to three distinct hacking groups, according to CrowdStrike.

In a new blog published on January 29, the cybersecurity giant said the three groups will now be tracked as Labyrinth Chollima, Golden Chollima and Pressure Chollima.

The firm assessed “with high confidence” that while Labyrinth Chollima continues to focus on cyber espionage, targeting industrial, logistics and defense companies, the other groups have shifted towards targeting cryptocurrency entities.

Each group is using distinct toolsets in their malware campaigns, according to CrowdStrike. The toolsets are all evolutions of the same malware framework used by Labyrinth Chollima in the 2000s and 2010s.

However, the CrowdStrike threat intelligence analysts said that despite now operating independently, these three adversaries still share tools and infrastructure, indicating centralized coordination and resource allocation within the North Korean cyber ecosystem.

Labyrinth Chollima, One of Many Lazarus Aliases

Labyrinth Chollima (also known as UNC4034 and Temp.Hermit) is one of the most active cyber threat groups attributed to North Korea.

According to CrowdStrike, the group is responsible for some of North Korea’s most notable intrusions, including destructive attacks against South Korean and US entities and the global WannaCry ransomware incident. 

While some of the group’s past operations have been attributed to the Lazarus Group, it now seems that most cyber threat intelligence analysts have abandoned this latter name as it encompasses too many distinct teams within North Korean attributed hacking ecosystem.

For example, the entry for the Lazarus Group on Malpedia, a cyber threat intelligence repository maintained by Germany’s Fraunhofer research institute, lists 42 different aliases, highlighting how broadly the name has been applied to distinct North Korean hacking teams.

Labyrinth Chollima’s Beginnings and Stardust Chollima Emergence

CrowdStrike started tracking the Labyrinth Chollima group as a distinct cyber hacking group tied to the North Korean regime when it discovered the KorDLL malware framework used in the wild between 2009 and 2015.

KorDLL is a source code repository containing implant templates, command-and-control (C2) protocols, libraries for common tasks and code for various obfuscation techniques.

This framework “spawned several epoch-defining malware families, including Dozer, Brambul, Joanap, KorDLL Bot and Koredos,” said CrowdStrike.

It later evolved into the Hawup and TwoPence malware frameworks, which led CrowdStrike to split Labyrinth Chollima into two groups: Labyrinth Chollima, which used the Hawup framework and Stardust Chollima, which used the TwoPence framework and its evolved versions.

Labyrinth Chollima, Golden Chollima and Pressure Chollima

Today, CrowdStrike is sharing a new evolution of the Hawup framework into three distinct versions. These include the Hoplight framework used by Labyrinth Chollima, the Jeus framework used by Golden Chollima and the MataNet framework used by Pressure Chollima alongside the TwoPence framework.

Aside from using distinctive tooling, the three groups also differ in their targeting and techniques, tactics and procedures (TTPs):

  • Golden Chollima focuses on consistent, smaller-scale cryptocurrency thefts in fintech-heavy regions using cloud-focused tradecraft and recruitment fraud lures
  • Pressure Chollima pursues high-value, opportunistic crypto heists globally with advanced, low-prevalence implants
  • Labyrinth Chollima conducts espionage against defense, manufacturing and critical infrastructure sectors via zero-days, employment-themed lures, and kernel-level malware



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order
Next Article Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.