Hackers linked to North Korea’s Reconnaissance General Bureau recently played a pivotal role in a significant ransomware attack, marking a potential shift in tactics. According to Palo Alto Networks’ Unit42, North Korean actors affiliated with a group known as Jumpy Pisces collaborated with the financially driven Play ransomware group.
While details of the victim remain undisclosed, Unit42’s report suggests that this collaboration could signify North Korea’s increasing involvement in the ransomware landscape beyond espionage. Historically, North Korean actors focused primarily on state-sponsored cyber operations. However, Jumpy Pisces may now act as an initial access broker (IAB) or affiliate, leveraging ransomware infrastructure to exploit a broader spectrum of targets.
Tactical Shift and Increased Collaboration
Unit42’s investigation, prompted by a September incident response, revealed that North Korean actors accessed an organization’s systems months earlier, in May, via a compromised user account. Their methodical lateral movement included the deployment of DTrack malware—an infostealer with a history of use in North Korean cyber activities, which conceals stolen data within a GIF file. The Play ransomware was later deployed after an unidentified actor accessed the network using the same compromised account. The attackers escalated privileges, harvested credentials, and uninstalled EDR sensors before deploying Play ransomware.
This incident underscores Unit42’s assessment that Jumpy Pisces may be forging deeper connections with ransomware operators, either as affiliates or IABs, potentially signaling a growing trend of state-backed ransomware threats from North Korea.
Broader Implications: North Korea’s Growing Role in Ransomware Campaigns
The FBI reports that Play ransomware has impacted over 300 organizations since 2022, including attacks on European governments and municipalities across several U.S. states. The cooperation between North Korean operatives and Play ransomware could indicate a trend of state-sponsored cybercriminals collaborating more broadly with established ransomware networks.
Microsoft and other cybersecurity experts have observed an increasing convergence of nation-state and cybercriminal activities, particularly by actors from North Korea, Russia, and Iran. North Korea’s evolving role in ransomware activity mirrors similar tactics by Iranian hackers, who have monetized their access to victim networks by partnering directly with ransomware gangs.
Geopolitical Ransomware Tactics as Financial Strategy
Nation-states, notably Russia and Iran, have ramped up ransomware as a financial weapon. Microsoft notes that ransomware, which was once disguised as financially motivated, often served as a mask for more destructive objectives. Some ransomware gangs openly backed Russia amid the Ukraine invasion, and former members of the infamous Conti ransomware group repurposed tools to target Ukrainian entities.
China, too, has reportedly employed ransomware as a cover for espionage, while Iran has been implicated in monetizing access through ransomware partnerships. In some cases, Iranian hackers collaborated with ransomware groups to extort victims directly, rather than simply selling network access.
North Korean actors have similarly employed ransomware to advance state goals. The U.S. indicted North Korean national Rim Jong Hyok for using the Maui ransomware against American healthcare providers and defense contractors, illustrating the breadth of North Korean ransomware capabilities.
Conclusion: Rising Threats Demand Heightened Vigilance
As the line between nation-state operations and cybercriminal activities continues to blur, the potential for damaging ransomware campaigns grows. The collaboration between Jumpy Pisces and Play ransomware marks a significant development in North Korea’s cyber strategy, suggesting that nation-state threat actors may increasingly turn to ransomware not only for financial gain but also as a means to project influence and disrupt adversaries.
Cyber defenders should treat North Korean-linked ransomware activity as a precursor to potentially damaging attacks. With the scale and reach of these operations expanding, vigilance is essential to combat this rising threat.

