Category: State-Sponsored Cyber Operations / Nation-State Ransomware Deployment
Features: Ransomware use by traditionally espionage-focused APT, multi-stage malware deployment, misuse of legitimate cloud infrastructure for C2, targeted phishing
Delivery Method: Malicious archive attachments in spear-phishing emails, decoy postal code update message, staged payload delivery via PubNub-based C2
Threat Actor: ScarCruft (APT37) — operating under DPRK Ministry of State Security; subgroup ChinopuNK
ScarCruft, one of North Korea’s most active and enduring state-sponsored cyber-espionage units, has taken the unprecedented step of adding ransomware to its offensive toolkit — a departure from its long-standing intelligence-gathering doctrine.
The new strain, dubbed VCD for the file extension it appends, was deployed alongside a broad malware stack in a recent campaign, suggesting either a strategic pivot toward revenue generation or a dual-mission operation designed to both steal intelligence and disrupt targeted entities.
From Intelligence-First to Hybrid Operations
Traditionally, ScarCruft’s campaigns have targeted government agencies, think tanks, academics, journalists, and defense contractors — primarily in South Korea, Japan, Vietnam, Russia, and Nepal — with an emphasis on espionage and data exfiltration.
The introduction of ransomware into the latest campaign marks a hybridization of objectives that could signal a broader DPRK directive:
- Primary: Continue strategic data theft for the regime’s intelligence apparatus.
- Secondary: Generate cryptocurrency ransom payments to bypass international sanctions.
The Latest Campaign — Multi-Malware Precision
South Korean security firm S2W reports that the campaign began in July with targeted spear-phishing emails containing a malicious archive.
- Decoy theme: Postal code updates linked to street address changes — designed to appear as legitimate government communication.
- Initial infection: Archive extracts and launches a decoy document while deploying multiple malware payloads.
- Malware observed:
- LightPeek — information stealer.
- FadeStealer — long-linked to ScarCruft, capable of audio recording, keystroke logging, and portable device data collection.
- NubSpy — backdoor leveraging the legitimate PubNub real-time messaging service for covert command-and-control traffic.
- ChillyChino — a new Chinotto variant capable of targeting Windows and Android platforms, enhancing ScarCruft’s cross-environment reach.
The use of PubNub is particularly notable — by embedding C2 traffic inside legitimate chat app protocols, ScarCruft effectively masks malicious communications within normal enterprise traffic, making detection significantly harder.
ChinopuNK Subgroup Attribution
The operational fingerprints point to ChinopuNK, a ScarCruft subgroup previously tied to Chinotto malware distribution.
Their toolkit’s evolution reflects an increasing overlap between espionage capabilities and financially motivated ransomware frameworks — a convergence long feared by the intelligence community.
State Context — Cyber Revenue as National Policy
ScarCruft’s ransomware turn must be seen in the context of DPRK’s cyber-enabled sanctions evasion strategy.
North Korean APTs — including Kimsuky, Lazarus, Andariel, and BlueNoroff — have collectively stolen an estimated $3 billion in cryptocurrency over the past six years, according to the United Nations.
These operations serve two strategic imperatives:
Gather intelligence to aid state decision-making in political, military, and economic arenas.
Generate illicit revenue to fund the regime’s nuclear program and sustain its elite structures despite heavy sanctions.
A Calculated Risk
Deploying ransomware openly carries more international exposure than pure espionage. Yet, ScarCruft’s move could be a calculated response to:
- The collapse or disruption of traditional DPRK financial channels.
- The success of other state-linked ransomware actors in monetizing operations without collapsing their covert access.
- The dual-use advantage of destroying or encrypting systems to cover the traces of espionage activities.
The TRJ Verdict
ScarCruft’s integration of ransomware into its toolkit is not a random experiment — it is a measured evolution in the DPRK’s cyber warfare doctrine.
By combining espionage-grade targeting with criminal-style monetization, they are blurring the operational lines between state intelligence and organized cybercrime.
This hybridization means ScarCruft can:
- Fund itself through ransoms,
- Mask data destruction as ransomware activity,
- Sow disruption in adversary infrastructure while still exfiltrating high-value intelligence.
The VCD campaign is a warning shot: the days when ransomware could be treated solely as a criminal enterprise are over — nation-state actors are now weaponizing it for both money and mission.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


Much of this is Greek to me, John, but I appreciate your efforts. I would imagine that catching N. Koreans involved in online theft would be very difficult. Still, it’s good that we know what they are up to so that we can avoid being victims of their schemes.
You’re very welcome, Chris — and I appreciate that. You’re absolutely right, catching North Korean threat actors in the act is extremely difficult, especially given how well they hide behind layers of false identities, compromised infrastructure, and state-backed resources. Still, knowing their tactics gives us the ability to spot warning signs, strengthen defenses, and hopefully avoid becoming victims. Awareness is always the first line of defense. 😎