Labyrinth Chollima Splits Into Three Cyber Adversaries
Ivanti EPMM Flaws Enable Auth Bypass and RCE
NFCShare Android Trojan Steals NFC Card Data
Cyber Edition Cyber Edition
30 Jan 2026
  • Home
  • AI & Cybersecurity
  • Dark Web Monitoring
  • Incident Response
  • Threat Actors
  • About Us
Cyber Edition Cyber Edition
  • Home
  • AI & Cybersecurity
  • Dark Web Monitoring
  • Incident Response
  • Threat Actors
  • About Us
Connect with Us
LinkedIn
185K+ Followers
Instagram
25K+ Followers
Threads
37K+Followers
X
650+ Followers

© All Rights Reserved, TheCyberEdition.com.

Home/Threat Actors/Labyrinth Chollima Splits Into Three Cyber Adversaries
Threat Actors

Labyrinth Chollima Splits Into Three Cyber Adversaries

Editorial Team
Editorial Team
January 30, 2026 3 Min Read
0
Labyrinth Chollima

Recent threat intelligence analysis shows that what was once treated as a single North Korea aligned activity cluster has matured into three clearly differentiated adversary groups. These groups operate under the Chollima umbrella but pursue distinct objectives, targets, and technical tradecraft. The evolution highlights how state aligned cyber operations scale by specialization rather than centralization.

Source: Crowdstrike blog

The three groups are now tracked as Golden Chollima, Labyrinth Chollima, and Pressure Chollima.

Golden Chollima: Financially Motivated Operations

Mission and Targeting

Golden Chollima focuses primarily on cryptocurrency theft. Its targeting centers on small to mid sized fintech firms and cryptocurrency service providers across the United States, Canada, South Korea, India, and Western Europe.

Tradecraft and Initial Access

The group heavily relies on malicious applications disguised as cryptocurrency trading tools. These lures are often combined with supply chain compromise and HR themed social engineering to gain execution on developer or finance systems. Golden Chollima has also demonstrated the ability to exploit Chromium zero day vulnerabilities in cloud conscious intrusion campaigns.

Malware Ecosystem

Golden Chollima’s tooling emphasizes theft and persistence, with malware families such as Jeus, AppleJeus, SnakeBaker, NodaliBaker, and HTTPHelper. These tools are optimized for credential harvesting, wallet access, and lateral movement in financial environments.

Labyrinth Chollima: Strategic Intelligence Collection

Source: LABYRINTH CHOLLIMA successors

Mission and Targeting

Labyrinth Chollima is the most espionage focused of the three groups. Its operations target defense, maritime, nuclear, logistics, military, and government sectors, primarily in the United States, Europe, and South Korea.

Initial Access and Exploitation

This group uses fake PDF readers, trojanized open source projects, and HR themed social engineering to deliver malware. Labyrinth Chollima also deploys TightVNC for interactive access and has demonstrated the use of zero day vulnerabilities to establish initial footholds.

Advanced Tooling

Its malware stack is broader and more stealth focused than the other groups. Known tools include Hoplight, HTTPHoplight, OpenSSLDownloader, UnderGroundRAT, HiberRAT, NedDownloader, and FudModule. These implants support long term persistence, encrypted command and control, and modular tasking.

Pressure Chollima: High Value Financial Targeting

Mission and Targeting

Pressure Chollima also focuses on cryptocurrency theft but prioritizes large centralized exchanges and technology firms. Its operations span the United States, Europe, India, and East Asia, suggesting a more aggressive revenue generation mandate.

Infection Chains

This group commonly abuses malicious cryptocurrency themed applications, trojanized Node.js and Python projects, and supply chain compromise. The approach allows Pressure Chollima to reach high value targets through trusted developer ecosystems.

Malware Arsenal

Pressure Chollima employs a diverse malware portfolio, including MataNet, SparkDownloader, TwoPence Electric, MagicCookie, StatusSymbol, Scuzzyfuss, IndexSymbol, GhostShip, and AlertConf. These tools enable payload staging, command execution, and data exfiltration at scale.

Comparative Technical Breakdown

Group NamePrimary ObjectiveKey TargetsCore TechniquesNotable Malware
Golden ChollimaCryptocurrency theftSmall fintech, crypto tradersFake apps, supply chain abuseJeus, AppleJeus, SnakeBaker
Labyrinth ChollimaIntelligence collectionDefense, government, militarySpear phishing, zero daysHoplight, HiberRAT, FudModule
Pressure ChollimaLarge scale crypto theftExchanges, tech firmsTrojanized dev toolsMataNet, SparkDownloader

Defensive Implications

The emergence of three specialized Chollima groups increases detection complexity. While infrastructure and tooling differ, shared themes such as developer ecosystem abuse and social engineering remain consistent. Defenders should prioritize behavioral detection, software supply chain monitoring, and continuous threat hunting.

This evolution shows how modern state aligned adversaries scale operations by dividing missions, tooling, and targets rather than relying on a single monolithic threat actor.

Related

Share Article

Editorial Team

Editorial Team

Our editorial team curates, verifies, and publishes cybersecurity news with a strong focus on accuracy, clarity, and relevance. They ensure every story meets our standards for independent and unbiased reporting.

CVE-2026-1340, CVE-2026-1281
Previous Post

Ivanti EPMM Flaws Enable Auth Bypass and RCE

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts
Labyrinth Chollima
Labyrinth Chollima Splits Into Three Cyber Adversaries
By Editorial Team
CVE-2026-1340, CVE-2026-1281
Ivanti EPMM Flaws Enable Auth Bypass and RCE
By Editorial Team
NFCshare android trojan
NFCShare Android Trojan Steals NFC Card Data
By Editorial Team

You Might Also Like

Labyrinth Chollima
Threat Actors

Labyrinth Chollima Splits Into Three Cyber Adversaries

No Comment
4 Views
TA584
Threat Actors

TA584 Evolves Initial Access Tactics with Persistent Malware Campaigns

No Comment
15 Views
canada paytool phishing
AI & Cybersecurity

Canada Targeted by Fraudulent PayTool Phishing Attacks

No Comment
23 Views
china aligned framework
AI & Cybersecurity

PeckBirdy Framework Enhances Lateral Movement in Cyber Attacks

No Comment
31 Views
Cyber Edition Cyber Edition

The Cyber Edition delivers cybersecurity news and insights from independent researchers, trusted by over 250,000 followers.

Cybersecurity
Incident Response Series 1: Cyber Incident Essentials
By Editorial Team
Discord Malware Uses Clipboard Hijacking for Crypto Theft
By Editorial Team
Informative Read
VidLeaks Exposes Privacy Risks in Text-to-Video AI Models
By Editorial Team
OpenRAG-Soc Benchmarks Indirect Prompt Injection in RAG Systems
By Editorial Team

Categories

AI & Cybersecurity 15
Cloud & Infrastructure Security 2
Compliance & Policy 5
Dark Web Monitoring 2
Incident Response 3

© All Rights Reserved, TheCyberEdition.com