Ancaman Siber Internasional : Lazarus Group sebagai Instrumen Perang Asimetris Korea Utara
DOI:
https://doi.org/10.62383/presidensial.v2i2.850Keywords:
Cybersecurity, Lazarus Group, North Korea, Transnational Threat, Yber DiplomacyAbstract
The advancement of digital technology has made cyberspace a new arena for international conflict. The Lazarus Group, a hacking group allegedly affiliated with the North Korean government, has come to global attention for its involvement in numerous large-scale cyberattacks targeting financial institutions, global corporations, and public infrastructure. This study aims to analyze the group's operational patterns, strategic motives, and its implications for global cybersecurity. Using a qualitative approach and document analysis, the study investigates how Lazarus represents North Korea's strategy to counter international isolation and gain economic advantage. The results show that the international community's response to state actor threats in cyberspace is fragmented and ineffective. Therefore, a stronger and more coordinated multilateral framework is needed to respond to cyber threats from state actors.
Downloads
References
Arreguín-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict. International Security, 26(1), 93–128. https://doi.org/10.1162/016228801753212868
CrowdStrike. (2021). CrowdStrike global threat report. https://www.crowdstrike.com/resources/reports/global-threat-report/
Deibert, R. (2019). Authoritarianism goes global: Cyberspace edition. Journal of Democracy, 30(2), 64–78. https://doi.org/10.1353/jod.2019.0024
Europol. (2018). Internet organised crime threat assessment (IOCTA). https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2018
FBI. (2014). Update on Sony investigation. Federal Bureau of Investigation. https://www.fbi.gov/news/pressrel/press-releases/update-on-sony-investigation
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 100(4), 817–885. https://doi.org/10.15779/Z38QC7N
Krasner, S. D. (Ed.). (1983). International regimes. Cornell University Press.
Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Corporation. https://www.rand.org/pubs/monographs/MG877.html
Lin, H. (2012). Cyber conflict and national security strategy. In K. Geers (Ed.), Cyber security: Understanding cyber crimes, computer forensics and legal perspectives (pp. 153–170). NATO CCDCOE Publications.
Mandiant. (2020). APT38: Details on North Korea’s financially motivated cyber operations. https://www.mandiant.com/resources/apt38-north-korea-cyber-operation
Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266
Slaughter, A.-M. (2001). The real new world order. Foreign Affairs, 80(1), 183–197. https://doi.org/10.2307/20050020
Tikk, E., & Kerttunen, M. (2020). International cyber norms: Legal, policy & industry perspectives. Geneva Centre for Security Policy. https://cybernorms.dialoguesecurity.org
U.S. Department of the Treasury. (2018–2023). Sanctions on North Korean cyber actors. https://home.treasury.gov/news/press-releases
UN Group of Governmental Experts. (2015, 2021). Reports on developments in the field of information and telecommunications in the context of international security. United Nations Office for Disarmament Affairs. https://www.un.org/disarmament/ict-security/
United Nations Panel of Experts. (2022). Final report of the Panel of Experts submitted pursuant to resolution 2569 (2021). United Nations Security Council. https://undocs.org/S/2022/132
Waltz, K. N. (1979). Theory of international politics. McGraw-Hill.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Presidensial: Jurnal Hukum, Administrasi Negara, dan Kebijakan Publik

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.