. Military Space News .
CYBER WARS
'World's leading bank robbers': North Korea's hacker army
By Sunghee Hwang
Seoul (AFP) May 26, 2021

Nuclear-armed North Korea is advancing on the front lines of cyberwarfare, analysts say, stealing billions of dollars and presenting a clearer and more present danger than its banned weapons programmes.

Pyongyang is under multiple international sanctions over its atomic bomb and ballistic missile programmes, which have seen rapid progress under North Korean leader Kim Jong Un.

But while the world's diplomatic focus has been on its nuclear ambitions, the North has been quietly and steadily building up its cyber capabilities, and analysts say its army of thousands of well-trained hackers are proving to be just as dangerous.

"North Korea's nuclear and military programmes are long-term threats, but its cyber threats are immediate, realistic threats," said Oh Il-seok, a researcher at the Institute for National Security Strategy in Seoul.

Pyongyang's cyberwarfare abilities first came to global prominence in 2014 when it was accused of hacking into Sony Pictures Entertainment as revenge for "The Interview", a satirical film that mocked leader Kim.

The attack resulted in the posting of several unreleased movies online as well as a vast trove of confidential documents.

Since then the North has been blamed for a number of high-profile cyberattacks, including a $81 million heist from the Bangladesh Central Bank as well as the 2017 WannaCry global ransomware attack, which infected some 300,000 computers in 150 nations.

Pyongyang has denied any involvement, describing US allegations over WannaCry as "absurd" and a foreign ministry spokesman declaring: "We have nothing to do with cyberattacks."

But the US Justice Department in February indicted three North Koreans on charges of "participating in a wide-ranging criminal conspiracy to conduct a series of destructive cyberattacks".

In its 2021 Annual Threat Assessment Report, Washington acknowledged that Pyongyang "probably possesses the expertise to cause temporary, limited disruptions of some critical infrastructure networks" across the United States.

The North's cyber programme "poses a growing espionage, theft, and attack threat," said the document from the Office of the Director of National Intelligence.

It accused Pyongyang of stealing hundreds of millions of dollars from financial institutions and cryptocurrency exchanges, "probably to fund government priorities, such as its nuclear and missile programs".

- 'The best defence' -

North Korea's cyber-programme dates back to at least the mid-1990s, when then-leader Kim Jong Il reportedly said "all wars in future years will be computer wars".

Today Pyongyang's 6,000-strong cyberwarfare unit, known as Bureau 121, operates from several countries including Belarus, China, India, Malaysia and Russia, according to a US military report published in July 2020.

Scott Jarkoff of cybersecurity firm CrowdStrike rates them highly: "They are extremely sophisticated, dedicated, and capable of conducting advanced attacks."

Bureau 121 recruits are trained in different coding languages and operating systems at special establishments such as Mirim University, said former student Jang Se-yul, who defected in 2007.

Now known as the University of Automation, it takes in only 100 students a year from among the North's highest-scoring schoolchildren.

"We were taught that we had to be prepared against America's cyberwarfare capabilities," Jang told AFP.

"Ultimately, we were taught that we had to develop our own hacking programmes since attacking the enemy's operating system is the best defence."

Cyberwarfare is particularly appealing for small, poor countries like the North that are "outgunned in terms of equipment such as planes, tanks and other modern weapons systems", said Stimson Center researcher Martyn Williams.

"Hacking just requires a computer and Internet connection."

- Keyboards over guns -

Most state-sponsored hacking groups are mainly used for espionage purposes, but experts say North Korea is unusual in also deploying its cyber capabilities for financial gain.

Pyongyang has blockaded itself to protect against the coronavirus pandemic, adding to the pressure on its economy, and has for years sought to earn foreign currency by multiple means.

And Williams added: "Stealing it is a lot faster and potentially more lucrative than doing business, especially if you have skilled hackers."

The February US indictment accused the three North Koreans of stealing more than $1.3 billion worth of money and cryptocurrency from financial institutions and companies.

When it was issued Assistant Attorney General John Demers called North Korea's operatives "the world's leading bank robbers", adding they were "using keyboards rather than guns, stealing digital wallets of cryptocurrency instead of sacks of cash".

The rise of cryptocurrencies such as Bitcoin have presented hackers globally with a whole new range of increasingly lucrative targets.

In addition, said Jarkoff, their decentralised networks were a particular bonus for the North, offering a way to circumvent financial sanctions.

"This allows North Korea to easily launder money back into the country, outside the control of the global banking system," he said.

"Cryptocurrency is attractive because it is uncontrolled, borderless, and relatively anonymous."


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Operating in the shadows: US Cyber Command
Washington (AFP) May 25, 2021
If the Pentagon's Cyber Command launches an online attack and nobody knows about it, does it deter anyone? Many Americans are asking what the country's army of cyber warriors are doing after repeated attacks on US computer systems by Chinese, Russian and other hackers. The answer may have been in the 780th Military Intelligence Brigade's subtle retweet on May 14 of a security firm's scoop that ransomware extortionist Darkside had been digitally shut down. No one knows who took control of Da ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
First modernized SBIRS Missile Warning Satellite under Space Force control

ULA postpones launch of missile detection satellite

SBIRS GEO-5 encapsulated ahead of upcoming launch

GAO report: Missile Defense Agency missed 2020 delivery, testing goals

CYBER WARS
Marines' 24th MEU deploys with HIMARS rocket system

BAE Systems Australia to build joint strike missile components

US Navy Orders Additional Sea Skimming Target Vehicles from Northrop Grumman

Gaza reels under Israeli strikes as violence enters second week

CYBER WARS
Poland becomes first NATO country to buy Turkish drones

U.S. Navy drones to move from Guam to Japan

New drone attack targets US forces in Iraq

Skyborg ACS has successful first flight

CYBER WARS
SES Government Solutions provides medium earth orbit satellite services for combatant command

STPSat-6 safely arrives in Florida

Hughes and OneWeb to demonstrate LEO services for Arctic Region on behalf of US Air Force

Space startup Quasar takes off with CSIRO Tech

CYBER WARS
N.C. National Guard unit first to use new Army M109A7 Paladin howitzer

Air Force demonstrates value of rapid prototyping at Emerald Warrior

BATMAN support of SIBR PROJECT increases combat survival potential

Northrop Grumman LITENING Color Targeting Pods Enter Service

CYBER WARS
Grassley, Sanders introduce bill requiring Pentagon to pass audits

Boost for European fighter jet as Paris, Berlin, Madrid seal deal

US Navy says seizes huge weapons cache in Arabian Sea

U.S. joins European Union military mobility project

CYBER WARS
US, Russia seek to ease tensions in first meeting under Biden

Japan must 'radically' speed defence build-up: minister

Defense chiefs focus on plans for future of NATO alliance at summit

First US-Russia meeting ahead of Biden-Putin summit

CYBER WARS
Nanostructured device stops light in its tracks

Scientists use DNA technology to build tough 3D nanomaterials









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.