Defending Against North Korea's Cyber Threats

In addition to the intimidating use of long range missiles, the North Korean government is employing malicious cyber activity to collect intelligence, conduct attacks and to generate criminal revenues. Indeed, North Korea has successfully funded $2b for its nuclear missile programs through criminal acts focused on crypto currency.

The US and South Korea have committed to cooperate in averting North Korean cyber security threats in a working group meeting held in Seoul following reports that North Korea is stealing using crypto currency scams. 

Both the US and South Korea aim to coordinate with the financial industry and other countries to develop means to deter the actions of North Korea. The two countries have held a second working group meeting on North Korean cyber threats in Seoul.

The US Secretary of Homeland Security Alejandro Mayorkas has recently claimed in testimony submitted to the House Committee on Homeland Security that North Korea have already stolen over $1 billion for its nuclear weapons program during the past two years. North Korea has also ramped up its cyber espionage activities, said FBI Director Christopher Wray during the US Congress Homeland Security Committee hearing. 

As North Korea is using increasingly sophisticated cyber attacks and targeting the United States, it is important for the US and South Korea, North Korea’s usual target, to cooperate against these attacks and to implement the already existing high-level commitments to mutual defence. 

"North Korea has growing espionage in addition to theft and attack capability in some ways, sort of similar to Iran in recent years in particular, and especially targeting, as you say, financial institutions, crypto currency exchanges and so forth because they needed to fund their regime because of the effectiveness of the sanctions that otherwise exist," Wray said.

CISA:      The Diplomat:     Korea Herald:        SCMagazine:  

You Might Also Read: 

N.Korean Hackers Target US Health Providers With Ransomware:

 

« No Slack In The System
Ericsson Invests In 6G Network Research »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Macomb-OU Incubator

Macomb-OU Incubator

Macomb-Oakland University Incubator supports startup and emerging companies in the niche industries of defense, homeland security, advanced manufacturing and technology.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.