Defending Against North Korea's Cyber Threats

In addition to the intimidating use of long range missiles, the North Korean government is employing malicious cyber activity to collect intelligence, conduct attacks and to generate criminal revenues. Indeed, North Korea has successfully funded $2b for its nuclear missile programs through criminal acts focused on crypto currency.

The US and South Korea have committed to cooperate in averting North Korean cyber security threats in a working group meeting held in Seoul following reports that North Korea is stealing using crypto currency scams. 

Both the US and South Korea aim to coordinate with the financial industry and other countries to develop means to deter the actions of North Korea. The two countries have held a second working group meeting on North Korean cyber threats in Seoul.

The US Secretary of Homeland Security Alejandro Mayorkas has recently claimed in testimony submitted to the House Committee on Homeland Security that North Korea have already stolen over $1 billion for its nuclear weapons program during the past two years. North Korea has also ramped up its cyber espionage activities, said FBI Director Christopher Wray during the US Congress Homeland Security Committee hearing. 

As North Korea is using increasingly sophisticated cyber attacks and targeting the United States, it is important for the US and South Korea, North Korea’s usual target, to cooperate against these attacks and to implement the already existing high-level commitments to mutual defence. 

"North Korea has growing espionage in addition to theft and attack capability in some ways, sort of similar to Iran in recent years in particular, and especially targeting, as you say, financial institutions, crypto currency exchanges and so forth because they needed to fund their regime because of the effectiveness of the sanctions that otherwise exist," Wray said.

CISA:      The Diplomat:     Korea Herald:        SCMagazine:  

You Might Also Read: 

N.Korean Hackers Target US Health Providers With Ransomware:

 

« No Slack In The System
Ericsson Invests In 6G Network Research »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Netpoleon Group

Netpoleon Group

Netpoleon is a leading provider of integrated security, networking solutions and value added services.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.