Defending Against North Korea's Cyber Threats

In addition to the intimidating use of long range missiles, the North Korean government is employing malicious cyber activity to collect intelligence, conduct attacks and to generate criminal revenues. Indeed, North Korea has successfully funded $2b for its nuclear missile programs through criminal acts focused on crypto currency.

The US and South Korea have committed to cooperate in averting North Korean cyber security threats in a working group meeting held in Seoul following reports that North Korea is stealing using crypto currency scams. 

Both the US and South Korea aim to coordinate with the financial industry and other countries to develop means to deter the actions of North Korea. The two countries have held a second working group meeting on North Korean cyber threats in Seoul.

The US Secretary of Homeland Security Alejandro Mayorkas has recently claimed in testimony submitted to the House Committee on Homeland Security that North Korea have already stolen over $1 billion for its nuclear weapons program during the past two years. North Korea has also ramped up its cyber espionage activities, said FBI Director Christopher Wray during the US Congress Homeland Security Committee hearing. 

As North Korea is using increasingly sophisticated cyber attacks and targeting the United States, it is important for the US and South Korea, North Korea’s usual target, to cooperate against these attacks and to implement the already existing high-level commitments to mutual defence. 

"North Korea has growing espionage in addition to theft and attack capability in some ways, sort of similar to Iran in recent years in particular, and especially targeting, as you say, financial institutions, crypto currency exchanges and so forth because they needed to fund their regime because of the effectiveness of the sanctions that otherwise exist," Wray said.

CISA:      The Diplomat:     Korea Herald:        SCMagazine:  

You Might Also Read: 

N.Korean Hackers Target US Health Providers With Ransomware:

 

« No Slack In The System
Ericsson Invests In 6G Network Research »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.