Defending Against North Korea's Cyber Threats

In addition to the intimidating use of long range missiles, the North Korean government is employing malicious cyber activity to collect intelligence, conduct attacks and to generate criminal revenues. Indeed, North Korea has successfully funded $2b for its nuclear missile programs through criminal acts focused on crypto currency.

The US and South Korea have committed to cooperate in averting North Korean cyber security threats in a working group meeting held in Seoul following reports that North Korea is stealing using crypto currency scams. 

Both the US and South Korea aim to coordinate with the financial industry and other countries to develop means to deter the actions of North Korea. The two countries have held a second working group meeting on North Korean cyber threats in Seoul.

The US Secretary of Homeland Security Alejandro Mayorkas has recently claimed in testimony submitted to the House Committee on Homeland Security that North Korea have already stolen over $1 billion for its nuclear weapons program during the past two years. North Korea has also ramped up its cyber espionage activities, said FBI Director Christopher Wray during the US Congress Homeland Security Committee hearing. 

As North Korea is using increasingly sophisticated cyber attacks and targeting the United States, it is important for the US and South Korea, North Korea’s usual target, to cooperate against these attacks and to implement the already existing high-level commitments to mutual defence. 

"North Korea has growing espionage in addition to theft and attack capability in some ways, sort of similar to Iran in recent years in particular, and especially targeting, as you say, financial institutions, crypto currency exchanges and so forth because they needed to fund their regime because of the effectiveness of the sanctions that otherwise exist," Wray said.

CISA:      The Diplomat:     Korea Herald:        SCMagazine:  

You Might Also Read: 

N.Korean Hackers Target US Health Providers With Ransomware:

 

« No Slack In The System
Ericsson Invests In 6G Network Research »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Tanium

Tanium

Tanium is an endpoint security and systems management company.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.