Defending Against North Korea's Cyber Threats

In addition to the intimidating use of long range missiles, the North Korean government is employing malicious cyber activity to collect intelligence, conduct attacks and to generate criminal revenues. Indeed, North Korea has successfully funded $2b for its nuclear missile programs through criminal acts focused on crypto currency.

The US and South Korea have committed to cooperate in averting North Korean cyber security threats in a working group meeting held in Seoul following reports that North Korea is stealing using crypto currency scams. 

Both the US and South Korea aim to coordinate with the financial industry and other countries to develop means to deter the actions of North Korea. The two countries have held a second working group meeting on North Korean cyber threats in Seoul.

The US Secretary of Homeland Security Alejandro Mayorkas has recently claimed in testimony submitted to the House Committee on Homeland Security that North Korea have already stolen over $1 billion for its nuclear weapons program during the past two years. North Korea has also ramped up its cyber espionage activities, said FBI Director Christopher Wray during the US Congress Homeland Security Committee hearing. 

As North Korea is using increasingly sophisticated cyber attacks and targeting the United States, it is important for the US and South Korea, North Korea’s usual target, to cooperate against these attacks and to implement the already existing high-level commitments to mutual defence. 

"North Korea has growing espionage in addition to theft and attack capability in some ways, sort of similar to Iran in recent years in particular, and especially targeting, as you say, financial institutions, crypto currency exchanges and so forth because they needed to fund their regime because of the effectiveness of the sanctions that otherwise exist," Wray said.

CISA:      The Diplomat:     Korea Herald:        SCMagazine:  

You Might Also Read: 

N.Korean Hackers Target US Health Providers With Ransomware:

 

« No Slack In The System
Ericsson Invests In 6G Network Research »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.