N. Korea Targets S Korea’s Bitcoin Exchange.

North Korea probably launched a cyber-attack against South Korean virtual currency exchanges in the face of heavier economic sanctions.

The CWIC Cyber Warfare Research Center in South Korea stated a domestic exchange for Bitcoin, the worldwide crypto-currency and digital payment system, has been the target of an attempted hacking, Radio Free Asia reported.
Other targets include South Korean financial technology companies and smaller businesses that use online financial tools, according to the report.

CWIC's Simon Choi said it is "not only one or two exchanges where attack attempts have been made…Startups that use blockchain, financial technology sector companies as well as others, may have been the target" of hacking emails, Choi said.
Blockchain is a public ledger of all crypto-currency transactions.

The emails would be sent to the employees of targeted firms. Opening the emails and reading its contents would provide an opportunity for attached malware to be planted inside the company's computer network, according to Choi.
The emails would often claim the sender represented a government authority, such as South Korea's fair trade commission. Other times the emails would include resumes from "job seekers."

According to CWIC, the malicious code attached to the emails was identical to viruses of North Korean origin.
Professor Lim Jong-in of the Graduate School of Information Security at Korea University said North Korea is attempting to hack online currency exchanges because "you can conceal the identity of the virtual money owner...while securing a new source of foreign currency."

North Korea has condemned the sanctions that have been adopted at the United Nations Security Council, as well as the unilateral US sanctions imposed on Pyongyang by the US Treasury.
Speculation is rising, however, the Trump administration may be signaling renewed interest in starting bilateral dialogue with North Korea.

President Donald Trump told supporters in Arizona that his North Korea policy may be working and North Korea's Kim Jong Un has "started to respect" the United States.
"But, Kim Jong Un, I respect the fact that I believe he is starting to respect us," Trump said. "I respect that fact very much. Respect that fact."

Ein News

Would Killing Bitcoin End Ransomware?:

N. Korea Will Unleash Cyber Attacks On The US:

Surprise: N Korea Hacked S Korea Cyber Command:

 

« Solutions To Combat ‘Fake News’
Carelessness Is Just As Risky As Deliberate Exfiltration »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.