N. Korea Will Unleash Cyber Attacks On The US

As tensions rise over North Korea's potential nuclear missile threat, US officials and outside experts are increasingly concerned the rogue regime will respond to international pressure by lashing out with a weapon it has already mastered.

The concern is cyber-attacks that can disable corporate networks, steal money from banks and potentially disrupt critical infrastructure.

In the best known incident in 2014, US intelligence officials say, North Korean hackers attacked Sony Pictures, destroying corporate computers and disclosing sensitive company data. The US accused North Korea of carrying it out in response to a film lampooning North Korean leader Kim Jong-un.

American intelligence officials have long ranked North Korea as one of the world's more dangerous cyber actors, trailing only Russia, China and Iran among US adversaries in its ability to inflict damage via computer networks.

Experts say North Korea could deploy the same techniques to inflict harm not just on one company, but on the American economy.

"We've been worried for some time that one of the ways that North Korea can retaliate against further escalation of tensions is via cyber, and particularly attacks against our financial sector," said Dmitri Alperovitch, co-founder of Crowdstrike, a cyber-security firm. "This is something they have really perfected as an art against South Korea."

US law enforcement and homeland security officials said in a June 13 analysis that they believe North Korea is targeting the media, aerospace, financial and critical infrastructure sectors in the United States.

"North Korea is capable of deploying malicious cyber capabilities, as they previously demonstrated in the Sony intrusions," one US intelligence official said. Intelligence officials say that while the US has cyber-offensive capabilities to retaliate, it remains vulnerable to attacks.

Some attacks are already underway. In June, the Department of Homeland Security published a warning about a North Korea hacking group it dubbed "Hidden Cobra," referred to by some researchers as "Lazarus."

"Since 2009, Hidden Cobra actors have leveraged their capabilities to target and compromise a range of victims," the warning said. "Some intrusions have resulted in the exfiltration of data while others have been disruptive in nature."

In December, the Hidden Cobra group was named a prime suspect in a theft of $81 million from the Bangladesh central bank. That's part of a string of cyber operations that officials believe were designed to raise money for the regime and its weapons programs.

"They've added cyber-crime to their portfolio of illicit activity that they have engaged in to raise money for the regime," said Juan Zarate, an NBC News analyst who is a former top Treasury official, National Security Council staffer and deputy national security advisor.

"They're absolutely stealing money through these cyber capabilities," said John Hultquist, who leads the intelligence team at FireEye, a cyber security firm.

"They're also stealing defense information. So, a decade of targeting defense contractors worldwide, may have helped in some way in gathering enough information to at least speed up their [nuclear weapons] process."

Some researchers have linked North Korea to the WannaCry ransomware attack, an outbreak of malware in May reported to have infected more than 230,000 computers in over 150 countries, making data irretrievable in many cases. But the links are not clear enough for the US to have publicly accused North Korea of involvement, multiple officials and private sector analysts told NBC News.

Kim Heung-Kwang, a former North Korean computer expert who defected to the south in 2004, told NBC News in an interview in Seoul that the North has trained thousands of military hackers capable of inflicting damage on South Korean and Western infrastructure.

"North Korea is able to use its cyber army to attack South Korea and the US," but the lack of Internet connectivity in North Korea makes it hard for the US to retaliate, he said.

FireEye has documented a number of distributed denial-of-service (DDoS) attacks on South Korean organisations and others that appear to be connected to North Korea.

For example, the firm said, in March 2011, suspected North Korean actors conducted DDoS attacks on the South Korean government, military infrastructure and a US military base in South Korea.

In December 2014, the South Korean government reported that power plants operated by Korea Hydro and Nuclear Power were targeted with wiper malware, potentially linked to North Korean actors.

While the attacks were not believed capable of affecting the function of nuclear plants, "they could create a sense of panic by altering the function of non-operational networks, hijacking social media accounts associated with critical infrastructure, or spreading alarming SMS messages during a time of armed conflict," FireEye said.

Not every expert is convinced that North Korea poses a major cyber threat.

"It's mostly data disruption," said James Lewis, a specialist at the Center for Strategic and International Studies. "The people who haven't done a good job defending themselves are the ones who get whacked. Companies or agencies that haven't protected their data or backed it up."

But Kim Heung-Kwang, who taught computer science in North Korea for 20 years before escaping 13 years ago, said North Korean hackers are working every day to perfect new techniques.

"They work hard to survive and do not give up," he said. "If they don't give up, maybe someday they might succeed."

NBC:

You Might Also Read:

NHS Cyberattack Was 'launched from N. Korea':

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:

 

« Can Tech Solve The Brexit Border Puzzle?
Fighting Digital Crime: Evolving Police Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Via Resource

Via Resource

Via Resource specialise in Information and Cyber Security recruitment in the UK, Europe and USA.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Infosec Cloud

Infosec Cloud

Infosec Cloud is a specialist Cyber Security company offering fully managed Training & Testing Services in addition to market leading Cyber Security technology and accredited professional services.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.