N.Korea's Cyber Threats To S.Korea

US Forces in Korea recently received reports of fake text and social media messages instructing Defense Department civilians to evacuate the Korean Peninsula. US Forces Korea confirmed on its Facebook page that the evacuation alert was false.

The fake message comes during a tense situation on the Korean Peninsula, and around the world, as North Korean leader Kim Jong Un continues to perform nuclear tests and launch ballistic missiles, two of which have been fired over Japan.

There are more than 28,000 American troops stationed in South Korea. This includes 8th Army, 7th Air Force, US Navy Korea, US Marine Corps Forces-Korea and Special Operations Command Korea.

North Korea's threats against the US have brought a heightened sense of awareness around cyber threats, according to current and former government officials, operators of critical industrial systems, and other experts are also talking about N. Korean cryptocurrency theft.

Cyber Threats on US

The UN Security Council recently approved new sanctions against Pyongyang, prompting vows of retaliation, specifically against the US.

Sources said the programs and entities ready to swing into action include Department of Homeland Security coordinating structures and information-sharing programs, the National Cyber Incident Response Plan, an interagency cyber coordinating group established during the Obama administration, and the Cyber Threat Intelligence Integration Center, or CTIIC, among others.

"The systems are in place, but they are not as mature as they should be," said one source with experience in the executive branch and the private sector.'

The CTIIC is probably working a lot of overtime right now," said a former high-ranking administration official who said the center would disseminate information about the North Korean threat "so policymakers have a comprehensive view."

The federal government has "a duty" to get related information, possibly sanitized to meet the recipients' clearance levels, into the hands of infrastructure contacts, the source noted. That information would go out through DHS or law enforcement agencies.

"The communication channels with the private sector are way better than they used to be," the former ranking administration official said.

Some of these programs have faced criticism in the past over the perceived inadequacy of coordination with the private sector, and they could be tested if the North Korea situation escalates.

"The North Korea threat is the most-scary and the most direct," the source with government and private-sector experience said. "If there is a conflict, a lot of it will be fought in cyberspace. This is not a drill, it's real-world."

One source close to a critical-infrastructure group said, "So much time and effort has been invested in bringing cyber policy up to a point where various parties know how important it is. I'd like to believe we'd bring a coordinated response and handle ourselves well in a crisis."

But the source acknowledged that "countless breaches" over the years have put sensitive information about critical infrastructure systems into the hands of "foreign adversaries."

"That is known, and they can steal other information too," the source said. "That's just the reality we're living in. As the clock ticks, it seems like we're getting closer and closer to something happening. That could apply to electricity, gas, water, you name it."

That also raises the issue of deterrence, which is an unsettled topic in cyber policy circles that continues to generate debate. Situations like the standoff with North Korea increase pressure on policymakers to address cyber deterrence more clearly.

"A lot of that is still undefined," the former high-ranking administration official said. "On cyber, there isn't really the same thing as what we show on the traditional military side, where we don't tell the adversary about the specifications of our Aegis destroyers but we let them know they are there. We haven't figured out how to do that on the cyber side."

North Korea stealing E-Currency

Also North Korean state-sponsored actors may be behind campaigns to steal virtual currencies in order to fund the state’s activities, according to speculation from security firm FireEye.

Last year the firm saw evidence that North Korean actors were targeting banks and the global financial system, possibly to fund Pyongyang’s elite.

Since May 2017, the North Korean actors have hit at least three South Korean cryptocurrency exchanges to steal funds, prompting the second wave of the campaign, FireEye researcher Luke McNamara says.

The actors used spearphishing methods to target employees at digital currency agencies. Those methods included tax themes as bait and banking malware linked to other North Korean actors.

“Add to that the ties between North Korean operators and a watering hole compromise of a bitcoin news site in 2016, as well as at least one instance of usage of a surreptitious cryptocurrency miner, and we begin to see a picture of North Korean interest in cryptocurrencies, an asset class in which bitcoin alone has increased over 400% since the beginning of this year,” McNamara says.

He points out that there have been six bursts of activity by North Korean actors against South Korean cryptocurrency targets between April and July.

In April, a suspected attack on four wallets in South Korean cryptocurrency exchange Yapizon may be linked, although there is no clear evidence North Korea was involved.

Four days later, the United States placed higher economic sanctions against North Korea, which may be growing North Korea’s interest in cryptocurrency.

In May, two South Korean exchange targets were hit by spearphishing campaigns. In June, more attacks against cryptocurrency providers were carried out. In July, the third known spearphishing attack against personal accounts was conducted.

According to McNamara, cryptocurrency exchanges make up just part of North Korea’s financial crime. He cites Office 39 as being involved in gold smuggling and creating counterfeit currency.

“If actors compromise an exchange itself (as opposed to an individual account or wallet) they potentially can move cryptocurrencies out of online wallets, swapping them for other, more anonymous cryptocurrencies or send them directly to other wallets on different exchanges to withdraw them in fiat currencies such as South Korean won, US dollars, or Chinese renminbi.”

He also says that because regulations around cryptocurrency are still developing, some countries may have insufficient money laundering laws, making it easier for attackers to mine cryptocurrencies.

McNamara notes that nations are becoming interested in cryptocurrencies, including Russia and Australia.

“Consequently, it should be no surprise that cryptocurrencies, as an emerging asset class, are becoming a target of interest by a regime that operates in many ways like a criminal enterprise.

“While at present North Korea is somewhat distinctive in both their willingness to engage in financial crime and their possession of cyber espionage capabilities, the uniqueness of this combination will likely not last long-term as rising cyber powers may see similar potential. Cyber criminals may no longer be the only nefarious actors in this space,” McNamara concludes.

Military Times:           Washington Examiner:        Security Brief:

You mIght Also Read:

N Korea Targets S Korea’s Bitcoin Exchange:

US Conducts Computer War Games in Response to North Korea Missile Launch:
 

« Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations
China Wants To Use AI To Predict Civil Disorder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Firedome

Firedome

Firedome's tailormade solution for IoT companies is designed to proactively prevent, detect, and respond to inevitable vulnerabilities in connected devices.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.