North Korea Is Using The Internet Like The Mafia

North Korea has long been known as a hermit kingdom, but it is learning to embrace the Internet. The Asian country has “dramatically” changed its Internet use patterns, according to a new report, which could make imposing sanctions and defending American networks more difficult.

North Korea is using cyber operations to conduct low-level financial crimes and the country’s leaders are increasingly using the Internet as a part of their daily life, according to a new report from threat intelligence firm. Recorded Future

North Korean leader Kim Jong Un is quick to embrace technology and then cast it aside, directing hacking operations along the way as he runs the country “like a criminal syndicate,”according to the Recorded Future report.

One example of North Korea’s technological experimentation is its use of social media. In recent months, it appears North Korean leaders are embracing LinkedIn, although it is not clear what their goals are.

Hackers from the country have also developed “an asset-backed cryptocurrency scam,” according to the report, which helps “to raise funds for the Kim regime.”

North Korea has begun to “professionalise their use of the Internet,” and the web has become a more regular tool for top officials, according to Recorded Future. The development “will exacerbate existing challenges in sanctions enforcement and computer network defense.”

Although North Korean hackers have been accused of dramatic cyber operations that include stealing $81 million from the Bank of Bangladesh and hacking into Sony Pictures, “from a numbers prospective, those operations are a small percentage of what North Korean operators do every day,” according to Priscilla Moriuchi, the director of strategic threat development at Recorded Future.

“The majority of their average day-to-day work is this kind of low-level financial crime because they have a salary that they have to earn every year.”

There was no change in North Korean cyber activity following Kim’s June meeting with President Donald Trump, Moriuchi said.

Recorded Future’s report comes as senior US officials have identified North Korea as one of its main threats in cyberspace, and the Department of Justice has brought legal action against accused hackers.

Along with Russia, China and Iran, North Korea is “operating beyond the bounds of what we would consider reasonable,” Rob Joyce, senior adviser to the National Security Agency, said during an Oct. 23 event hosted by Palo Alto Networks. Joyce described North Korea as “a nation state stealing hard currency … they are bank robbers.”

The Department of Justice indicted Park Jin Hyok, a North Korean hacker, Sept. 6 for his role in crimes that include the WannaCry 2.0 global ransomware attack. North Korea’s government is responsible for “hundreds of millions, if not billions, of dollars’ worth of damage,” assistant attorney general John Demers said when the charges were filed.

US officials have found it is difficult to deter North Korea’s profitable hacking activity. Because North Korea is not widely connected to the Internet, there are not many digital targets for US Cyber Command, according to a former US intelligence official.

For years, US officials were cautious about hacking North Korea because a large portion of its Internet travels through China, current and former White House officials have told Fifth Domain. 

There was an apparent fear that if the Americans were caught in the act of hacking by the Chinese, officials from Beijing might think they were being targeted, instead of North Korea.

But Moriuchi said there were other ways of digitally deterring North Korea. Stopping North Korean cyber activity will require “taking them out at the knees,” she said, and treating the country’s digital operations as if it were a criminal syndicate. 

It means arresting North Korean hackers if they travel outside the country, indicting officials and working with partner law enforcement agencies.

Fifth Domain:

You Might Also Read:

N Korea Is A Bigger Cyber Threat Than Russia

« British Refuse To Co-operate With Belgian Hacking Inquiry
Machine Learning & Big Data - Where You Least Expect It »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security understand the evolving threat landscape and provide businesses with comprehensive cybersecurity solutions.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.