North Korea Is Using The Internet Like The Mafia

North Korea has long been known as a hermit kingdom, but it is learning to embrace the Internet. The Asian country has “dramatically” changed its Internet use patterns, according to a new report, which could make imposing sanctions and defending American networks more difficult.

North Korea is using cyber operations to conduct low-level financial crimes and the country’s leaders are increasingly using the Internet as a part of their daily life, according to a new report from threat intelligence firm. Recorded Future

North Korean leader Kim Jong Un is quick to embrace technology and then cast it aside, directing hacking operations along the way as he runs the country “like a criminal syndicate,”according to the Recorded Future report.

One example of North Korea’s technological experimentation is its use of social media. In recent months, it appears North Korean leaders are embracing LinkedIn, although it is not clear what their goals are.

Hackers from the country have also developed “an asset-backed cryptocurrency scam,” according to the report, which helps “to raise funds for the Kim regime.”

North Korea has begun to “professionalise their use of the Internet,” and the web has become a more regular tool for top officials, according to Recorded Future. The development “will exacerbate existing challenges in sanctions enforcement and computer network defense.”

Although North Korean hackers have been accused of dramatic cyber operations that include stealing $81 million from the Bank of Bangladesh and hacking into Sony Pictures, “from a numbers prospective, those operations are a small percentage of what North Korean operators do every day,” according to Priscilla Moriuchi, the director of strategic threat development at Recorded Future.

“The majority of their average day-to-day work is this kind of low-level financial crime because they have a salary that they have to earn every year.”

There was no change in North Korean cyber activity following Kim’s June meeting with President Donald Trump, Moriuchi said.

Recorded Future’s report comes as senior US officials have identified North Korea as one of its main threats in cyberspace, and the Department of Justice has brought legal action against accused hackers.

Along with Russia, China and Iran, North Korea is “operating beyond the bounds of what we would consider reasonable,” Rob Joyce, senior adviser to the National Security Agency, said during an Oct. 23 event hosted by Palo Alto Networks. Joyce described North Korea as “a nation state stealing hard currency … they are bank robbers.”

The Department of Justice indicted Park Jin Hyok, a North Korean hacker, Sept. 6 for his role in crimes that include the WannaCry 2.0 global ransomware attack. North Korea’s government is responsible for “hundreds of millions, if not billions, of dollars’ worth of damage,” assistant attorney general John Demers said when the charges were filed.

US officials have found it is difficult to deter North Korea’s profitable hacking activity. Because North Korea is not widely connected to the Internet, there are not many digital targets for US Cyber Command, according to a former US intelligence official.

For years, US officials were cautious about hacking North Korea because a large portion of its Internet travels through China, current and former White House officials have told Fifth Domain. 

There was an apparent fear that if the Americans were caught in the act of hacking by the Chinese, officials from Beijing might think they were being targeted, instead of North Korea.

But Moriuchi said there were other ways of digitally deterring North Korea. Stopping North Korean cyber activity will require “taking them out at the knees,” she said, and treating the country’s digital operations as if it were a criminal syndicate. 

It means arresting North Korean hackers if they travel outside the country, indicting officials and working with partner law enforcement agencies.

Fifth Domain:

You Might Also Read:

N Korea Is A Bigger Cyber Threat Than Russia

« British Refuse To Co-operate With Belgian Hacking Inquiry
Machine Learning & Big Data - Where You Least Expect It »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.