North Korean Cyber 'tunneling' In New Zealand

The NZ Government's electronic security services  are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers as a back door link to the Internet.

Foreign Minister Gerry Brownlee recently confirmed the Government Communications Security Bureau (GCSB) was looking into the claims made in a report by security and intelligence firm Recorded Future. The GCSB was looking at all aspects raised in the article to check if they were true.

The report said there were "large and active presences" of North Koreans in seven countries; India, New Zealand, Malaysia, Nepal, Kenya, Mozambique and Indonesia; as well in as China.

"Our source revealed not only above-average levels of activity to and from these nations, but to many local resources, news outlets, and governments, which was uncharacteristic of North Korean activity in other nations," the report said.

Its analysis found the limited number of North Korean leaders and ruling elite with access to the Internet were actively engaged in Western and popular social media and regularly read the news and used online streaming, gaming and other services.

There were four million mobile devices in North Korea and Facebook was the most widely used social networking site for North Koreans, the report said.

It said attempts to isolate the reclusive nation's elites and leaders were failing.

Brownlee suggested any activity through New Zealand may not necessarily be sinister and that it could be that North Koreans, who could not access the Internet and facing tough state controls, were using devices such as cellphones to look at what was going on in the rest of the world.

"If you think about North Korea a very isolated country so if there are North Koreans who are finding a way to get in contact with the outside world that's a good thing. If it's the elites keeping it all to themselves, it just further reinforces how corrupt that regime is."

He dismissed concerns about links between North Korea and China and the widespread use of Huawei equipment here.

"I think it's too far gone. If you went around this gathering of people here, you'd find any number who might be holding Huawei products, so I don't think it's worth getting too strung up about that."

Brownlee said he was not concerned about the perception in other countries, such as the United States, which knew New Zealand well enough to know it was not facilitating this activity.

Stuff

You Might Also Read: 

Snowden: New Zealand Spying on Pacific Islands:

In New Zealand, Hacking Is A Serious Business:

 

« Who Is Responsible for Cloud Security?
Russian Arrested For $4billion Bitcoin Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.