North Korean Cyber 'tunneling' In New Zealand

The NZ Government's electronic security services  are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers as a back door link to the Internet.

Foreign Minister Gerry Brownlee recently confirmed the Government Communications Security Bureau (GCSB) was looking into the claims made in a report by security and intelligence firm Recorded Future. The GCSB was looking at all aspects raised in the article to check if they were true.

The report said there were "large and active presences" of North Koreans in seven countries; India, New Zealand, Malaysia, Nepal, Kenya, Mozambique and Indonesia; as well in as China.

"Our source revealed not only above-average levels of activity to and from these nations, but to many local resources, news outlets, and governments, which was uncharacteristic of North Korean activity in other nations," the report said.

Its analysis found the limited number of North Korean leaders and ruling elite with access to the Internet were actively engaged in Western and popular social media and regularly read the news and used online streaming, gaming and other services.

There were four million mobile devices in North Korea and Facebook was the most widely used social networking site for North Koreans, the report said.

It said attempts to isolate the reclusive nation's elites and leaders were failing.

Brownlee suggested any activity through New Zealand may not necessarily be sinister and that it could be that North Koreans, who could not access the Internet and facing tough state controls, were using devices such as cellphones to look at what was going on in the rest of the world.

"If you think about North Korea a very isolated country so if there are North Koreans who are finding a way to get in contact with the outside world that's a good thing. If it's the elites keeping it all to themselves, it just further reinforces how corrupt that regime is."

He dismissed concerns about links between North Korea and China and the widespread use of Huawei equipment here.

"I think it's too far gone. If you went around this gathering of people here, you'd find any number who might be holding Huawei products, so I don't think it's worth getting too strung up about that."

Brownlee said he was not concerned about the perception in other countries, such as the United States, which knew New Zealand well enough to know it was not facilitating this activity.

Stuff

You Might Also Read: 

Snowden: New Zealand Spying on Pacific Islands:

In New Zealand, Hacking Is A Serious Business:

 

« Who Is Responsible for Cloud Security?
Russian Arrested For $4billion Bitcoin Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

Bedrock Security

Bedrock Security

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.