North Korean Cyber 'tunneling' In New Zealand

The NZ Government's electronic security services  are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers as a back door link to the Internet.

Foreign Minister Gerry Brownlee recently confirmed the Government Communications Security Bureau (GCSB) was looking into the claims made in a report by security and intelligence firm Recorded Future. The GCSB was looking at all aspects raised in the article to check if they were true.

The report said there were "large and active presences" of North Koreans in seven countries; India, New Zealand, Malaysia, Nepal, Kenya, Mozambique and Indonesia; as well in as China.

"Our source revealed not only above-average levels of activity to and from these nations, but to many local resources, news outlets, and governments, which was uncharacteristic of North Korean activity in other nations," the report said.

Its analysis found the limited number of North Korean leaders and ruling elite with access to the Internet were actively engaged in Western and popular social media and regularly read the news and used online streaming, gaming and other services.

There were four million mobile devices in North Korea and Facebook was the most widely used social networking site for North Koreans, the report said.

It said attempts to isolate the reclusive nation's elites and leaders were failing.

Brownlee suggested any activity through New Zealand may not necessarily be sinister and that it could be that North Koreans, who could not access the Internet and facing tough state controls, were using devices such as cellphones to look at what was going on in the rest of the world.

"If you think about North Korea a very isolated country so if there are North Koreans who are finding a way to get in contact with the outside world that's a good thing. If it's the elites keeping it all to themselves, it just further reinforces how corrupt that regime is."

He dismissed concerns about links between North Korea and China and the widespread use of Huawei equipment here.

"I think it's too far gone. If you went around this gathering of people here, you'd find any number who might be holding Huawei products, so I don't think it's worth getting too strung up about that."

Brownlee said he was not concerned about the perception in other countries, such as the United States, which knew New Zealand well enough to know it was not facilitating this activity.

Stuff

You Might Also Read: 

Snowden: New Zealand Spying on Pacific Islands:

In New Zealand, Hacking Is A Serious Business:

 

« Who Is Responsible for Cloud Security?
Russian Arrested For $4billion Bitcoin Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.