North Korean Cyber 'tunneling' In New Zealand

The NZ Government's electronic security services  are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers as a back door link to the Internet.

Foreign Minister Gerry Brownlee recently confirmed the Government Communications Security Bureau (GCSB) was looking into the claims made in a report by security and intelligence firm Recorded Future. The GCSB was looking at all aspects raised in the article to check if they were true.

The report said there were "large and active presences" of North Koreans in seven countries; India, New Zealand, Malaysia, Nepal, Kenya, Mozambique and Indonesia; as well in as China.

"Our source revealed not only above-average levels of activity to and from these nations, but to many local resources, news outlets, and governments, which was uncharacteristic of North Korean activity in other nations," the report said.

Its analysis found the limited number of North Korean leaders and ruling elite with access to the Internet were actively engaged in Western and popular social media and regularly read the news and used online streaming, gaming and other services.

There were four million mobile devices in North Korea and Facebook was the most widely used social networking site for North Koreans, the report said.

It said attempts to isolate the reclusive nation's elites and leaders were failing.

Brownlee suggested any activity through New Zealand may not necessarily be sinister and that it could be that North Koreans, who could not access the Internet and facing tough state controls, were using devices such as cellphones to look at what was going on in the rest of the world.

"If you think about North Korea a very isolated country so if there are North Koreans who are finding a way to get in contact with the outside world that's a good thing. If it's the elites keeping it all to themselves, it just further reinforces how corrupt that regime is."

He dismissed concerns about links between North Korea and China and the widespread use of Huawei equipment here.

"I think it's too far gone. If you went around this gathering of people here, you'd find any number who might be holding Huawei products, so I don't think it's worth getting too strung up about that."

Brownlee said he was not concerned about the perception in other countries, such as the United States, which knew New Zealand well enough to know it was not facilitating this activity.

Stuff

You Might Also Read: 

Snowden: New Zealand Spying on Pacific Islands:

In New Zealand, Hacking Is A Serious Business:

 

« Who Is Responsible for Cloud Security?
Russian Arrested For $4billion Bitcoin Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Blackwall

Blackwall

Blackwall (formerly BotGuard) is a security infrastructure company focused on protecting web ecosystems from automated threats, while optimizing performance for hosting environments.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Secure Enterprise Engineering (SEE)

Secure Enterprise Engineering (SEE)

SEE provides disruptive cybersecurity system engineering, architecture, and operational capabilities to make our customer’s missions execute faster, smarter, and more securely.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.