North Korean Hackers Have Stolen $2billion

North Korea has stolen $2 billion by launching cyber attacks on financial organisations and crypto-currency exchanges and  the money has been used to buy military equipment. 

United Nations experts say North Korea used cyberspace to launch increasingly sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to generate income. They also used cyber-space to launder the stolen money. According to a report submitted to the UN Security Council committee, the widespread and “increasingly sophisticated” attacks saw North Korean hackers stealing funds and attempting to launder the stolen money. 

The leaked UN Report, said the DPRK hackers target the financial institutions and crypto exchanges across 17 countries.
The report also cites two 2018 bank attacks that, like the Bangladesh Bank incident, tapped into the Swift messaging system: a $10 million theft from Banco de Chile and a $13.5 million ATM cash-out hit on Cosmos Bank in India. "Democratic People's Republic of Korea (DPRK) cyber actors, many operating under the direction of the Reconnaissance General Bureau, raise money for its WMD (weapons of mass destruction) programs, with total proceeds to date estimated at up to $2 billion," the report said. 

Crypto-currencies were targeted by hackers because they are less easy to trace. According to the leaked UN report, the attacks on crypto-currency exchanges allowed North Korea “to generate income in ways that are harder to trace and subject to less government oversight and regulation than the traditional banking sector.” 

The news North Korea is using cyberspace to steal cryptocurrencies and mine bitcoin isn’t new. In March, a UK report said North Korean hackers had stolen around $571 million across at least five cryptocurrency exchanges in Asia between January 2017 and September 2018. 

The leaked UN report shows just how developed the nation’s capabilities are becoming, says Philip Ingram, a former colonel in British military intelligence. “The worrying thing is: If they can do this, they are just as capable of stealing intellectual property (IP), enabling them to maintain their scientific and engineering development.”

Additionally, Ingram says, it raisesquestions about who the country is buying its weapons from. “Who are the countries ignoring international sanctions and supplying advance engineering capability and weapons or weapons parts to North Korea? They don't need the money for internal use.”

A spokesman for international insurance firm AMTrust Europe says the move shows the regime “looking at cyber to level the playing field”. However, they don't see North Korea as a big threat when compared with the combined power and funding of the big 5Eyes Australia, Canada, New Zealand, the UK and the US. 

North Korea's state-sponsored hacking crews are breaking into online stores to insert malicious code that can steal buyers' payment card details as they visit the checkout page and fill in payment forms.Attacks on online stores have been going on since May 2019, according to the  Dutch cybersecurity firm SanSec.

The fact that North Korean hackers have been involved in web skimming incidents is not a surprise to industry experts, as they have consistently gravitated towards any type of cybercrime that can generate a profit.

The US government also has said it wants to seize 113 crypto-currency accounts associated with North Korean money laundering, a high-tech cat-and-mouse-style conflict in which money launderers have turned to elaborate automated schemes to conceal their cryptocurrency transactions and frustrate law enforcement.

Forbes:       FinExtra:        ZDNet:       MITechnolgy Review:

You Might Also Read: 

N.Korean Hackers Are Working With European Criminals:

 

 

« Russian Hackers At Work Stealing Coronavirus Vaccine Data
Google Doubles Down On India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.