North Korean Hackers Have Stolen $2billion

North Korea has stolen $2 billion by launching cyber attacks on financial organisations and crypto-currency exchanges and  the money has been used to buy military equipment. 

United Nations experts say North Korea used cyberspace to launch increasingly sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to generate income. They also used cyber-space to launder the stolen money. According to a report submitted to the UN Security Council committee, the widespread and “increasingly sophisticated” attacks saw North Korean hackers stealing funds and attempting to launder the stolen money. 

The leaked UN Report, said the DPRK hackers target the financial institutions and crypto exchanges across 17 countries.
The report also cites two 2018 bank attacks that, like the Bangladesh Bank incident, tapped into the Swift messaging system: a $10 million theft from Banco de Chile and a $13.5 million ATM cash-out hit on Cosmos Bank in India. "Democratic People's Republic of Korea (DPRK) cyber actors, many operating under the direction of the Reconnaissance General Bureau, raise money for its WMD (weapons of mass destruction) programs, with total proceeds to date estimated at up to $2 billion," the report said. 

Crypto-currencies were targeted by hackers because they are less easy to trace. According to the leaked UN report, the attacks on crypto-currency exchanges allowed North Korea “to generate income in ways that are harder to trace and subject to less government oversight and regulation than the traditional banking sector.” 

The news North Korea is using cyberspace to steal cryptocurrencies and mine bitcoin isn’t new. In March, a UK report said North Korean hackers had stolen around $571 million across at least five cryptocurrency exchanges in Asia between January 2017 and September 2018. 

The leaked UN report shows just how developed the nation’s capabilities are becoming, says Philip Ingram, a former colonel in British military intelligence. “The worrying thing is: If they can do this, they are just as capable of stealing intellectual property (IP), enabling them to maintain their scientific and engineering development.”

Additionally, Ingram says, it raisesquestions about who the country is buying its weapons from. “Who are the countries ignoring international sanctions and supplying advance engineering capability and weapons or weapons parts to North Korea? They don't need the money for internal use.”

A spokesman for international insurance firm AMTrust Europe says the move shows the regime “looking at cyber to level the playing field”. However, they don't see North Korea as a big threat when compared with the combined power and funding of the big 5Eyes Australia, Canada, New Zealand, the UK and the US. 

North Korea's state-sponsored hacking crews are breaking into online stores to insert malicious code that can steal buyers' payment card details as they visit the checkout page and fill in payment forms.Attacks on online stores have been going on since May 2019, according to the  Dutch cybersecurity firm SanSec.

The fact that North Korean hackers have been involved in web skimming incidents is not a surprise to industry experts, as they have consistently gravitated towards any type of cybercrime that can generate a profit.

The US government also has said it wants to seize 113 crypto-currency accounts associated with North Korean money laundering, a high-tech cat-and-mouse-style conflict in which money launderers have turned to elaborate automated schemes to conceal their cryptocurrency transactions and frustrate law enforcement.

Forbes:       FinExtra:        ZDNet:       MITechnolgy Review:

You Might Also Read: 

N.Korean Hackers Are Working With European Criminals:

 

 

« Russian Hackers At Work Stealing Coronavirus Vaccine Data
Google Doubles Down On India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.