North Korea's Cyber War on Australia

It’s the secretive unit blamed for a string of cyber-attacks across the world, including the attack that affected 300,000 computers in 150 countries in May. And the West has every reason to be worried about what North Korea’s cyber warfare cell, known as Unit 180, is up-to-next.

Unit 180, which forms part of the Reconnaissance General Bureau (RGB) and is its main overseas intelligence agency, already has its eyes and ears on Australia, a cyber security expert has warned.

Dr Greg Austin, a Professor in the Australian Centre for Cyber Security at the University of New South Wales, said there was no doubt North Korea was already active in cyber space in Australia.Dr Austin said while the threat of a North Korean missile hitting this country remained a serious concern, the bigger danger is in cyber space.

“North Korea is almost certainly conducting cyber espionage against South Korean targets here,” he said.

“South Korean people, assets and aircraft in Australia are all potential targets of disabling cyber-attacks.”

He said North Korea remained far more likely to use a cyberattack against Australia and that the primary targets of a North Korean cyber-attack in Australia include South Korean leaders, institutions, civil aircraft, or even citizens living here.

Dr Austin, who delivered a seminar recently, Korea’s Cyber War Vortex in Canberra, said Unit 180 was just one number given to the North Korean spy agency’s cyber cell.

Dr Austin also said the reality was many people didn’t realise an active cyber-war was already underway with North Korea.
While Pyongyang knows it can’t get into a direct war with the West, it can attack it via a series of smaller wars.

Such attacks were also intensifying in destructiveness and frequency, Dr Austin said. According to him, North Korea has 6000 cyber warriors on home soil and other cells known as Units 110 and 1232 even have some active personal in northern China.

“Unit 121 has 600 of its 1800 cyber staff dedicated to disabling South Korean military command and control in the event of war,” he told the seminar recently.

Dr Austin said while there was no hard evidence to suggest North Korea was behind last week’s global attack, the reality was it wasn’t a sophisticated attack and it could have been carried out by as little as three people.

“And if North Korea was behind the global attacks (WannaCry) then this could also affect Australia as well,” Dr Austin said.

The US Department of Defence said in a report submitted to Congress last year that North Korea likely “views cyber as a cost-effective, asymmetric, deniable tool that it can employ with little risk from reprisal attacks, in part because its networks are largely separated from the internet”.

News.au:

You Might Also Read:

North Korea's Unit 180 Managed WannaCry Attack:

Malware: Eyes On North Korea:

Australia Goes To Cyberwar With Islamic State:

Australian Government Networks Hacked:

Australia Hardest Hit By Cybersecurity Skills Shortage:

 

 

« Ethical Hacking Can Beat Black Hat Hackers
Five Pitfalls of Cybersecurity Insurance »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Brava

Brava

Brava is your trusted Business Communications and Solutions partner serving the Caribbean and Atlantic region.