North Korea's Cyber War on Australia

It’s the secretive unit blamed for a string of cyber-attacks across the world, including the attack that affected 300,000 computers in 150 countries in May. And the West has every reason to be worried about what North Korea’s cyber warfare cell, known as Unit 180, is up-to-next.

Unit 180, which forms part of the Reconnaissance General Bureau (RGB) and is its main overseas intelligence agency, already has its eyes and ears on Australia, a cyber security expert has warned.

Dr Greg Austin, a Professor in the Australian Centre for Cyber Security at the University of New South Wales, said there was no doubt North Korea was already active in cyber space in Australia.Dr Austin said while the threat of a North Korean missile hitting this country remained a serious concern, the bigger danger is in cyber space.

“North Korea is almost certainly conducting cyber espionage against South Korean targets here,” he said.

“South Korean people, assets and aircraft in Australia are all potential targets of disabling cyber-attacks.”

He said North Korea remained far more likely to use a cyberattack against Australia and that the primary targets of a North Korean cyber-attack in Australia include South Korean leaders, institutions, civil aircraft, or even citizens living here.

Dr Austin, who delivered a seminar recently, Korea’s Cyber War Vortex in Canberra, said Unit 180 was just one number given to the North Korean spy agency’s cyber cell.

Dr Austin also said the reality was many people didn’t realise an active cyber-war was already underway with North Korea.
While Pyongyang knows it can’t get into a direct war with the West, it can attack it via a series of smaller wars.

Such attacks were also intensifying in destructiveness and frequency, Dr Austin said. According to him, North Korea has 6000 cyber warriors on home soil and other cells known as Units 110 and 1232 even have some active personal in northern China.

“Unit 121 has 600 of its 1800 cyber staff dedicated to disabling South Korean military command and control in the event of war,” he told the seminar recently.

Dr Austin said while there was no hard evidence to suggest North Korea was behind last week’s global attack, the reality was it wasn’t a sophisticated attack and it could have been carried out by as little as three people.

“And if North Korea was behind the global attacks (WannaCry) then this could also affect Australia as well,” Dr Austin said.

The US Department of Defence said in a report submitted to Congress last year that North Korea likely “views cyber as a cost-effective, asymmetric, deniable tool that it can employ with little risk from reprisal attacks, in part because its networks are largely separated from the internet”.

News.au:

You Might Also Read:

North Korea's Unit 180 Managed WannaCry Attack:

Malware: Eyes On North Korea:

Australia Goes To Cyberwar With Islamic State:

Australian Government Networks Hacked:

Australia Hardest Hit By Cybersecurity Skills Shortage:

 

 

« Ethical Hacking Can Beat Black Hat Hackers
Five Pitfalls of Cybersecurity Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

Cytex

Cytex

Cytex is the All-in-One solution for SMB data protection & compliance needs.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.