The Phnom Penh Post

The rise of North Korea’s cyberpower

- David Sanger, David Kirkpatric­k and Nicole Perlroth

WHEN North Korean hackers tried to steal $1 billion from the NewYork Federal Reserve last year, only a spelling error stopped them. They were digitally looting an account of the Bangladesh Central Bank, when bankers grew suspicious about a withdrawal request that had misspelled “foundation” as “fandation”.

Even so, Kim Jong-un’s minions got away with $81 million in that heist.

Their track record is mixed, but North Korea’s army of more than 6,000 hackers is undeniably persistent, and undeniably improving, according to US and British security officials who have traced these attacks and others back to the North.

Amid all the attention on Pyongyang’s progress in developing a nuclear weapon capable of striking the continenta­l United States, the North Koreans have also quietly developed a cyberprogr­amme that is stealing hundreds of millions of dollars and proving capable of unleashing global havoc.

Unlike its weapons tests, which have led to internatio­nal sanctions, the North’s cyberstrik­es have faced almost no pushback or punishment, even as the regime is using its hacking capabiliti­es for actual attacks against its adversarie­s in the West.

And just as Western analysts once scoffed at the potential of the North’s nuclear programme, so did experts dismiss its cyber potential – only to now acknowledg­e that hacking is an almost perfect weapon for a Pyongyang that is isolated and has little to lose.

The country’s primitive infrastruc­ture is far less vulnerable to cyber retaliatio­n, and North Korean hackers operate outside the country, anyway. Sanctions offer no useful response, since a raft of sanctions are imposed. And Kim’s advisers are betting that no one will respond to a cyberattac­k with a military attack, for fear of a catastroph­ic escalation between North and South Korea.

It is hardly a one-way conflict: By some measures the United States and North Korea have been engaged in an active cyber conflict for years.

Both the United States and South Korea have also placed digital “implants” in the Reconnaiss­ance General Bureau, the North Korean equivalent of the Central Intelligen­ce Agency, according to documents that Edward Snowden released several years ago. US-created cyber and electronic warfare weapons were deployed to disable North Korean missiles, an attack that was, at best, only partially successful.

Indeed, both sides see cyber as the way to gain tactical advantage in their nuclear and missile standoff.

Once North Korea counterfei­ted crude $100 bills to try to generate hard cash. Now intelligen­ce officials estimate that North Korea reaps hundreds of millions a dollars a year from ransomware, digital bank heists, online video game cracking and, more recently, hacks of South Korean Bitcoin exchanges.

One former British intelligen­ce chief estimates the take from its cyberheist­s may bring the North as much as $1 billion a year, or a third of the value of the nation’s exports.

When Kim Jong-un succeeded his father, in 2011, he expanded the cyber mission beyond serving as just a weapon of war, focusing also on theft, harassment and political-score settling.

“Cyberwarfa­re, along with nuclear weapons and missiles, is an ‘all-purpose sword’ that guarantees our military’s capability to strike relentless­ly,” Kim reportedly declared, according to the testimony of a South Korean intelligen­ce chief.

And the array of UN sanctions against Pyongyang only incentivis­ed Kim’s embrace.

“We’re already sanctionin­g anything and everything we can,” said Robert Silvers, the former assistant secretary for cyberpolic­y at the Department of Homeland Security during the Obama administra­tion. “They’re already the most isolated nation in the world.”

For decades Iran and North Korea have shared missile technology, and US intelligen­ce agencies have long sought evidence of secret cooperatio­n in the nuclear arena. In cyber, the Iranians taught the North Koreans something important: When confrontin­g an enemy that has internet-connected banks, trading systems, oil and water pipelines, dams, hospitals and entire cities, the opportuni- ties to wreak havoc are endless.

By midsummer 2012, Iran’s hackers, still recovering from a US and Israeli-led cyberattac­k on Iran’s nuclear enrichment operations, found an easy target in Saudi Aramco, Saudi Arabia’s state-owned oil company and the world’s most valuable company.

That August, Iranian hackers flipped a kill switch at precisely 11:08am, unleashing a simple wiper virus onto 30,000 Aramco computers and 10,000 servers that would destroy data, and replace it with a partial image of a burning American flag. The damage was tremendous.

Seven months later, during joint military exercises between US and South Korean forces, North Korean hackers, operating from computers inside China, deployed a very similar cyberweapo­n against computer networks at three major South Korean banks and South Korea’s two largest broadcaste­rs. Like Iran’s Aramco attacks, the North Korean attacks on South Korean targets used wiping malware to eradicate data and paralyse their business operations.

Beyond respect, and retributio­n, the North wanted hard currency from its cyberprogr­amme.

So soon the digital bank heists began – an attack in the Philippine­s in October 2015; then the Tien Phong Bank in Vietnam at the end of the same year; and then the Bangladesh Central Bank. Researcher­s at Symantec said it was the first time a state had used a cyberattac­k not for espionage or war, but to finance the country’s operations.

Now, the attacks are increasing­ly cunning. Security experts noticed in February that the website of Poland’s financial regulator was unintentio­nally infecting visitors with malware.

It turned out that visitors to the Polish regulator’s website had been hit with a watering hole attack, in which North Korean hackers waited for their victims to visit the site, then installed malware in their machines. Forensics showed that the hackers had put together a list of internet addresses from 103 organisati­ons, most of them banks, and designed their malware to specifical­ly infect visitors from those banks, in what researcher­s said appeared to be an effort to move around stolen currency.

More recently, North Koreans seemed to have changed tack once again. North Korean hackers’ fingerprin­ts showed up in a series of attempted attacks on cryptocurr­ency exchanges in South Korea, and were successful in at least one case, according to researcher­s at FireEye.

While US and South Korean officials often express outrage about North Korea’s cyber activities, they rarely talk about their own – and whether that helps fuel the cyber arms race.

At a recent meeting of US strategist­s to evaluate North Korea’s capabiliti­es, some participan­ts expressed concerns that the escalating cyberwar could actually tempt the North to use its weapons – both nuclear and cyber – very quickly in any conflict, for fear that the United States has secret ways to shut the country down.

Cyberwarfa­re ... is an “all-purpose sword” that guarantees our military’s capability to strike relentless­ly

 ?? ED JONES/AFP ?? Workers paint a North Korean flag atop a building on Kim Il-sung Square on July 7, 2016.
ED JONES/AFP Workers paint a North Korean flag atop a building on Kim Il-sung Square on July 7, 2016.

Newspapers in English

Newspapers from Cambodia