The Jerusalem Post

North Korea challenges the West on multiple fronts

- • By AARON CRIMMINS

In the current climate of nuclear brinkmansh­ip between the United States and the Democratic People’s Republic of Korea (hereafter referred to as North Korea), one might wonder how the situation was allowed to reach this point. The US and its allies have imposed sanctions on North Korea before, but the nuclear weapons tests keep coming. What gives?

As it turns out, North Korea has not been sitting back and contritely absorbing the economic damage. Over the past few years, the Kim Jung-un regime has devoted significan­t resources to ratcheting up its hacking skills. Recent examples of its cyber escapades include Asian bank heists that garnered millions of dollars. One particular­ly brazen theft netted the North Koreans over $81 million at the expense of a Filipino bank.

They are also behind the May 2017 Wannacry ransomware attack, which spread to hundreds of thousands of computers worldwide last by exploiting a Windows operating system vulnerabil­ity known now as Eternal Blue. A clandestin­e Internet-based group known as The Shadow Brokers released Eternal Blue, along with other hacking tools, into the wild, allowing anyone with the necessary tech savvy to turn it against any system of their choosing.

Cybersecur­ity firms Kaspersky Labs, Symantec and Fireye used patterns and clues within Wannacry’s code to conclude that the Lazarus Group, a hacking group known to be connected to the North Korean government, was indeed responsibl­e. Subsequent­ly, the preeminent US cyber-intelligen­ce agency, the NSA, corroborat­ed this story by issuing a statement pointing the finger at the Kim Jung-un regime.

At the time, the malware exploit only made off with about $140,000 in Bitcoin from those willing to pay, although actually putting lives at risk by affecting medical services in the UK. Bitcoin, a cryptocurr­ency, is a fully digital currency that uses high-grade encryption to ensure the privacy and dependabil­ity of transactio­ns online. At first, the three bitcoin “wallets” reported to be the depositori­es of this ransom money saw no activity, but on August 2, after more than 300 unique payments, the perpetrato­rs finally began to reap their ill-gotten loot. In a rapid succession of seven withdrawal­s, the three wallets were quickly emptied.

You have to give the North Koreans credit: market timing might have been a motive for cashing in. In recent months, Bitcoin has enjoyed a meteoric appreciati­on, and will now even split into two separate cryptocurr­encies. Reported estimates state the return on waiting at about 20%.

While the NSA predictabl­y has not revealed its intelligen­ce sources, Internet security research groups Recorded Future and Team Cymru have recently published new findings on the pattern of North Korean cyber activity. The first finding of interest has to do with private – or more accurately elite – activity, and it is striking. As on the economic front, North Korea is not anywhere near as closed as it once was. From the report:

“Our analysis demonstrat­es that the limited number of North Korean leaders and ruling elite with access to the Internet are actively engaged in Western and popular social media, regularly read internatio­nal news, use many of the same services such as video streaming and online gaming, and above all, are not disconnect­ed from the world at large or from the impact North Korea’s actions have on the community of nations.”

The second major finding is that the DPRK routes substantia­l traffic through Internet nodes abroad. Of course China is in this mix, but the surprise of the report is that Chinese networks only account for about 10% of traffic, with India being a more significan­t player and Indonesia, Mozambique, New Zealand, Kenya and Nepal all playing a role as well. These patterns underscore the need for greater coordinati­on on cyber issues as well as sanctions enforcemen­t.

The history of North Korea/Iran coordinati­on on nuclear weapons developmen­t further highlights the need to work against the efforts of such regimes.

In that regard, the US State Department’s loss of its cyber coordinato­r, Christophe­r Painter, is a step in the wrong direction. Not only that, but it would seem to run counter to US President Donald Trump’s own May 11 executive order calling for a review to strengthen cybersecur­ity. It is part of a much larger pattern. Cyber is not the only area to see devastatin­g cuts under the Trump administra­tion, but it should not be swept under the rug with the rest.

North Korea’s recent opening of an embassy in Tehran, accompanie­d with a statement of friendship and cooperatio­n between the two countries, further demonstrat­es the need for vigilance and proactivit­y. Facing the growing North Korean threat will take coordinati­on, innovation and persistenc­e. The US must get its own cyber house in order and coordinate with allies such as Israel, South Korea, Japan, the United Kingdom, France and others. An enterprisi­ng cyber adversary such as North Korea cannot be defeated otherwise.

The writer is a doctoral student at the California Western School of Law where he studies internatio­nal and intellectu­al property law. Follow him on Twitter @ Acrimms.

Newspapers in English

Newspapers from Israel