Malta Independent

United Nations probing North Korean cyberattac­k on Malta and 16 other countries

-

The United Nations yesterday confirmed its experts are investigat­ing a North Korean cyberattac­k on Malta, which is one of 17 countries to have suffered cyberattac­ks, with North Korea having reportedly illegally acquired as much as $2 billion from its increasing­ly sophistica­ted cyber activities against financial institutio­ns and cryptocurr­ency exchanges.

The cyberattac­k on Malta that the UN experts refer to is believed to have been the €13 million hacking of Bank of Valletta last February, of which €10 million had been recovered by the bank.

UN experts say they are investigat­ing at least 35 instances in 17 countries of North Koreans using cyberattac­ks to illegally raise money for weapons of mass destructio­n programs — and they are calling for sanctions against ships providing gasoline and diesel to the country.

The lengthier version of the report, recently seen by the AP, reveals that neighbouri­ng South Korea was hardest-hit, the victim of 10 North Korean cyberattac­ks, followed by India with three attacks, and Bangladesh and Chile with two each.

Thirteen countries suffered one attack — Costa Rica, Gambia, Guatemala, Kuwait, Liberia, Malaysia, Malta, Nigeria, Poland, Slovenia, South Africa, Tunisia and Vietnam, it said.

The experts said they are investigat­ing the reported attacks as attempted violations of UN sanctions, which the panel monitors.

The report cites three main ways that North Korean cyber hackers operate:

Attacks through the Society for Worldwide Interbank Financial Telecommun­ication or SWIFT system used to transfer money between banks, “with bank employee computers and infrastruc­ture accessed to send fraudulent messages and destroy evidence.”

Theft of cryptocurr­ency “through attacks on both exchanges and users.”

And “mining of cryptocurr­ency as a source of funds for a profession­al branch of the military.”

The experts stressed that implementi­ng these increasing­ly sophistica­ted attacks ‘is low risk and high yield’, often requiring just a laptop computer and access to the internet.

As examples of North Korean cyberattac­ks, the panel said hackers in one unnamed country accessed the infrastruc­ture managing its entire ATM system and installed malware modifying the way transactio­ns are processed. As a result, it forced 10,000 cash distributi­ons to individual­s working for or on behalf of North Korea “across more than 20 countries in five hours.”

In Chile, the experts said, North Korean hackers demonstrat­ed “increasing sophistica­tion in social engineerin­g,” by using LinkedIn to offer a job to an employee of the Chilean interbank network Redbanc, which connects the ATMs of all the country’s banks.

According to a report from one unnamed country cited by the experts, stolen funds following one cryptocurr­ency attack in 2018 “were transferre­d through at least 5,000 separate transactio­ns and further routed to multiple countries before eventual conversion” to currency that a government has declared legal money, “making it highly difficult to track the funds.”

The report to the Security Council gives details on some of the North Korean cyberattac­ks as well as the country’s successful efforts to evade sanctions on coal exports in addition to imports of refined petroleum products and luxury items including Mercedes Benz S-600 cars.

One Mercedes Maybach SClass limousine and other S-600s, as well as a Toyota Land Cruiser, were transferre­d from North Korea to Vietnam for last February’s summit between the country’s leader Kim Jong Un and US President Donald Trump, the experts said, adding that Vietnam said it asked for but was never provided a list of vehicles being brought into the country.

The panel also said it obtained informatio­n that the Taesong Department Store in Pyongyang, which reopened in April and is selling luxury goods, is part of the Taesong Group which includes two entities under UN sanctions and was previously linked to procuremen­t for North Korea’s ballistic missile programs.

The panel recommende­d sanctions against six North Korean vessels for evading sanctions and illegally carrying out ship-toship transfers of refined petroleum products.

Under UN sanctions, North Korea is limited to importing 500,000 barrels of such products annually including gasoline and diesel. The US and 25 other countries said North Korea exceeded the limit in the first four months of 2019.

The panel also recommende­d sanctions against the captain, owner, and parent company of the North Korean-flagged Wise Honest, which was detained by Indonesia in April 2018 with an illegal shipment of coal.

As for North Korea’s military cooperatio­n with other countries, the experts said Iran rejected an unnamed country’s allegation that two North Korean entities under sanctions maintained offices in Iran — the Korea Mining Developmen­t Trading Corporatio­n known as KOMID, which is the country’s primary arms dealer and main exporter of goods and equipment related to ballistic missiles and convention­al weapons, and Saeng Pil Company.

The experts said they have requested informatio­n from Rwanda on a report that North Koreans are conducting special forces training at a military camp in Gabiro. And they said they are also waiting for a response from Uganda ‘to multiple inquires’ about reports indicating specialize­d training is being conducted in the country, and KOMID and North Korean workers maintain a presence.

In South Korea, the experts said, North Korean cyber actors shifted focus in 2019 to targeting cryptocurr­ency exchanges, some repeatedly.

The panel said South Korea’s Bithumb, one of the largest cryptocurr­ency exchanges in the world, was reportedly attacked at least four times. It said the first two attacks in February 2017 and July 2017 each resulted in losses of approximat­ely $7 million, while a June 2018 attack led to a $31 million loss and a March 2019 attack to a $20 million loss.

The panel said it also investigat­ed instances of “cryptojack­ing” in which malware is used to infect a computer to illicitly use its resources to generate cryptocurr­ency. It said one report analyzed a piece of malware designed to mine the cryptocurr­ency Monero “and send any mined currency to servers located at Kim Il Sung University in Pyongyang.”

 ??  ??

Newspapers in English

Newspapers from Malta