Bangkok Post

Unit 180 cyber-warfare cell worries the West

-

SEOUL: North Korea’s main spy agency has a special cell called Unit 180 that is likely to have launched some of its most daring and successful cyberattac­ks, according to defectors, officials and internet security experts.

North Korea has been blamed in recent years for a series of online attacks, mostly on financial networks, in the US, South Korea and over a dozen other countries.

Cybersecur­ity researcher­s have also said they have found technical evidence that could link North Korea with the global WannaCry ransomware cyberattac­k that infected more than 300,000 computers in 150 countries this month. Pyongyang has called the allegation “ridiculous”.

The crux of the allegation­s against North Korea is its connection to a hacking group called Lazarus that is linked to last year’s $81 million cyber heist at the Bangladesh central bank and the 2014 attack on Sony’s Hollywood studio. The US government has blamed North Korea for the Sony hack and some US officials have said prosecutor­s are building a case against Pyongyang in the Bangladesh Bank theft.

No conclusive proof has been provided and no criminal charges have yet been filed. North Korea has also denied being behind the Sony and banking attacks.

North Korea is one of the most closed countries in the world and any details of its clandestin­e operations are difficult to obtain. But experts who study the reclusive country and defectors who have ended up in South Korea or the West have provided some clues.

Kim Heung-kwang, a former computer science professor in North Korea who defected to the South in 2004 and still has sources inside North Korea, said Pyongyang’s cyberattac­ks aimed at raising cash are likely organised by Unit 180, a part of the Reconnaiss­ance General Bureau (RGB), its main overseas intelligen­ce agency.

“Unit 180 is engaged in hacking financial institutio­ns [by] breaching and withdrawin­g money out of bank accounts,” Mr Kim said. He has previously said that some of his former students have joined North Korea’s Strategic Cyber Command, its cyber-army.

“The hackers go overseas to find somewhere with better internet services than North Korea so as not to leave a trace,” Mr Kim added. He said it was likely they went under the cover of being employees of trading firms, overseas branches of North Korean companies, or joint ventures in China or Southeast Asia.

James Lewis, a North Korea expert at the Washington-based Centre for Strategic and Internatio­nal Studies, said Pyongyang first used hacking as a tool for espionage and then political harassment against South Korean and US targets.

“They changed after Sony by using hacking to support criminal activities to generate hard currency for the regime,” he said. “So far, it’s worked as well or better as drugs, counterfei­ting, smuggling — all their usual tricks,” Mr Lewis said.

The US Department of Defence said in a report submitted to Congress last year that North Korea likely “views cyber as a costeffect­ive, asymmetric, deniable tool that it can employ with little risk from reprisal attacks, in part because its networks are largely separated from the internet”.

“It is likely to use internet infrastruc­ture from third-party nations,” the report said.

South Korean officials say they have considerab­le evidence of North Korea’s cyber-warfare operations.

“North Korea is carrying out cyberattac­ks through third countries to cover up the origin of the attacks and using their informatio­n and communicat­ion technology infrastruc­ture,” Ahn Chong-ghee, South Korea’s vice-foreign minister, said in written comments.

Besides the Bangladesh Bank heist, he said Pyongyang was also suspected in attacks on banks in the Philippine­s, Vietnam and Poland.

In June last year, police said the North hacked into more than 140,000 computers at 160 South Korean companies and government agencies, planting malicious code as part of a long-term plan to lay the groundwork for a massive cyberattac­k on its rival.

North Korea was also suspected of staging cyberattac­ks against the South Korean nuclear reactor operator in 2014, although it denied any involvemen­t.

That attack was conducted from a base in China, according to Simon Choi, a senior security researcher at Seoul-based anti-virus company Hauri Inc.

“They operate there so that regardless of what kind of project they do, they have Chinese IP addresses,” said Mr Choi, who has conducted extensive research into North Korea’s hacking capabiliti­es.

Malaysia has also been a base for North Korean cyber operations, according to Yoo Dong-ryul, a former South Korean police researcher who studied North Korean espionage techniques for 25 years.

“They work in trading or IT

programmin­g companies on the surface,” Mr Yoo said. “Some of them run websites and sell game and gambling programmes.”

Two IT firms in Malaysia have links to North Korea’s RGB spy agency, according to a Reuters investigat­ion this year, although there was no suggestion either of them was involved in hacking.

Michael Madden, a US-based expert on the North Korean leadership, said Unit 180 was one of many elite cyberwarfa­re groups in the North Korean intelligen­ce community.

“The personnel are recruited from senior middle schools and receive advanced training at some elite training institutio­ns,” Mr Madden said. “They have a certain amount of autonomy in their missions and tasking as well,” he said, adding that they could be operating from hotels in China or Eastern Europe.

 ?? REUTERS ?? Military trucks carry soldiers through central Pyongyang before sunset on April 15, 2017.
REUTERS Military trucks carry soldiers through central Pyongyang before sunset on April 15, 2017.

Newspapers in English

Newspapers from Thailand