The Daily Telegraph

North Korea’s cyber warrior threat greater than missiles

US and Britain confirm rogue nation responsibl­e for attack on 230,000 computers in 150 countries

- By Nicola Smith

WHILE the world has obsessed over North Korea’s rapidly advancing nuclear and weapons programmes, Pyongyang has silently built a sophistica­ted cyber army capable of plundering internatio­nal banks, military espionage, and wreaking havoc on critical infrastruc­ture.

Yesterday, the US and British government­s confirmed what many had suspected – that North Korea was behind May’s Wannacry ransomware attack, which affected more than 230,000 computers in 150-plus countries, costing billions and causing huge disruption to the NHS.

The announceme­nt came on the back of suspected North Korean hacks on a South Korean cryptocurr­ency exchange, where at least $7 million (£5.25million) worth of digital money was stolen and one company, Youbit, was forced into bankruptcy.

Observers have warned that currently Pyongyang’s most credible threat to global security may lie not in its progress towards building a nucleartip­ped warhead capable of reaching the US mainland, but in its formidable cyber prowess.

For a decade, Pyongyang has covertly trained an estimated 6,000 cyber warriors, creating a low-cost online army capable of creating total chaos in an interconne­cted world. Meanwhile, the isolated regime’s lack of connectivi­ty protects it from retaliator­y attacks, creating an almost perfect weapon.

Describing Wannacry as “indiscrimi­nately reckless”, the US blamed the Lazarus Group, a hacking entity working on behalf of Pyongyang.

It is also suspected to have carried out last year’s $81 million cyber robbery of the Bangladesh central bank’s account at the Federal Reserve Bank of New York, while in October North Korean hackers stole war plans from the South Korean army.

Britain also yesterday publicly named the Lazarus Group as responsibl­e for the Wannacry campaign – one of the most significan­t to hit the UK in terms of scale and disruption.

“We condemn these actions and commit ourselves to working with all responsibl­e states to combat destructiv­e criminal use of cyber space,” said Lord Ahmad of Wimbledon, a Foreign Office minister. Pyongyang has denied all accusation­s.

“They are quite capable of conducting operations that could cause significan­t disruption to many organisati­ons,” said Bryce Boland, chief technology officer for Asia Pacific at Fireeye, a cyber security company. North Korea is likely to increase its surveillan­ce of enemies’ military plans to prepare for a possible conflict, he said.

But North Korea was not acting alone, claimed Mr Boland. “We’re fairly confident that they are gaining informatio­n, potentiall­y benefiting from some support from Russia,” he argued, referring to a Russian telecoms company that had recently supplied Pyongyang with an in- ternet connection.

“It’s pretty much win-win for Russia,” he said. “It gives them a bit of leverage over North Korea, it gives them a bit of leverage over the US.”

The targeting of digital cryptocurr­encies like bitcoin was a recent developmen­t in North Korea’s cyber operations, noted Mr Boland.

“It’s completely reasonable to expect that they are using cryptocurr­encies to bypass sanctions,” he said.

Multiple attempts also have been made on convention­al bank systems to allegedly finance the regime. In October, employees at the Far Eastern Internatio­nal Bank (FEIB) in Taipei, Taiwan’s capital, were blindsided by hackers who attempted to steal $60 million through the internatio­nal Swift banking network and transfer it to a Sri Lankan account. Howard Jyan, head of the government’s cyber security division, revealed that it had been a twopronged heist during a public holiday, where hackers had used a backdoor via an email attachment to gain access to

‘The Winter Olympics in South Korea would be a prime opportunit­y for cyber espionage and sabotage’

the bank’s system and then covered their tracks with a ransomware attack.

The government has not officially blamed North Korea pending the outcome of an investigat­ion, although it acknowledg­es that the attack bears the hallmarks of the Lazarus group.

This theory is supported by Priscilla Moriuchi, director of strategic threat developmen­t at Recorded Future, a US tech company, who will release a new report on the FEIB case in January.

“There is definitely a strong thread throughout these attacks of a North Korean connection through the malware and, it seems, through the techniques that they’re using,” she said.

Like many cyber experts, Ms Moriuchi has warned that financial gain is not Pyongyang’s sole motivation.

The Wannacry worm also laid bare the regime’s appetite for wanton destructio­n.

Many fear that the 2018 Pyeongchan­g Winter Olympics, a scant 50 miles from the tense demilitari­sed zone that has divided the peninsula for six decades, could be a prime target for South Korea’s rogue neighbour.

“That desire to target South Korea and create chaos that would undermine South Korea’s image is still very much a goal for North Korea, and it’s more likely that they would do something in the cyber operations sphere,” said Ms Moriuchi.

In the absence of an imminent truce between Kim Jong-un and the internatio­nal community, “the Olympics would be a prime opportunit­y for cyber espionage and sabotage”, agreed Patrick Cronin, a senior director at the Washington-based Centre for a New American Security.

Gavin Williamson, the Defence Secretary, yesterday said: “North Korea is a massive threat, they’re a real danger to this country.”

 ??  ?? A South Korean marine during a joint winter drill with US marines in Pyeongchan­g. It is feared Kim Jong-un, below left, will target the 2018 Winter Olympics in South Korea
A South Korean marine during a joint winter drill with US marines in Pyeongchan­g. It is feared Kim Jong-un, below left, will target the 2018 Winter Olympics in South Korea
 ??  ??

Newspapers in English

Newspapers from United Kingdom