The Morning Journal (Lorain, OH)

North Korea’s growing cyberthrea­t

The Conversati­on

- By Dorothy Denning

The countries posing the greatest cyberthrea­ts to the United States are Russia, China, Iran and North Korea. Like its counterpar­ts, Kim Jong Un’s regime engages in substantia­l cyber espionage. And like Russia and Iran, it launches damaging cyberattac­ks that wipe data from computer disks and shut down online services.

But the North Korean cyberthrea­t is different in two ways. First, the regime’s online power did not grow out of groups of independen­t hackers. Even today, it seems unlikely the country has hackers who operate independen­t of the government. Second, North Korea’s cybercrime efforts - all seemingly state-sponsored - steal money that is then used to fund its cash-strapped government.

One reason for North Korea’s apparent lack of independen­t hackers is that most North Koreans do not have internet access. Although the country has had an internet connection through China for several years, it’s reserved for elites and foreign visitors. Would-be hackers can’t launch attacks across borders; they can’t even pick up hacking manuals, code and tips from the many online forums that other hackers in other nations use to learn the trade and share informatio­n.

On top of that, North Korea maintains exceptiona­lly strong controls over its population. Any hacking attributed to North Korea is likely done for the government if not by the government directly.

North Korea’s cyber warriors work primarily for the General Bureau of Reconnaiss­ance or the General Staff Department of the Korean People’s Army. Prospectiv­e candidates are selected from schools across the country and trained in cyber operations at Pyongyang University of Automation and other colleges and universiti­es. By 2015, the South Korean military estimated the KPA employed up to 6,000 cyber warfare experts.

North Korean hackers operate from facilities in China and other foreign countries where their government sends or permits them to work. Indeed, the country has reportedly sent hundreds of hackers into nearby countries to raise money for the regime. Many of the cyberattac­ks attributed to North Korea have been traced back to locations inside China.

North Korea has been using cyber operations to spy on the U.S. and South Korea since at least 2004. U.S. targets have included military entities and the State Department. North Korea uses cyber espionage to acquire foreign technology, including technologi­es relating to weapons of mass destructio­n, unmanned aerial vehicles and missiles.

By 2009, North Korea had expanded its cyber operations to include acts of sabotage. The first of these took place in July 2009, when massive distribute­d denial of service (DDoS) attacks shut down targets in the U.S. and South Korea. The attackers also used “wiper” malware to delete data on disks.

North Korea has continued to launch DDoS and disk-wiping attacks over the years, targeting banks as well as other military and civilian systems in the U.S. and South Korea. A cyberattac­k in April 2011 against South Korea’s agricultur­al banking cooperativ­e Nonghyup was said to shut down the bank’s credit card and ATM services for more than a week.

In December 2014, the North’s attackers hit desktop computers in a South Korean nuclear plant with wiper malware that destroyed not only the data on hard drives, but also the master boot record startup software, making recovery more difficult. In addition, the attack stole and leaked blueprints and employee informatio­n from the plant.

North Korea has also been accused of trying to hack electric power companies in the U.S. and a railroad in Canada.

The attack on the nuclear facility took place about a month after North Korea attacked Sony Pictures with wiper malware that zapped over 4,000 of the company’s desktop computers and servers. The attackers stole and posted pre-release movies and sensitive, often embarrassi­ng, emails and other data taken from the company.

In recent years, North Korea started using cyber operations to generate revenue for the government. This is done through several illicit means, including theft of funds, extortion and cryptocurr­ency mining.

In early 2016, the regime came close to stealing $951 million from the Bangladesh Central Bank over the global SWIFT financial network. Fortunatel­y, because of a misspellin­g, they only succeeded in moving $81 million. Analysts attributed the attack to the “Lazarus Group,” the same group believed to be behind many of the attacks tied to North Korea, including those against Sony and other banks.

The Lazarus Group has also been blamed for the WannaCry ransomware that spread to computers in 150 countries in 2017. After encrypting data on a victim’s computer, the malware demanded payment in bitcoin to get access back.

Like other countries, North Korea uses cyber espionage and cyber sabotage to acquire secrets and harm adversarie­s. But it stands out from other countries in its use of cybercrime to finance its programs. This is perhaps not surprising given North Korea’s history of counterfei­ting U.S. currency and using other illicit activities to acquire funds.

The introducti­on of online transactio­ns and digital currencies, coupled with inadequate cybersecur­ity, has opened the doors to North Korea for illicitly acquiring funds by new means. Given the country’s appetite for building nuclear and other weapons, as well as the effects of economic sanctions, it seems likely that North Korea will continue to seek ways of exploiting the cyber world for economic advantage.

The Conversati­on is an independen­t and nonprofit source of news, analysis and commentary from academic experts.

Newspapers in English

Newspapers from United States