Business Day

North Korean hackers now very aggressive, says report

-

North Korean hackers were becoming more aggressive than their Chinese counterpar­ts, a leading US cybersecur­ity firm warned on Tuesday, as it identified a Pyongyang-linked group as an “advanced persistent threat”.

It was the first time that FireEye had used the designatio­n for a North Korean-based group.

Analysts say the isolated and impoverish­ed but nucleararm­ed North has stepped up hacking operations partly to raise money for the cashstrapp­ed regime, which is subject to multiple sanctions over its atomic weapons and ballistic missile programmes.

North Korea has previously been blamed for the WannaCry ransomware that briefly wreaked havoc around the world last year, an accusation it angrily denies.

FireEye said North Korean operatives had expanded their targets beyond South Korea and mounted increasing­ly sophistica­ted attacks, adding it had identified a suspected North Korean cyber espionage group it dubbed “APT37” — standing for “advanced persistent threat”.

APT37 was “primarily based in North Korea”, it said, and its choice of targets “aligns with North Korean state interests”.

“We assess with high confidence that this activity is carried out on behalf of the North Korean government,” it said. APT37 has been active at least since 2012, it said, previously focused on “government, military, defence industrial base and media sector” in the rival South before widening its range to include Japan, Vietnam and the Middle East last year.

“This group should be taken seriously,” FireEye added.

FireEye’s first APT was identified in a 2013 report by company division Mandiant. It said hackers penetratin­g US newspapers, government agencies and firms “are based primarily in China and that the Chinese government is aware of them”.

One group, it said then, was believed to be a branch of the People’s Liberation Army in Shanghai called Unit 61398. Five of its members were later indicted by US federal prosecutor­s on charges of stealing informatio­n from US firms, provoking a diplomatic row between Washington and Beijing.

“We have seen both North Korean and Chinese operations range from simplistic to very technicall­y sophistica­ted,” FireEye’s director of intelligen­ce analysis, John Hultquist, said.

“The sharpest difference between the two really lies in the aggressive nature of North Korean operations,” he added.

“Whereas Chinese actors have typically favoured quiet espionage, North Korea has demonstrat­ed a willingnes­s to carry out some very aggressive activity, ranging from attack to outright global crime.”

But the WannaCry ransomware, he believes, was the work of a different North Korean group. “Thus far, we have only found APT37 doing the quiet espionage but they are a tool the regime can use aggressive­ly.”

The North is known to operate an army of thousands of well-trained hackers who have attacked South Korean firms, institutio­ns and even rights groups helping North Korean refugees.

Its cyber warfare abilities first came to prominence when it was accused of hacking into Sony Pictures Entertainm­ent to take revenge for The Interview, a satirical film that mocked its leader, Kim Jong-un.

More recently, according to analysts, the North’s hackers have stepped up campaigns to raise funds by attacking cryptocurr­ency exchanges as the value of bitcoin and other cybercurre­ncies soared.

 ??  ?? Watch out: A poster for the Sony Pictures satirical film The Interview, which mocked Kim Jong-un. Pyongyang’s cyber warfare abilities were highlighte­d after Sony was hacked. /Reuters
Watch out: A poster for the Sony Pictures satirical film The Interview, which mocked Kim Jong-un. Pyongyang’s cyber warfare abilities were highlighte­d after Sony was hacked. /Reuters

Newspapers in English

Newspapers from South Africa