Joint Opposition To Online Threats From North Korea

The USA, Japan and South Korea have established a high-level consultative body designed to counter North Korea’s cyber activities. At the meeting in Tokyo on December 7th the new cyber security working group and the national security advisers agreed  on a new project to respond to North Korea’s threats in cyberspace,  including crypto currency abuses and space launches.

This comes as North Korea’s has increased its nuclear and missile program saying there is an escalatory nuclear doctrine authorising the use of nuclear weapons.

The United States and its Asian allies have responded by increasing the visibility of their trilateral partnership in the region and strengthening their combined military exercises. In particular, the allies have “launched new trilateral initiatives to counter the threats posed by the DPRK, from its cyber crime and crypto-currency money laundering to its reckless space and ballistic missile tests,” White House National Security Advisor Jake Sullivan told reporters.

“This will be a new effort with respect to crypto-currency and money laundering and how we disrupt North Korea’s capacity to gain revenue from the hacking and stealing of crypto-currency and then laundering it through exchanges,” Sullivan said.

The leaders said they had worries about what they described as North Korea’s “malicious” cyber-activities in support of its banned weapons programmes. Crypto currency funds stolen by North Korean hackers has been vital to funding the country’s weapons programmes, according to the United Nations. The meeting coincided with increased concerns about the North Korean leader Kim Jong Un accelerating the expansion of his nuclear and missile programme and declared nuclear doctrine that authorises the preemptive use of nuclear weapons.

Washington, Seoul and Tokyo have also expressed concerns about a potential arms alignment between North Korea and Russia. They worry Kim is providing badly needed munitions to help Russian President Vladimir Putin wage war in Ukraine in exchange for Russian technology assistance to upgrade his nuclear-armed military.

US State Dept:    NKNewsAl Jazeera:     Reuters:     APNews:    Bloomberg:     Infosecurity Magazine:

Image: Steve Barker

You Might Also Read: 

Defending Against North Korea's Cyber Threats:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Microsoft Takes Action To Stop Sales Of Fake Accounts
Russia Steps Up Cyberwar Against Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.