North Korean Cyber 'tunneling' In New Zealand

The NZ Government's electronic security services  are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers as a back door link to the Internet.

Foreign Minister Gerry Brownlee recently confirmed the Government Communications Security Bureau (GCSB) was looking into the claims made in a report by security and intelligence firm Recorded Future. The GCSB was looking at all aspects raised in the article to check if they were true.

The report said there were "large and active presences" of North Koreans in seven countries; India, New Zealand, Malaysia, Nepal, Kenya, Mozambique and Indonesia; as well in as China.

"Our source revealed not only above-average levels of activity to and from these nations, but to many local resources, news outlets, and governments, which was uncharacteristic of North Korean activity in other nations," the report said.

Its analysis found the limited number of North Korean leaders and ruling elite with access to the Internet were actively engaged in Western and popular social media and regularly read the news and used online streaming, gaming and other services.

There were four million mobile devices in North Korea and Facebook was the most widely used social networking site for North Koreans, the report said.

It said attempts to isolate the reclusive nation's elites and leaders were failing.

Brownlee suggested any activity through New Zealand may not necessarily be sinister and that it could be that North Koreans, who could not access the Internet and facing tough state controls, were using devices such as cellphones to look at what was going on in the rest of the world.

"If you think about North Korea a very isolated country so if there are North Koreans who are finding a way to get in contact with the outside world that's a good thing. If it's the elites keeping it all to themselves, it just further reinforces how corrupt that regime is."

He dismissed concerns about links between North Korea and China and the widespread use of Huawei equipment here.

"I think it's too far gone. If you went around this gathering of people here, you'd find any number who might be holding Huawei products, so I don't think it's worth getting too strung up about that."

Brownlee said he was not concerned about the perception in other countries, such as the United States, which knew New Zealand well enough to know it was not facilitating this activity.

Stuff

You Might Also Read: 

Snowden: New Zealand Spying on Pacific Islands:

In New Zealand, Hacking Is A Serious Business:

 

« Who Is Responsible for Cloud Security?
Russian Arrested For $4billion Bitcoin Theft »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Digital Defense Inc (DDI)

Digital Defense Inc (DDI)

DDI offers vulnerability scanning, penetration testing, web application testing, social engineering and additional security assessments.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

IgmGuru

IgmGuru

Igmguru offers certification online training courses for IT professionals and students. Get certified with high-in-demand job-oriented professional courses.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

CrashPlan

CrashPlan

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes.

Tactic Lab

Tactic Lab

Tactic Lab is a group of cybersecurity experts and managed security services provider focused on offensive and defensive security.