North Korean Hackers Have Stolen $2billion

North Korea has stolen $2 billion by launching cyber attacks on financial organisations and crypto-currency exchanges and  the money has been used to buy military equipment. 

United Nations experts say North Korea used cyberspace to launch increasingly sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to generate income. They also used cyber-space to launder the stolen money. According to a report submitted to the UN Security Council committee, the widespread and “increasingly sophisticated” attacks saw North Korean hackers stealing funds and attempting to launder the stolen money. 

The leaked UN Report, said the DPRK hackers target the financial institutions and crypto exchanges across 17 countries.
The report also cites two 2018 bank attacks that, like the Bangladesh Bank incident, tapped into the Swift messaging system: a $10 million theft from Banco de Chile and a $13.5 million ATM cash-out hit on Cosmos Bank in India. "Democratic People's Republic of Korea (DPRK) cyber actors, many operating under the direction of the Reconnaissance General Bureau, raise money for its WMD (weapons of mass destruction) programs, with total proceeds to date estimated at up to $2 billion," the report said. 

Crypto-currencies were targeted by hackers because they are less easy to trace. According to the leaked UN report, the attacks on crypto-currency exchanges allowed North Korea “to generate income in ways that are harder to trace and subject to less government oversight and regulation than the traditional banking sector.” 

The news North Korea is using cyberspace to steal cryptocurrencies and mine bitcoin isn’t new. In March, a UK report said North Korean hackers had stolen around $571 million across at least five cryptocurrency exchanges in Asia between January 2017 and September 2018. 

The leaked UN report shows just how developed the nation’s capabilities are becoming, says Philip Ingram, a former colonel in British military intelligence. “The worrying thing is: If they can do this, they are just as capable of stealing intellectual property (IP), enabling them to maintain their scientific and engineering development.”

Additionally, Ingram says, it raisesquestions about who the country is buying its weapons from. “Who are the countries ignoring international sanctions and supplying advance engineering capability and weapons or weapons parts to North Korea? They don't need the money for internal use.”

A spokesman for international insurance firm AMTrust Europe says the move shows the regime “looking at cyber to level the playing field”. However, they don't see North Korea as a big threat when compared with the combined power and funding of the big 5Eyes Australia, Canada, New Zealand, the UK and the US. 

North Korea's state-sponsored hacking crews are breaking into online stores to insert malicious code that can steal buyers' payment card details as they visit the checkout page and fill in payment forms.Attacks on online stores have been going on since May 2019, according to the  Dutch cybersecurity firm SanSec.

The fact that North Korean hackers have been involved in web skimming incidents is not a surprise to industry experts, as they have consistently gravitated towards any type of cybercrime that can generate a profit.

The US government also has said it wants to seize 113 crypto-currency accounts associated with North Korean money laundering, a high-tech cat-and-mouse-style conflict in which money launderers have turned to elaborate automated schemes to conceal their cryptocurrency transactions and frustrate law enforcement.

Forbes:       FinExtra:        ZDNet:       MITechnolgy Review:

You Might Also Read: 

N.Korean Hackers Are Working With European Criminals:

 

 

« Russian Hackers At Work Stealing Coronavirus Vaccine Data
Google Doubles Down On India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.