Poor North Korea Is A Cyber Superpower

There's no war, but a war-like situation prevails online between the United States and North Korea. 

The West often calls the communist country impoverished. A naive assessment if you consider Pyongyang's proclivity for destruction, even if it's of the virtual kind.

The North may be poor, it may be a hermit kingdom, but it's definitely not short of ideas that go a long way to punish its enemies and scuttle their plans even before a single bullet is fired. A cyber war is in full swing.

Hackers from the North are busy, stealing, pilfering from the West and the South. Seoul must be worried about the latest revelations of hacking.

It said war plans were stolen from the South's defence ministry a year ago. Which means the Kim regime was aware of an assassination plot against the feared and dangerous leader for a while.

One reason why the North's foes have not been able to make much headway with the secretive regime because their plans were not and are not secret. They are putting it out there, online, and Kim Jong-un and his cohorts are having a field day. They must be laughing all the way to their villas, mansions or their nuclear bunkers. Who needs friends when you have foes like these who don't know how to cover their tracks? 

It doesn't help that US President Trump is creating a much needed cyber diversion for North Korea with his comments. So much has been said after he promised 'fire and fury' that he is now beginning to sound comical.

'One thing will work' with N. Korea, he said, but we are certain that he will not launch any strike on an opponent who loves to taunt knowing that he has nuclear leverage.

These attacks from the North not only lay bare the West's and South Korea's vulnerabilities but also reveal its plots which kills the element of surprise.

Ein News:   Chart: Mark Humphrys

You Might Also Read: 

How Worried Should We Be About a Nuclear War With North Korea?:

N. Korea Is Ready For Global Cyber Conflict:

North Korea Denies Involvement In WannaCry:

 

« Where Should The Pentagon Focus In Cyberspace?
Unstructured Data: Threats You Cannot See »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Conference-Service.com

Conference-Service.com

Conference-Service.com provides a categorised calendar of conferences and events which includes Information Security.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

SCALABLE Network Technologies

SCALABLE Network Technologies

SCALABLE deliver network virtualization technology for development, analysis, evaluation, and training to military, governmental, commercial, and academic institutions.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.