(The Conversation is an independent and nonprofit source of news, analysis and commentary from academic experts.)
<a target=”—blank” href=”https://theconversation.com/profiles/dorothy-denning-308774″>Dorothy Denning</a>, <a target=”—blank” href=”http://theconversation.com/institutions/naval-postgraduate-school-2795″>Naval Postgraduate School</a>
(THE CONVERSATION) The countries posing the greatest cyberthreats to the United States are <a target=”—blank” href=”https://theconversation.com/tracing-the-sources-of-todays-russian-cyberthreat-81593″>Russia</a>, <a target=”—blank” href=”https://theconversation.com/how-the-chinese-cyberthreat-has-evolved-82469″>China</a>, <a target=”—blank” href=”https://theconversation.com/following-the-developing-iranian-cyberthreat-85162″>Iran</a> and North Korea. Like its counterparts, Kim Jong Un’s regime engages in substantial cyber espionage. And like Russia and Iran, it launches damaging cyberattacks that wipe data from computer disks and shut down online services.
But the North Korean cyberthreat is different in two ways. First, the regime’s online power did not grow out of groups of independent hackers. Even today, it seems unlikely the country has hackers who operate independent of the government. Second, North Korea’s cybercrime efforts – all seemingly state-sponsored – steal money that is then used to fund its cash-strapped government.
One reason for North Korea’s apparent lack of independent hackers is that most North Koreans do not have internet access. Although the country has had an <a target=”—blank” href=”https://arstechnica.com/information-technology/2017/10/as-us-launches-ddos-attacks-n-korea-gets-more-bandwidth-from-russia/”>internet connection through China</a> for several years, <a target=”—blank” href=”https://fas.org/sgp/crs/row/R44912.pdf”>it’s reserved</a> for elites and foreign visitors. Would-be hackers can’t launch attacks across borders; they can’t even pick up hacking manuals, code and tips from the many online forums that other hackers in other nations use to learn the trade and share information.
On top of that, North Korea maintains exceptionally strong controls over its population. Any hacking attributed to North Korea is likely done for the government if not by the government directly.
North Korea’s <a target=”—blank” href=”http://www.keia.org/publication/north-koreas-cyber-warfare-and-challenges-us-rok-alliance”>cyber warriors</a> work primarily for the General Bureau of Reconnaissance or the General Staff Department of the Korean People’s Army. Prospective candidates are selected from schools across the country and trained in cyber operations at <a target=”—blank” href=”http://www.zdnet.com/article/a-glimpse-into-the-world-of-north-koreas-hacking-elite/”>Pyongyang University of Automation</a> and other colleges and universities. By 2015, the South Korean military estimated the KPA employed <a target=”—blank” href=”http://www.telegraph.co.uk/news/worldnews/asia/northkorea/11329480/North-Korea-doubles-its-cyber-warfare-team-to-6000-troops.html”>up to 6,000 cyber warfare experts</a>.
North Korean hackers operate from facilities in <a target=”—blank” href=”http://www.keia.org/publication/north-koreas-cyber-warfare-and-challenges-us-rok-alliance”>China and other foreign countries</a> where their government sends or permits them to work. Indeed, the country has reportedly sent hundreds of hackers into nearby countries to <a target=”—blank” href=”https://www.bloomberg.com/news/features/2018-02-07/inside-kim-jong-un-s-hacker-army”>raise money</a> for the regime. Many of the cyberattacks attributed to North Korea have been <a target=”—blank” href=”https://www.reuters.com/article/us-cyber-northkorea-exclusive/exclusive-north-koreas-unit-180-the-cyber-warfare-cell-that-worries-the-west-idUSKCN18H020″>traced back to locations inside China</a>.
From espionage to sabotage
North Korea has been using cyber operations <a target=”—blank” href=”http://faculty.nps.edu/dedennin/publications/CNO%20threat.pdf”>to spy on</a> the U.S. and South Korea since at least 2004. U.S. targets have included <a target=”—blank” href=”https://www.nytimes.com/2017/10/10/world/asia/north-korea-hack-war-plans.html”>military entities</a> and the State Department. North Korea uses cyber espionage to acquire foreign technology, including <a target=”—blank” href=”http://money.cnn.com/2017/10/31/news/north-korea-hack-stole-south-korea-warship-plans/index.html”>technologies relating to weapons</a> of mass destruction, unmanned aerial vehicles and missiles.
By 2009, North Korea had expanded its cyber operations to include acts of sabotage. The first of these <a target=”—blank” href=”https://www.csmonitor.com/Technology/Horizons/2009/0708/north-korean-hackers-blamed-for-sweeping-cyber-attack-on-us-networks”>took place in July 2009</a>, when massive distributed denial of service (DDoS) attacks shut down targets in the U.S. and South Korea. The attackers also used “wiper” malware to delete data on disks.
North Korea has continued to <a target=”—blank” href=”https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war”>launch DDoS and disk-wiping attacks</a> over the years, targeting banks as well as other military and civilian systems in the U.S. and South Korea. A cyberattack in April 2011 against South Korea’s agricultural banking cooperative Nonghyup was said to <a target=”—blank” href=”https://www.reuters.com/article/us-korea-north-cyber/north-korea-hackers-behind-attack-on-s-korea-bank-prosecutors-idUSTRE7421Q520110503″>shut down the bank’s credit card and ATM services</a> for more than a week.
In December 2014, the North’s attackers hit desktop computers in a South Korean <a target=”—blank” href=”https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/korean-nuclear-plant-faces-data-leak-and-destruction”>nuclear plant</a> with wiper malware that destroyed not only the data on hard drives, but also the master boot record startup software, making recovery more difficult. In addition, the attack stole and leaked blueprints and employee information from the plant.
North Korea has also been accused of trying to <a target=”—blank” href=”https://www.nbcnews.com/news/north-korea/experts-north-korea-targeted-u-s-electric-power-companies-n808996″>hack electric power companies</a> in the U.S. and a <a target=”—blank” href=”https://www.thestar.com/news/gta/2018/01/23/metrolinx-targeted-by-north-korean-cyberattack.html”>railroad system</a> in Canada.
The attack on Sony
The attack on the nuclear facility took place about a month after North Korea attacked <a target=”—blank” href=”https://fortune.com/sony-hack-part-1/”>Sony Pictures</a> with wiper malware that zapped <a target=”—blank” href=”https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/?utm%E2%80%94term=.04b27501bbc7″>over 4,000 of the company’s desktop computers</a> and servers. The attackers also stole and posted pre-release movies and <a target=”—blank” href=”https://www.theguardian.com/technology/2014/dec/14/sony-pictures-email-hack-greed-racism-sexism”>sensitive, often embarrassing, emails</a> and other data taken from the company.
Calling themselves the “Guardians of Peace,” the attackers demanded that Sony withhold release of the satirical film “<a target=”—blank” href=”http://www.imdb.com/title/tt2788710/”>The Interview</a>,” which depicts an assassination attempt against North Korea’s leader, Kim Jong-un. The attackers also <a target=”—blank” href=”https://www.theguardian.com/film/2014/dec/16/employees-sue-failure-guard-personal-data-leaked-hackers”>threatened violence</a> against any movie theaters showing the film.
Although theaters initially canceled their scheduled showings, ultimately <a target=”—blank” href=”https://deadline.com/2017/04/as-north-korea-rumbles-insiders-tell-how-small-players-stood-tall-helping-sonys-the-interview-1202069868/”>the film was released</a> both online and in theaters. North Korea’s <a target=”—blank” href=”https://www.cfr.org/blog/north-koreas-offensive-cyber-program-might-be-good-it-effective”>coercive attempts</a> failed, as they have in other cases.
In recent years, North Korea started <a target=”—blank” href=”https://motherboard.vice.com/en%E2%80%94us/article/8xvnmv/facebook-is-disrupting-north-korean-hacking-operations”>using cyber operations</a> to generate revenue for the government. This is done through several illicit means, including outright theft of funds, extortion and <a target=”—blank” href=”https://www.thecipherbrief.com/kim-digs-cybercrime-coin-sanctions-cant-snatch”>cryptocurrency mining</a>.
In early 2016, the regime came close to stealing US$951 million from the <a target=”—blank” href=”https://www.nytimes.com/2016/05/27/business/dealbook/north-korea-linked-to-digital-thefts-from-global-banks.html”>Bangladesh Central Bank</a> over the global SWIFT financial network. Fortunately, because of a misspelling, they only succeeded in moving $81 million. Analysts attributed the attack to the “<a target=”—blank” href=”https://www.cfr.org/blog/north-koreas-offensive-cyber-program-might-be-good-it-effective”>Lazarus Group</a>,” the same group believed to be behind many of the attacks tied to North Korea, including those against Sony and other banks.
The Lazarus Group has also been <a target=”—blank” href=”https://www.cnn.com/2017/12/18/politics/white-house-tom-bossert-north-korea-wannacry/index.html”>blamed</a> for the <a target=”—blank” href=”https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html”>WannaCry</a> ransomware that spread to computers in 150 countries in 2017. After encrypting data on a victim’s computer, the malware demanded payment in the bitcoin digital currency to get access back.
North Korea has been <a target=”—blank” href=”https://www.bloomberg.com/news/articles/2018-01-02/north-korean-hackers-hijack-computers-to-mine-cryptocurrencies”>mining cryptocurrencies</a> on hacked computers as well. The hijacked machines run software that “earns” the digital currency by performing a computationally difficult task. The funds are then directed into an account tied to the hackers.
North Korean hackers also <a target=”—blank” href=”https://www.scmagazineuk.com/more-evidence-emerges-of-north-korea-targeting-cryptocurrency-industry/article/719498/”>attack cryptocurrency exchanges</a>. They have reportedly <a target=”—blank” href=”http://www.scmp.com/news/world/article/2131470/north-korea-barely-wired-so-how-did-it-become-global-hacking-power”>stolen millions of dollars</a> worth of bitcoin from two exchanges in South Korea and attempted thefts from 10 others.
A cybercrime power
Like other countries, North Korea uses cyber espionage and cyber sabotage to acquire secrets and harm adversaries. But it stands out from other countries in its use of <a target=”—blank” href=”https://www.fastcompany.com/40525120/north-korea-hackers-money-bitcoin-cryptocurrency-theft-sanctions”>cybercrime to finance</a> its programs. This is perhaps not surprising given North Korea’s <a target=”—blank” href=”https://fas.org/sgp/crs/row/RL33324.pdf”>history of counterfeiting</a> U.S. currency and using other <a target=”—blank” href=”https://www.thedailybeast.com/are-cyber-crooks-funding-north-koreas-nukes”>illicit activities</a> to acquire funds.
The introduction of online transactions and digital currencies, coupled with inadequate cybersecurity, has opened the doors to North Korea for illicitly acquiring funds by new means. Given the country’s appetite for building nuclear and other weapons, as well as the effects of economic sanctions, it seems likely that North Korea will continue to seek ways of exploiting the cyber world for economic advantage.
This article was originally published on The Conversation. Read the original article here: <a target=”—blank” href=”http://theconversation.com/north-koreas-growing-criminal-cyberthreat-89423″>http://theconversation.com/north-koreas-growing-criminal-cyberthreat-89423</a>.
<div><img src=”https://counter.theconversation.com/content/89423/count.gif?distributor=ap” width=”1″ height=”1″ /></div>