North Korea’s crypto-heists show vulnerabilities in Western security: experts


North Korea’s tireless cryptocurrency theft operations have highlighted vulnerabilities in the U.S. security ecosystem, raising questions of safety in the face of more effective cyberthreats from Russia and China.

“They’ve gotten into U.S. government websites,” Bruce Klingner, senior research fellow for northeast Asia at the Heritage Foundation, told Fox News Digital. “They’ve gotten into the U.S. financial systems, companies, systems, [and] they were even going after COVID vaccine companies like Pfizer and others to try to get information on the vaccine.”

“It really is an amazingly extensive and capable system,” he added.

Some estimates indicate Pyongyang stole approximately $400 million in 2022 and took in $1 billion in the first nine months of 2022, making cryptocurrency a significant source of income.

FORMER NATIONAL SECURITY ADVISER ADDRESSES NORTH KOREA AND CHINA FEARS

North Korean hackers were able to secure $615 million in assets in March alone, making it the largest cryptocurrency heist on record.

What started as purely espionage-based cyberattacks quickly led to extensive and sophisticated operations to obtain cryptocurrency in order to fund missile programs and other military operations.

North Korean hackers were able to secure $615 million in assets in March alone, making it the largest cryptocurrency heist on record.
(Korean Central News Agency/Korea News Service via AP)

North Korea’s missile tests this year cost at least $620 million, with plans to resume nuclear testing amid an economic crisis, according to Reuters.

“I remember doing interviews about the Sony hack in 2014 when a lot of the interviewers were just thinking, ‘Well, North Korea can’t even keep the lights on at night,'” Klingner said. “If you look at the famous nighttime satellite photos, how could they possibly do something like a Sony hack?”

NORTH KOREA UNVEILS DAUGHTER OF KIM JONG-UN AT MISSILE LAUNCH SITE

“Well, it was North Korea, and they’ve only gotten better,” he continued. “But even I was astounded when I was doing the research for this paper last year about how broadly they’ve expanded their cyberattacks.”

The Foundation for Defense of Democracies (FDD) outlined two main ways by which Pyongyang’s hackers succeed in stealing traditional funds: first, by seizing control of a bank’s financial transfer system run by the Society for Worldwide Interbank Financial Telecommunications – the infamous SWIFT system; second, breaching ATMs to dispense cash, which agents can then collect.

North Korea leader Kim Jong-un oversees a missile launch at an undisclosed location in North Korea in this photo released on Oct. 9, 2022, by the Korean Central News Agency.

North Korea leader Kim Jong-un oversees a missile launch at an undisclosed location in North Korea in this photo released on Oct. 9, 2022, by the Korean Central News Agency.
(KCNA via Reuters)

But North Korea has developed long-term “spear phishing” operations, which involve malicious emails spoofing attacks against individuals or groups, in some cases developing entire profiles on websites like LinkedIn or Facebook to convince targets of their authenticity.

North Korea committed at least 49 hacks from 2017 to 2021, according to New York-based blockchain analytics firm Chainalysis. 

HEZBOLLAH TRANSPORTING CHEMICAL WEAPONS TO LEBANON WITH HELP OF IRAN AND NORTH KOREA, REPORT CLAIMS

The fluctuations in the crypto market this year have dampened the success of those hacks, with crypto losing 80% to 85% of value in June 2022, but the realities are that these hacks have exposed far more alarming questions about North Korea’s cybercapabilities and Western nations’ vulnerabilities.

“Within the cybersecurity space, the large-scale significant theft of cryptocurrencies is demonstrating North Korea’s capabilities to engage both in attacks that leverage and cybervulnerabilities, problems with code itself, as well as engaging in social engineering attacks,” Annie Fixler, deputy director of the Center on Cyber and Technology Innovation at the FDD, told Fox News Digital.

North Korean men and women use computer terminals at the Sci-Tech Complex in Pyongyang, North Korea, June 16, 2017.

North Korean men and women use computer terminals at the Sci-Tech Complex in Pyongyang, North Korea, June 16, 2017.
(Copyright 2017 The Associated Press. All rights reserved.)

“The attacks we’ve seen have leveraged both where North Korean hackers can track a U.N. administrator and someone [who] has access to systems to click a malicious link as hackers often do,” Fixler said. “Then, in other instances, North Korean hackers have exploited problems with code, particularly as it relates to cryptocurrency bridges, the pieces that connect differently, how you can transfer assets from one blockchain to another, blockchain for bridges.”

NORTH KOREA TEST LAUNCHES BALLISTIC MISSILE CAPABLE OF STRIKING ANYWHERE IN US

“So, there have been vulnerabilities in those systems that North Korea has demonstrated their capabilities, sophistication and ingenuity and determination that this is a worthwhile avenue for them to pursue in the broader national security space.”

Fixler noted that despite the capabilities North Korea has displayed, she would still rank them third compared to China and Russia – who continue “vying for the top spot on any given day” – and with Iran as a distant fourth in terms of cyberthreats.

CLICK HERE TO GET THE FOX NEWS APP 

But in all cases, the rogue nations have developed “more sophisticated, more determined and more innovative” operations, according to Fixler.

She argued that North Korea’s actions indicate a longer-term risk to the financial integrity, national security and traditional operations of the United States.



Source link

Denial of responsibility! galaxyconcerns is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.

Leave A Reply

Your email address will not be published.