Fri, Oct 05, 2018 - Page 6 News List

N Koreans stole ‘hundreds of millions’

ATM HEISTS:‘APT38’ used malware to insert fake transactions into the SWIFT bank transfer system, showing growing skill at hacking the global financial system

AP, WASHINGTON

North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government might be gathering steam.

US security firm FireEye on Wednesday raised the alarm over a North Korean group, saying it has since 2014 stolen hundreds of millions of US dollars by infiltrating the computer systems of banks around the world through highly sophisticated and destructive attacks that have spanned at least 11 nations.

It said that the group is still operating and poses “an active global threat.”

It is part of a wider pattern of malicious state-backed cyberactivity that has led the US to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the US.

The US Department of Homeland Security on Tuesday warned of the use of malware by Hidden Cobra, the US government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa.

It said that Hidden Cobra was behind the theft of tens of millions of US dollars from teller machines in the past two years.

In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.

North Korea has previously denied involvement in cyberattacks and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as IP addresses and characteristics of the coding used in malware.

However, other cybersecurity experts said that they also see continued signs that Pyongyang, which has a long track record of criminality to raise cash, is conducting malign activity online.

That activity includes targeting financial institutions and cryptocurrency-related organizations, as well as spying on its adversaries, they said.

“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” CrowdStrike vice president of intelligence Adam Meyers said. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”

CrowdStrike said it has detected continuing North Korean cyberintrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea and a new variant of malware against users of mobile devices that use Linux.

FireEye said that APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014, as the economic vise on North Korea has tightened.

Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions, such as Latin America and Africa, and then extended to Europe and North America.

In all, FireEye said that APT38 has attempted to steal US$1.1 billion and, based on the data it can confirm, has gotten away with hundreds of millions.

It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication (SWIFT) system that is used to transfer money between banks.

Its biggest heist to date was US$81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn, they were suspected to have been laundered in casinos.

This story has been viewed 1495 times.

Comments will be moderated. Remarks containing abusive and obscene language, personal attacks of any kind or promotion will be removed and the user banned.

TOP top