North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government might be gathering steam.
US security firm FireEye on Wednesday raised the alarm over a North Korean group, saying it has since 2014 stolen hundreds of millions of US dollars by infiltrating the computer systems of banks around the world through highly sophisticated and destructive attacks that have spanned at least 11 nations.
It said that the group is still operating and poses “an active global threat.”
It is part of a wider pattern of malicious state-backed cyberactivity that has led the US to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the US.
The US Department of Homeland Security on Tuesday warned of the use of malware by Hidden Cobra, the US government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa.
It said that Hidden Cobra was behind the theft of tens of millions of US dollars from teller machines in the past two years.
In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.
North Korea has previously denied involvement in cyberattacks and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as IP addresses and characteristics of the coding used in malware.
However, other cybersecurity experts said that they also see continued signs that Pyongyang, which has a long track record of criminality to raise cash, is conducting malign activity online.
That activity includes targeting financial institutions and cryptocurrency-related organizations, as well as spying on its adversaries, they said.
“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” CrowdStrike vice president of intelligence Adam Meyers said. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”
CrowdStrike said it has detected continuing North Korean cyberintrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea and a new variant of malware against users of mobile devices that use Linux.
FireEye said that APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014, as the economic vise on North Korea has tightened.
Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions, such as Latin America and Africa, and then extended to Europe and North America.
In all, FireEye said that APT38 has attempted to steal US$1.1 billion and, based on the data it can confirm, has gotten away with hundreds of millions.
It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication (SWIFT) system that is used to transfer money between banks.
Its biggest heist to date was US$81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn, they were suspected to have been laundered in casinos.
The Foundation for Defense of Democracies, a Washington think tank, on Wednesday said in a report that North Korea’s cybercapabilities provide an alternative means for challenging its adversaries.
While North Korean leader Kim Jong-un’s regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it said.
FireEye head of global intelligence Sandra Joyce said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds.
On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything, and when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.
“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the US government to provide more specific threat information to financial institutions about APT38’s modus operandi.
The Silicon Valley-based company said it is aware of continuing, suspected APT38 operations against other banks.
The most recent attack it is publicly attributing to APT38 was in May against Chile’s biggest commercial bank, Banco de Chile. The bank said a hacking operation robbed it of US$10 million.
Le Tuan Binh keeps his Moroccan soldier father’s tombstone at his village home north of Hanoi, a treasured reminder of a man whose community in Vietnam has been largely forgotten. Mzid Ben Ali, or “Mohammed” as Binh calls him, was one of tens of thousands of North Africans who served in the French army as it battled to maintain its colonial rule of Indochina. He fought for France against the Viet Minh independence movement in the 1950s, before leaving the military — as either a defector or a captive — and making a life for himself in Vietnam. “It’s very emotional for me,”
Indian Prime Minister Narendra Modi reaffirmed his pledge to replace India’s religion-based marriage and inheritance laws with a uniform civil code if he returns to office for a third term, a move that some minority groups have opposed. In an interview with the Times of India listing his agenda, Modi said his government would push for making the code a reality. “It is clear that separate laws for communities are detrimental to the health of society,” he said in the interview published yesterday. “We cannot be a nation where one community is progressing with the support of the Constitution while the other
The Chinese Communist Party’s (CCP) Central Committee is to gather in July for a key meeting known as a plenum, the third since the body of elite decisionmakers was elected in 2022, focusing on reforms amid “challenges” at home and complexities broad. Plenums are important events on China’s political calendar that require the attendance of all of the Central Committee, comprising 205 members and 171 alternate members with Chinese President Xi Jinping (習近平) at the helm. The Central Committee typically holds seven plenums between party congresses, which are held once every five years. The current central committee members were elected at the
CODIFYING DISCRIMINATION: Transgender people would be sentenced to three years in prison, while same-sex relations could land a person in jail for more than a decade Iraq’s parliament on Saturday passed a bill criminalizing same-sex relations, which would receive a sentence of up to 15 years in prison, in a move rights groups condemned as an “attack on human rights.” Transgender people would be sentenced to three years’ jail under the amendments to a 1988 anti-prostitution law, which were adopted during a session attended by 170 of 329 lawmakers. A previous draft had proposed capital punishment for same-sex relations, in what campaigners had called a “dangerous” escalation. The new amendments enable courts to sentence people engaging in same-sex relations to 10 to 15 years in prison, according to the