North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government might be gathering steam.
US security firm FireEye on Wednesday raised the alarm over a North Korean group, saying it has since 2014 stolen hundreds of millions of US dollars by infiltrating the computer systems of banks around the world through highly sophisticated and destructive attacks that have spanned at least 11 nations.
It said that the group is still operating and poses “an active global threat.”
It is part of a wider pattern of malicious state-backed cyberactivity that has led the US to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the US.
The US Department of Homeland Security on Tuesday warned of the use of malware by Hidden Cobra, the US government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa.
It said that Hidden Cobra was behind the theft of tens of millions of US dollars from teller machines in the past two years.
In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.
North Korea has previously denied involvement in cyberattacks and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as IP addresses and characteristics of the coding used in malware.
However, other cybersecurity experts said that they also see continued signs that Pyongyang, which has a long track record of criminality to raise cash, is conducting malign activity online.
That activity includes targeting financial institutions and cryptocurrency-related organizations, as well as spying on its adversaries, they said.
“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” CrowdStrike vice president of intelligence Adam Meyers said. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”
CrowdStrike said it has detected continuing North Korean cyberintrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea and a new variant of malware against users of mobile devices that use Linux.
FireEye said that APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014, as the economic vise on North Korea has tightened.
Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions, such as Latin America and Africa, and then extended to Europe and North America.
In all, FireEye said that APT38 has attempted to steal US$1.1 billion and, based on the data it can confirm, has gotten away with hundreds of millions.
It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication (SWIFT) system that is used to transfer money between banks.
Its biggest heist to date was US$81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn, they were suspected to have been laundered in casinos.
The Foundation for Defense of Democracies, a Washington think tank, on Wednesday said in a report that North Korea’s cybercapabilities provide an alternative means for challenging its adversaries.
While North Korean leader Kim Jong-un’s regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it said.
FireEye head of global intelligence Sandra Joyce said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds.
On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything, and when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.
“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the US government to provide more specific threat information to financial institutions about APT38’s modus operandi.
The Silicon Valley-based company said it is aware of continuing, suspected APT38 operations against other banks.
The most recent attack it is publicly attributing to APT38 was in May against Chile’s biggest commercial bank, Banco de Chile. The bank said a hacking operation robbed it of US$10 million.
China’s military news agency yesterday warned that Japanese militarism is infiltrating society through series such as Pokemon and Detective Conan, after recent controversies involving events at sensitive sites. In recent days, anime conventions throughout China have reportedly banned participants from dressing as characters from Pokemon or Detective Conan and prohibited sales of related products. China Military Online yesterday posted an article titled “Their schemes — beware the infiltration of Japanese militarism in culture and sports.” The article referenced recent controversies around the popular anime series Pokemon, Detective Conan and My Hero Academia, saying that “the evil influence of Japanese militarism lives on in
ANTI-SEMITISM: Some newsletters promote hateful ideas such as white supremacy and Holocaust denial, with one describing Adolf Hitler as ‘one of the greatest men of all time’ The global publishing platform Substack is generating revenue from newsletters that promote virulent Nazi ideology, white supremacy and anti-Semitism, a Guardian investigation has found. The platform, which says it has about 50 million users worldwide, allows members of the public to self-publish articles and charge for premium content. Substack takes about 10 percent of the revenue the newsletters make. About 5 million people pay for access to newsletters on its platform. Among them are newsletters that openly promote racist ideology. One, called NatSocToday, which has 2,800 subscribers, charges US$80 for an annual subscription, although most of its posts are available
GLORY FACADE: Residents are fighting the church’s plan to build a large flight of steps and a square that would entail destroying up to two blocks of homes Barcelona’s eternally unfinished Basilica de la Sagrada Familia has grown to become the world’s tallest church, but a conflict with residents threatens to delay the finish date for the monument designed more than 140 years ago. Swathed in scaffolding on a platform 54m above the ground, an enormous stone slab is being prepared to complete the cross of the central Jesus Christ tower. A huge yellow crane is to bring it up to the summit, which will stand at 172.5m and has snatched the record as the world’s tallest church from Germany’s Ulm Minster. The basilica’s peak will deliberately fall short of the
Venezuelan Nobel peace laureate Maria Corina Machado yesterday said that armed men “kidnapped” a close ally shortly after his release by authorities, following former Venezuelan president Nicolas Maduro’s capture. The country’s Public Prosecutor’s Office confirmed later yesterday that former National Assembly vice president Juan Pablo Guanipa, 61, was again taken into custody and was to be put under house arrest, arguing that he violated the conditions of his release. Guanipa would be placed under house arrest “in order to safeguard the criminal process,” the office said in a statement. The conditions of Guanipa’s release have yet to be made public. Machado claimed that