Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

8/17/2017
05:50 PM
Andy Patrizio
Andy Patrizio
Andy Patrizio
50%
50%

Cybercrime Is North Korea's Biggest Threat

While the world is watching a battle of words, North Korea has been attacking the West and funding its global operations through cybercrime.

With the media doing its best to scare the daylights out of Americans over the North Korean nuclear threat, it's missing out on the real menace that is causing real damage: Kim Jong-un's brigade of hackers and cyber thieves.

North Korea has two cyberwarfare units -- Bureau 121 and No. 91 Office. Both are part of the Reconnaissance General Bureau of North Korea's military and have over 6,000 hackers, many of whom are based outside of North Korea. One of the suspected locations of a Bureau 121 cell is the Chilbosan Hotel in Shenyang, China. This location is known thanks to a defector.

So even though North Korea's Internet feed is something of a joke and the country is fairly bereft of technology, it has access to high-speed Internet and modern PCs in other countries.

Bureau 121 reportedly engages in more traditional cyber-warfare efforts aimed at military assets. South Korea has repeatedly blamed Bureau 121 for conducting GPS jamming aimed at South Korea. Bureau 121 is also reportedly behind attempted hacks of the THAAD anti-ballistic missile system being deployed to stop the North Korean missiles.

There is another group, DPRK Office 91, also known as the Lazarus Group. The WannaCry ransomware was linked back to the Lazarus Group, and it has engaged in other cybertheft as well.

In January 2016, a division of Lazarus called Bluenoroff hacked into the SWIFT banking network attached to the central bank of Bangladesh. The bank was utilizing used routers, and the terminals to do money transfers internationally were linked wirelessly to very old systems. The North Koreans managed to drop in a back door, got credentials and ordered the bank to issue money transfers for $951 million.

The Bangladesh bank caught wind of it and asked the New York Fed to block 30 transactions totaling $850 million. But five transactions issued by hackers, worth $101 million, went through. About $20 million was traced to Sri Lanka and recovered and $81 million was sent to the Philippines, with about $18 million recovered.

That wasn't their only attempted bank heist. In May 2016, a Vietnamese bank said it managed to stop a $1 million transfer. Later that month, Ecuador's Banco del Austro was bilked out of $12 million, with the money transferred to Hong Kong.

All of the heists exploited the SWIFT system used by banks and used the Dridex malware tool. Dridex, also known as Bugat and Cridex, is a form of malware that specializes in stealing bank credentials via a system of payloads delivered by macros in Microsoft Word. All that's needed is for an unwitting sucker to open a Word or Excel attachment and the macros download Dridex, infecting the computer and opening the victim to banking theft.

The FBI is reportedly working to build a case that North Korea directed the thefts, and it's getting help from Kaspersky Labs, Fire Eye, Symantec and BAE Systems Plc.


You're invited to attend Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo on October 18 featuring Comcast's Rob Howald and Charter's John Dickinson.

The Lazarus Group is also believed to be behind recent ransomware attacks on shipping giant Maersk, drug company Merck, DHL, FedEx, a British ad agency and a Russian oil and gas company.

The real question is how closely is China working with North Korea? While it pays lip service to wanting to reign in the North, it's allowing Bureau 121 to operate out of a hotel in China and is even rumored to be helping them. A group dubbed "Tonto Team" by FireEye is working from the same hotel in China as the North Korean Bureau 121 and targeting the THAAD system.

It's clear why they are doing this. North Korea has no economy to speak of and is under sanction by the UN. It needs money and is quite prepared to steal it. Education of bank employees is a must now with the Dridex malware, as well as securing the SWIFT system. Now that their methods are known, they can be defended against.

Related posts:

Andy Patrizio has been a technology journalist for more than 20 years and remembers back when Internet access was only available through his college mainframe. He has written for InformationWeek, Byte, Dr. Dobb's Journal, eWeek, Computerworld and Network World.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.