Cybercrime Is North Korea's Biggest Threat
While the world is watching a battle of words, North Korea has been attacking the West and funding its global operations through cybercrime.
With the media doing its best to scare the daylights out of Americans over the North Korean nuclear threat, it's missing out on the real menace that is causing real damage: Kim Jong-un's brigade of hackers and cyber thieves.
North Korea has two cyberwarfare units -- Bureau 121 and No. 91 Office. Both are part of the Reconnaissance General Bureau of North Korea's military and have over 6,000 hackers, many of whom are based outside of North Korea. One of the suspected locations of a Bureau 121 cell is the Chilbosan Hotel in Shenyang, China. This location is known thanks to a defector.
So even though North Korea's Internet feed is something of a joke and the country is fairly bereft of technology, it has access to high-speed Internet and modern PCs in other countries.
Bureau 121 reportedly engages in more traditional cyber-warfare efforts aimed at military assets. South Korea has repeatedly blamed Bureau 121 for conducting GPS jamming aimed at South Korea. Bureau 121 is also reportedly behind attempted hacks of the THAAD anti-ballistic missile system being deployed to stop the North Korean missiles.
There is another group, DPRK Office 91, also known as the Lazarus Group. The WannaCry ransomware was linked back to the Lazarus Group, and it has engaged in other cybertheft as well.
In January 2016, a division of Lazarus called Bluenoroff hacked into the SWIFT banking network attached to the central bank of Bangladesh. The bank was utilizing used routers, and the terminals to do money transfers internationally were linked wirelessly to very old systems. The North Koreans managed to drop in a back door, got credentials and ordered the bank to issue money transfers for $951 million.
The Bangladesh bank caught wind of it and asked the New York Fed to block 30 transactions totaling $850 million. But five transactions issued by hackers, worth $101 million, went through. About $20 million was traced to Sri Lanka and recovered and $81 million was sent to the Philippines, with about $18 million recovered.
That wasn't their only attempted bank heist. In May 2016, a Vietnamese bank said it managed to stop a $1 million transfer. Later that month, Ecuador's Banco del Austro was bilked out of $12 million, with the money transferred to Hong Kong.
All of the heists exploited the SWIFT system used by banks and used the Dridex malware tool. Dridex, also known as Bugat and Cridex, is a form of malware that specializes in stealing bank credentials via a system of payloads delivered by macros in Microsoft Word. All that's needed is for an unwitting sucker to open a Word or Excel attachment and the macros download Dridex, infecting the computer and opening the victim to banking theft.
The FBI is reportedly working to build a case that North Korea directed the thefts, and it's getting help from Kaspersky Labs, Fire Eye, Symantec and BAE Systems Plc.
You're invited to attend Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo on October 18 featuring Comcast's Rob Howald and Charter's John Dickinson.
The Lazarus Group is also believed to be behind recent ransomware attacks on shipping giant Maersk, drug company Merck, DHL, FedEx, a British ad agency and a Russian oil and gas company.
The real question is how closely is China working with North Korea? While it pays lip service to wanting to reign in the North, it's allowing Bureau 121 to operate out of a hotel in China and is even rumored to be helping them. A group dubbed "Tonto Team" by FireEye is working from the same hotel in China as the North Korean Bureau 121 and targeting the THAAD system.
It's clear why they are doing this. North Korea has no economy to speak of and is under sanction by the UN. It needs money and is quite prepared to steal it. Education of bank employees is a must now with the Dridex malware, as well as securing the SWIFT system. Now that their methods are known, they can be defended against.
Related posts:
— Andy Patrizio has been a technology journalist for more than 20 years and remembers back when Internet access was only available through his college mainframe. He has written for InformationWeek, Byte, Dr. Dobb's Journal, eWeek, Computerworld and Network World.
Read more about:
Security NowAbout the Author
You May Also Like