Toggle navigation
  • 0
  • 연구원소개
    • 원장인사말
    • 설립취지/연혁
    • 추진사업
    • 조직과 사람들
    • 오시는길
  • 연구원활동 N 
    • 자유민주포럼
    • 연구원동정
    • 세미나/정책토론
    • 유동열의 남북진단
    • 해외사업
    • 방송출연 · 보도
    • 자유민주아카데미
    • 정책자료실
    • 언론보도
    • 유튜브채널
    • 자유민주 사상전
    • 유동열의 안보전선
  • 커뮤니티
    • 핫이슈
    • 공지사항
  • 참여
    • 자유게시판
  • 신고 및 신청창
    • 자유민주아카데미신청
    • 자유민주강연 신청
    • 국가정체성 훼손신고
  • 자유민주TV
  • 자유민주연구학회
    • 설립취지
    • 연혁
    • 추진사업
    • 임원
  • 사법정의실현 국민감시센터
  • 회원가입  |  정보찾기
ICON NAVIGATION
HOME 알림장 자유TV 1:1문의
SITE LINK

- 바른사회시민회의
- 헌법을 생각하는 변호사 모임
- 한반도 인권과 통일을 위한 변호사 모임
- 조갑제닷컴

  • 현재 접속자 61 명
  • 오늘 방문자 659 명
  • 어제 방문자 964 명
  • 최대 방문자 3,887 명
  • 전체 방문자 849,871 명
  • 전체 게시물 1,640 개
  • 전체 댓글수 12 개
페이스북에 공유 트위터에 공유 구글플러스에 공유 카카오스토리에 공유 네이버밴드에 공유
홈 > 연구원활동 > 언론보도
언론보도

최고관리자 Kim Jong Un’s cyber army raises cash for North Korea(Financial Times)

최고관리자 0 819 2019.06.19 09:55

THE FINANCIAL TIMES


Kim Jong Un’s cyber army raises cash for North Korea

Pyongyang targets cryptocurrency and gaming as sanctions bite

 

Edward White and Kang Buseong in Seoul 


The two men have just set a trap: a digital wallet storing bitcoin has been moved to a seemingly unsecured device. The pair, perched in front of four computers and five laptops, watch as lines of computer code and Korean text stream down the array of screens, bracing for North Korean hackers to swoop. “We call this the honeypot,” said Kwon Seok-chul, chief executive of cyber security group Cuvepia in Seoul. “They can’t see us, but we can see them.” Methods like this enable cyber experts to identify and track hackers from North Korea to help protect companies and governments against their attacks. 

 

These tactics are becoming more important amid signs that Kim Jong Un’s regime, under immense economic pressure from sanctions, increasingly depends on cash from cyber-based theft. Pyongyang controls an army of thousands of hackers who bring in hundreds of millions of dollars annually, according to experts’ estimates. With North Korea cut off from most trade with the outside world, the cash generated from illicit cyber-based activities is thought to have become a core revenue stream for Pyongyang and has now probably surpassed the value of sales of weapons and military services. 


“All the channels of trade, regardless of the legality, have largely shrunk. The weapons trade is limited. Cyber activities is one of the remaining ways for North Korea to earn foreign currency now,” said Yoo Dong-ryul, director of the Korea Institute of Liberal Democracy, a think-tank in Seoul. 

 

There was an impression that these [banking hacking operations] were opportunistic targets. We can see they are decidedly not Priscilla Moriuchi, former US National Security Agency analyst The rise of North Korea’s hacking, online theft and fraud also marks the latest example of the Kim regime’s decades-long struggle to bring in cash to the country via unorthodox and illicit means, and follows reported cases of global insurance fraud and the production of counterfeit money and drugs. Pyongyang’s cyber warfare operations gained notoriety with US authorities blaming groups linked to the government for hacking Sony Pictures in 2014 and for the WannaCry global malware attack in 2017, as well as multimillion dollar heists from banks in India, Chile and Bangladesh.

 

Estimates vary as to exactly how much money North Korea now makes from any of its illicit activities — researchers urge caution over any figures, with one US government analyst describing assessments as “guesstimates upon guesstimates”. A sense of the scale of the crimes can be gained from a UN report published in March, which included analysis detailing five attacks on cryptocurrency exchanges between January 2017 and September 2018 resulting in a loss of $571m. The US has put the value of attempted cyber heists from 2015 to 2018 by just one North Korean hacker, Park Jin Hyok, and his co-conspirators at over $1bn. By comparison, North Korean weapons sales to countries including Syria, Libya and Iran were estimated at around $500m annually in the mid-2000s. 

 

South Korean officials have become wary about criticising North Korea directly about any provocations and threats — including a series of weapons tests in May — over fears of derailing efforts to get Kim Jong Un to end his nuclear and weapons programme. However, the frequency and sophistication of North Korea’s cyber-based activities has continued to advance, analysts warned. US announces charges against N Korean hacker over global cyber crime Luke McNamara, an analyst at cyber security consultancy FireEye, said there had not been “any abatement” in hackers’ targeting of banks and cryptocurrency exchanges in recent months. Priscilla Moriuchi, a former US National Security Agency analyst, said the North Korean operatives had proved themselves “persistent, patient and skilled”, belying perceptions of the world’s most isolated country as a technological backwater. “There was an impression that these [banking hacking operations] were opportunistic targets. We can see they are decidedly not,” said Ms Moriuchi, who is now director of strategic threat development at cyber security group Recorded Future. While analysts expected to see further attacks on banks and financial institutions, 

 

Pyongyang’s cyber army has also shifted focus: the lax regulation, light security and anonymity common across the cryptocurrency ecosystem is a perfect match. “It is easy for a North Korean scam to blend into all the other scams,” said Ms Moriuchi. As part of a broadening system of lower value but higher volume thefts, Pyongyang’s hackers are also gleaning cash from the small electronic stores of cash in “in-game purchases” and “points” used by online gamers. Recommended Cyber warfare US accuses North Korea over global cyber crime wave “Our sense is this low-level financial crime takes up the most time [for North Korea],” Ms Moriuchi said. Analysts stressed it was difficult to pinpoint what happens to the stolen cash, cryptocurrencies or gaming credits. But, one expert said, there were signs stolen cryptocurrencies were quickly laundered through several different exchanges, making them “virtually untraceable”. 

 

A Seoul-based cyber analyst said cryptocurrency exchanges and holders did not always report heists. But North Korean hackers have been suspected of successful attacks on at least three exchanges in Asia in March and April this year, with South Korea being the primary target. Mr McNamara of FireEye noted that North Korea has long trialled its “new techniques” in South Korea, just as Russian hacking groups use Ukraine and Iranian groups use the Gulf region. “A lot of what we see with early North Korean operations — new tools being utilised, new activity taking place — a lot of it begins in South Korea,” he said. “But then we do see it migrated abroad.” 

페이스북에 공유 트위터에 공유 구글플러스에 공유 카카오스토리에 공유 네이버밴드에 공유
0 Comments
로그인한 회원만 댓글 등록이 가능합니다.
이전 다음 목록
+더보기 핫이슈
New [朝鮮칼럼 The Column] 先 안보 분담, 後 비용 분담(신원식)
최고관리자 | 12.04
New "조국 교수는 정말 전향했는가?"(기독일보)
최고관리자 | 12.04
  •  12.04 서울대 트루스 포럼 '조국 교수는 전향했는가?' 강연
  •  12.04 (동영상)귀순자 강제 북송의 후속조치 긴급토론회
  •  12.04 서울대, ‘조국 관련 특강’ 현수막 ‘정치적’이라며 불허 (조선일보)
  •  12.02 제3차 국민혁명정치학교 강연
  •  12.01 귀순자 강제북송의 후속조치(세미나)
  •  11.28 블록체인 대회 ‘쉬쉬’ 북한의 신종 외화벌이 실태 (유동열, 주간조선)
  •  11.27 미국의 방위비 분담금 증액요구, 과연 부당한가(옥지원,미래한국)
  •  11.26 안보 전방위 추락, 책임 물어야 한다(박휘락,문화일보)
  •  11.24 자유한국당 공천관련 의견(유동열)
  •  11.22 (동영상)자유한국당 공천 쇄신, 어떻게 할 것인가
+더보기 연구원동정
서울대 트루스 포럼 '조국 교수는 전향했는가?' 강연
최고관리자 | 12.04
(동영상)귀순자 강제 북송의 후속조치 긴급토론회
최고관리자 | 12.04
  •  12.02 제3차 국민혁명정치학교 강연
  •  11.22 (동영상)자유한국당 공천 쇄신, 어떻게 할 것인가
  •  10.16 영화 장사리 단체관람
  •  08.08 KBS 수신료 거부 챌린지 동참(유동열)
  •  07.31 국회 정책세미나: 한일갈등의 진단과 해법
사이트 소개 | 이용약관 | 개인정보취급방침 | 이메일 무단수집거부 | 책임의 한계와 법적고지 | 이용안내 | 모바일 버전
자유민주연구원 - Korea Institute of Liberal Democracy. All rights reserved.

Close