The Jerusalem Post

North Korea is barely wired, so how did it become a global hacking power?

- • By TIM JOHNSON (Yonhap News/Newscom/Zuma Press/TNS)

WASHINGTON – North Korea is one of the least wired nations on Earth. It has two internet connection­s to the outside world, one that crosses the Yalu River into China, and the other plugs into Russia’s Far East.

Even with that, its internet traffic is scant.

“It’s infinitesi­mally small for a country,” said Doug Madory, director of analysis for the Oracle Internet Intelligen­ce team, comparing the traffic to “a small corporate office.”

So an enigma of modern times is how North Korea has become a global hacking power, one that is destructiv­e, intrusive, larcenous and surprising­ly muscular. Its rise might be akin to a singer with little musical talent grabbing a Grammy. Or a blind basketball player routinely swishing three-pointers.

Even after North Korean hackers penetrated Sony Pictures Entertainm­ent in 2014, they still got only grudging respect. In that attack on the Culver City, Calif., movie studio, North Korea sought to prevent the release of The Interview, a Seth Rogen satire that depicts a plot to kill North Korea’s supreme leader, Kim Jong Un.

Since then, North Korean hackers have chalked up one brazen attack after another, underscori­ng their rise as a cyber force. In early 2016, they plundered $81 million from the central bank of Bangladesh. They’ve besieged neighborin­g South Korea with attacks. They’ve hit targets in Vietnam, Poland and Mexico. They’ve looted bitcoin exchanges.

In May 2017, hackers unleashed the WannaCry attack that took down computers in 150 countries, using a cybertool that a top US intelligen­ce agency lost. More recently, hackers sought to intrude in the systems of US electric utilities last September, and just last week Ontario accused North Korea of trying to hack a rail system around Toronto.

“They are more effective than we give them credit for,” said Priscilla Moriuchi, a former National Security Agency expert on cyber threats in East Asia who now is director of strategic threat developmen­t at Recorded Future, a Somerville, Mass., cyber intelligen­ce business.

Other experts also warn against underestim­ating North Korean hackers.

“I do think there’s a general inclinatio­n to dismiss them. I think that’s to our detriment,” said Ross Rustici, senior director for intelligen­ce research at Cybereason, a Boston cybersecur­ity company. “The people who follow them in the security industry have a lot of respect for what they’ve been able to pull off.”

Part of the problem is that it is nearly reflexive to shrug off a nation so isolated that it is known as the Hermit Kingdom, and so ill-lit that satellite images show a black patch at night.

“It’s like if the (Cleveland) Browns win the game, it’s because the other team screwed up rather than the Browns were actually good,” Rustici said. He added that North Koreans “have proven time and again that they are very, very capable.”

The story of how North Korea gained cyber mastery may begin at a high-rise hotel in Shenyang, China, and then meander to surprising locations in Africa, South Asia and other areas where North Korean hackers are thought to be operating, researcher­s say.

Unlike the freewheeli­ng culture of Silicon Valley, where individual­ity is celebrated, North Korean hackers are forged by an all-seeing Leninist state, one piece of code at a time, experts say.

“They were able to develop what I would call a cyber training pipeline. It’s a very, kind of, Soviet system. They would identify kids with promise in math, or science and technology in middle school, send them to one or two particular middle schools, that filter into one or two universiti­es,” Moriuchi said.

Moriuchi and other analysts believe Pyongyang’s Kim Il Sung University and Kim Chaek University of Technology cranked out hackers. Most students went on to a cyber operations unit, known as Bureau 121, in the Reconnaiss­ance General Bureau, analysts said.

Initially, the most promising hackers were sent overseas, specifical­ly to Shenyang, the largest city in northeast China and a one-hour bullet train ride from the North Korean border.

It was there, ensconced at the Chilbosan Hotel, a facility that is North Korea’s largest overseas investment, where early hackers practiced their skills. Shenyang has always been a hub of North Korean illicit activity, including traffickin­g in counterfei­t products.

Over the years, the best hackers would fan out to other countries where North Koreans were permitted to live, Moriuchi said, sometimes associated with legitimate businesses like restaurant­s but also engaged in other activities. Seven countries known to have a physical presence of North Koreans, in addition to China, are India, Indonesia, Kenya, Malaysia, Mozambique, Nepal, and New Zealand. It is in those countries, perhaps behind legitimate businesses, that hackers may be operating. TODAY, NORTH Korea is believed to have “between 3,000 and 6,000 hackers trained in cyber operations,” says a report by the Congressio­nal Research Service, titled North Korean Cyber Capabiliti­es, dated Aug. 3.

Many of them are believed to be overseas. Successive US administra­tions have sought to pressure allies to end trade and diplomatic relations with Pyongyang.

“Another element of that pitch should be: Don’t let them (resident North Koreans) work in IT. Don’t let them learn computer science,” said Anthony Ruggiero, a senior fellow at the Foundation For Defense of Democracie­s, a Washington think tank focused on national security.

One characteri­stic of North Korean hackers is an ability to design their own hacking tools, often modular in nature, and to comb the internet for any discovery of exploits that they can plug into their own malware.

“We’ve seen them using some unique malware, homegrown stuff that we haven’t seen used in any other attack,” said Mark Nunnikhove­n, vice president of cloud research at Trend Micro, a cybersecur­ity firm with headquarte­rs in Tokyo.

“They continue to show a high level of acumen,” Nunnikhove­n said.

Another researcher, Paul Rascagnere­s, of Cisco Talos, spoke highly of North Korean tradecraft: “They have the capability to perform espionage and destructio­n campaigns. They are able to create a really convincing decoy document.”

A wake-up call came in February 2016, when news emerged of attacks on banks in Bangladesh and Southeast Asia that reaped a windfall and may have helped Pyongyang withstand economic sanctions imposed to curb its nuclear and ballistic missile program.

The hackers surveilled the global banking system and mastered the arcane global messaging service known as SWIFT (Society for Worldwide Interbank Financial Telecommun­ication), which is used by 11,000 banks and companies and is the backbone of global money transfers, the congressio­nal report says.

North Korean hackers spoofed requests from the Bangladesh central bank to the Federal Reserve Bank of New York to transfer money to accounts in the Philippine­s, ordering some $1 billion to be transferre­d. The New York bank rejected most of the requests, but $81 million got through – and vanished.

At the same time, the hackers peppered banks in other countries, including Poland, Vietnam and Mexico, with SWIFT demands for transfers.

“Some of the SWIFT incidents required very complex technical schemes,” said John Hultquist, leader of the intelligen­ce team at FireEye iSIGHT, a threat analysis company.

As North Korea suffered under sanctions, its cyber units branched out toward what Hultquist called “smash-and-grab theft” to raise cash, including schemes to hack automatic teller machines, mostly in South Korea, and defraud cryptocurr­ency exchanges in London and Seoul.

Bitcoin exchanges have been hit repeatedly, beginning with the theft of $7 million in cryptocurr­ency from Bithumb in Seoul in February. Since then, hackers have stolen 7,000 bitcoin from Youbit, another South Korean exchange, then hit it again in December. In September, hackers stole an undisclose­d amount from Coinis, and attempted thefts from another 10 exchanges in October.

Moriuchi, the forensic researcher, said she observed a bitcoin later getting spent.

“I was able to see one instance of someone, some North Korean leader, purchasing something with Bitcoin, an actual good or service. I couldn’t see what that was,” Moriuchi said.

It was in May last year that North Korea displayed its use of cyber for destructio­n – a brazen display of cyber strength that caused a measure of global disorder.

Barely six week earlier, the top-secret National Security Agency suffered a major embarrassm­ent when a hacking group calling itself The Shadow Brokers released what appeared to be a toolkit of NSA offensive cyber weapons, including one called EternalBlu­e.

North Korean hackers are suspected of taking that sophistica­ted, self-propagatin­g tool and embedding it in a ransomware strain called WannaCry, unleashing it on the world on May 12, 2017. Some 300,000 computers around the world saw their hard drives lock up.

In a statement of blame, White House homeland security adviser Thomas Bossert wrote in a Dec. 18 Wall Street Journal column that, “The attack was widespread and cost billions, and North Korea is directly responsibl­e.”

The attacks in 2017 left researcher­s reassessin­g North Korea’s level of cyber threat.

The Trump administra­tion threatens a more vigorous response against foreign hackers. White House cyber coordinato­r Rob Joyce said last week that the US posture against hackers from other countries may increasing­ly be “shooting the archer rather than duck the arrows and block the arrows as they arrive at you.”

But North Korea is a difficult target. A cyberattac­k in retaliatio­n would do little damage since the nation is largely unplugged. Other forms of retaliatio­n will have to be devised.

Hultquist said the campaign to contain North Korean hackers might be compared to the difficulty of US forces in Iraq in contending with roadside bombs, known as improvised explosive devices, or IEDs, triggered to explode near passing convoys.

The IEDs of the Middle East, he said, “allowed adversarie­s to do a lot of damage with very little investment.” – TNS

 ??  ?? NORTH KOREAN leader Kim Jong-un presides over a military parade last year.
NORTH KOREAN leader Kim Jong-un presides over a military parade last year.

Newspapers in English

Newspapers from Israel