One of North Korea’s most powerful weapons isn’t a nuclear warhead, but its ability to use the Bitcoin cryptocurrency to mitigate harsh international economic sanctions.
As the noose has tightened over the past decade, North Korea has been forced to become more creative in finding ways to get around the sanctions. And Bitcoin, with its decentralized network outside the control of any government, has proven an able tool.
Since assuming power in 2011, leader Kim Jong Un has ramped up the verbal threats to South Korea, the United States, and Japan, while punctuating those threats with a series of nuclear tests and missile launches.
The most recent incident was just one week ago, when North Korea launched a ballistic missile over the northern Japanese island of Hokkaido.
The global community has responded with ever-tougher sanctions.
Restrictions on trade as well as restrictions on North Korea’s access to the international financial system have made life difficult for the rogue nation.
The U.S. State Department has estimated that the UN sanctions passed in August 2017 alone would chop one-third from North Korea’s $3 billion in annual export revenue.
Desperate to find new sources of cash, the rogue regime fell back on strength it has nurtured for nearly a decade – cyberwarfare…
How North Korea Uses Cyberspace to Level the Playing Field
Despite its hot rhetoric, North Korea knows it can’t confront a superpower like the United States directly.
“Since North Korea is militarily and economically inferior to its adversaries, it needs to use capabilities that can deter foreign aggression, coerce others, and project power without inviting a conventional response,” Frank Aum, a former advisor to the Department of Defense on North Korea told Wired in June.
That can come in the form of a weapon of fear, like nuclear bombs, or a weapon of stealth, like cyberwarfare.
A relatively small cyber army can have a disproportionate impact. One group of elite hackers within the North Korean military, Unit 180, is estimated to consist of just 6,000 people. Another, Unit 121, has only 1,800.
What’s more, North Korean cyberattacks are hard to trace.
That’s because most attacks are conducted from countries like China, Malaysia, and sometimes locations in Eastern Europe. The North Korean hackers go undercover as employees of ordinary companies and get the bonus of better Internet service to carry out their attacks.
North Korea’s interest in cyberwarfare dates back at least a decade but began in earnest around 2009.
At first, North Korea’s efforts focused on stealing information from, and disrupting the systems of, foreign governments and corporations. Much of it is directed at South Korea, although the regime targets the United States, as well.
One of the regime’s better-known attacks occurred in November 2014, as Sony Corp. (NYSE ADR: SNE) prepared to release “The Interview,” a film that parodied Kim Jong Un. North Korea hacked Sony Pictures Entertainment, released information it had stolen from the studio’s computer systems, and threatened terrorist attacks unless the film was pulled.
Squeamish theater chains led to a limited release in just 300 independent theaters, but Sony distributed “The Interview” widely online.
After the Sony attack, North Korea’s elite hackers turned to financial targets…
Cyberwarfare Pays Off for North Korea – Literally
One of North Korea’s most spectacular successes happened last year, when its hackers stole $81 million from the Bangladesh central bank – money that was sitting in an account at the New York Federal Reserve.
Cybersecurity firms such as Symantec and Kaspersky say the North Korean cyber army has cracked the SWIFT protocol that enables bank-to-bank transfers. These attacks have raked in millions of dollars from more than a dozen countries.
“They changed after Sony by using hacking to support criminal activities to generate hard currency for the regime,” James Lewis, a North Korea expert at the Center for Strategic and International Studies, told Reuters in May. “So far, it’s worked as well or better as drugs, counterfeiting, smuggling – all their usual tricks.”
North Korea doesn’t limit itself to big fish, either. In a report released in July, South Korea’s Financial Security Institute said North Korea’s hackers have targeted online gambling sites as well as ATMs. The ATM hacks yield bank card information that hackers can sell or use themselves to withdraw cash.
Given these successes, it makes perfect sense that North Korea’s cyberwarriors would next set their sights on Bitcoin and other cryptocurrencies.
Here are the surprising schemes they’ve managed to pull off so far…
How North Korea Generates Cash from Bitcoin
North Korea’s Bitcoin-based efforts mesh perfectly with its other criminal operations.
For instance, in a report issued last week, cybersecurity firm FireEye said North Korea had repeatedly attacked South Korean Bitcoin exchanges.
Customers of Bithumb, the largest cryptocurrency exchange in South Korea, lost $3.56 million to North Korean hackers in February. The Yapizon exchange lost $5.5 million to hackers in May, although FireEye could not say conclusively that North Korea was responsible.
North Korea’s cyberwarriors have also dabbled in ransomware at least once. The U.S. National Security Agency (NSA) said it believes North Korea was behind the WannaCry attack.
Computers infected with WannaCry locked up the data on their hard drives. The warning screen demanded $300 worth of Bitcoin to unlock the files. Cybersecurity experts estimate the attack netted only $140,000, but the episode shows that there’s no line North Korea won’t cross.
North Korea is so enamored with acquiring Bitcoin to counteract sanctions that it has even started mining it.
Earlier this month, research firm Recorded Future – which is backed by Google as well as the CIA – reported it had found evidence of Bitcoin mining while studying North Korean browser data for clues of missile launches.
Right now, it’s unclear how extensive the North Korean Bitcoin mining operation might be. But it makes sense as one more source of desperately needed currency.
“We have to start wrapping our heads around the idea that we have a nation-state-sponsored hacking group whose tasking includes financial gain,” Juan Guerrero-Saade, a Kaspersky security researcher, told Wired. “It’s hard to stomach, but at this point it’s not an isolated incident.”
— David Zeiler
[ad#mmpress]
Source: Money Morning