"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-07-24T21:15:03Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2018/07/24/north-korea-dismantling-test-site-starr-dnt-lead-vpx.cnn"
data-branding-key="the-lead"
data-video-slug="north korea dismantling test site starr dnt lead vpx"
data-first-publish-slug="north korea dismantling test site starr dnt lead vpx"
data-video-tags="asia,barbara starr,continents and regions,donald trump,east asia,government and public administration,government bodies and offices,kim jong un,military,military weapons,misc people,north korea,north korea nuclear development,political figures - intl,political figures - us,singapore,southeast asia,us federal government,us-north korea summit,weapons and arms,white house"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-07-08T08:10:09Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2018/07/08/mike-pompeo-brushes-off-gangster-comments-vpx.cnn"
data-branding-key=""
data-video-slug="mike pompeo brushes off gangster comments vpx"
data-first-publish-slug="mike pompeo brushes off gangster comments vpx"
data-video-tags="asia,east asia,north korea,arms control and disarmament,government and public administration,government bodies and offices,international relations,international relations and national security,mike pompeo,military,military weapons,nuclear weapons,political figures - us,state departments and diplomatic services,weapons and arms,weapons of mass destruction"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-07-10T22:08:04Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2018/07/10/mike-pompeo-north-korea-meeting-rocket-man-cd-kosinski-vpx.cnn"
data-branding-key=""
data-video-slug="Mike Pompeo North Korea meeting rocket man cd kosinski vpx"
data-first-publish-slug="Mike Pompeo North Korea meeting rocket man cd kosinski vpx"
data-video-tags="asia,celebrities,donald trump,east asia,elton john,government and public administration,government bodies and offices,international relations,international relations and national security,kim jong un,michelle kosinski,mike pompeo,north korea,political figures - intl,political figures - us,state departments and diplomatic services,us federal government,white house"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-07-02T15:57:51Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2018/07/02/john-bolton-north-korea-nuclear-arsenal-starr-ath-vpx.cnn"
data-branding-key=""
data-video-slug="john bolton north korea nuclear arsenal starr ath vpx"
data-first-publish-slug="john bolton north korea nuclear arsenal starr ath vpx"
data-video-tags="accidents, disasters and safety,arms control and disarmament,asia,east asia,government and public administration,government bodies and offices,home security and safety,international relations,international relations and national security,john bolton,military,military weapons,national security,north korea,north korea nuclear development,nuclear weapons,political figures - us,pyongyang,safety issues and practices,us federal government,weapons and arms,weapons of mass destruction,white house"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-07-02T09:01:02Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2018/07/02/north-korea-missile-factory-hancocks-sot-vpx.cnn"
data-branding-key=""
data-video-slug="north korea missile factory hancocks sot vpx"
data-first-publish-slug="north korea missile factory hancocks sot vpx"
data-video-tags="asia,business and industry sectors,business, economy and trade,company activities and management,company locations and facilities,east asia,manufacturing and engineering,manufacturing facilities,manufacturing industry,military,military weapons,missile systems,north america,north korea,north korea nuclear development,united states,weapons and arms"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-06-17T17:27:35Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2018/06/17/susan-rice-kim-jong-un-better-negotiator-than-trump-gps-sot.cnn"
data-branding-key=""
data-video-slug="susan rice kim jong un better negotiator than trump gps sot"
data-first-publish-slug="susan rice kim jong un better negotiator than trump gps sot"
data-video-tags="asia,barack obama,donald trump,east asia,government and public administration,government bodies and offices,international relations and national security,kim jong un,national security,north korea,north korea nuclear development,political figures - intl,political figures - us,susan rice,unrest, conflicts and war,us federal government,us-north korea summit,white house"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-05-25T20:43:11Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2018/05/25/north-korea-nuclear-tests-verge-of-war-starr-dnt-lead.cnn"
data-branding-key=""
data-video-slug="north korea nuclear tests verge of war starr dnt lead"
data-first-publish-slug="north korea nuclear tests verge of war starr dnt lead"
data-video-tags="asia,barbara starr,business and industry sectors,business, economy and trade,defense industry,defense research,donald trump,east asia,government and public administration,government bodies and offices,kim jong un,military,military weapons,missile research and development,north korea,north korea nuclear development,nuclear weapons,political figures - intl,political figures - us,us federal government,weapons and arms,weapons of mass destruction,white house"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-04-26T20:45:30Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2018/04/26/will-kim-jong-un-give-up-nuclear-weapons-bgk-lon-orig.cnn"
data-branding-key=""
data-video-slug="will kim jong un give up nuclear weapons bgk lon orig"
data-first-publish-slug="will kim jong un give up nuclear weapons bgk lon orig"
data-video-tags="asia,east asia,kim jong un,military,military weapons,north korea,north korea nuclear development,nuclear weapons,political figures - intl,weapons and arms,weapons of mass destruction"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-04-18T06:56:52Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2018/04/17/north-korea-kim-jong-un-diplomacy-mkd-lon-orig.cnn"
data-branding-key=""
data-video-slug="north korea kim jong un diplomacy mkd lon orig"
data-first-publish-slug="north korea kim jong un diplomacy mkd lon orig"
data-video-tags="asia,east asia,kim jong un,north korea,political figures - intl"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2017-10-05T12:39:40Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2017/10/03/who-is-kim-jong-un-north-korea-lon-orig.cnn"
data-branding-key=""
data-video-slug="who is kim jong un north korea lon orig"
data-first-publish-slug="who is kim jong un north korea lon orig"
data-video-tags="asia,east asia,kim jong un,north korea,paula hancocks,political figures - intl,business and industry sectors,business, economy and trade,defense industry,defense research,missile research and development,north korea nuclear development,continents and regions,military,military weapons,misc people,nuclear weapons,weapons and arms,weapons of mass destruction"
data-details="">
Video Ad Feedback
Kim Jong Un: From global pariah to the man to meet
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-04-24T21:51:27Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2018/04/24/trump-kim-jong-un-gerry-connolly-sot-tsr.cnn"
data-branding-key=""
data-video-slug="trump kim jong un gerry connolly sot tsr"
data-first-publish-slug="trump kim jong un gerry connolly sot tsr"
data-video-tags="asia,donald trump,east asia,gerry connolly,government and public administration,government bodies and offices,kim jong un,north korea,political figures - intl,political figures - us,us federal government,white house,wolf blitzer"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-04-24T16:00:27Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2018/04/24/trump-kim-jong-un-very-open-and-honorable-sot-ath.cnn"
data-branding-key=""
data-video-slug="trump kim jong un very open and honorable sot ath"
data-first-publish-slug="trump kim jong un very open and honorable sot ath"
data-video-tags="asia,donald trump,east asia,emmanuel macron,government and public administration,government bodies and offices,kim jong un,north korea,political figures - intl,political figures - us,us federal government,white house"
data-details="">
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2018-04-26T11:21:31Z"
data-video-section="style"
data-canonical-url="https://www.cnn.com/videos/arts/2018/04/26/korea-demilitarized-zone-art-lon-orig-td.cnn"
data-branding-key=""
data-video-slug="korea demilitarized zone art lon orig td"
data-first-publish-slug="korea demilitarized zone art lon orig td"
data-video-tags="international relations,international relations and national security,treaties and agreements,unrest, conflicts and war"
data-details="">
A South Korean lawmaker said Tuesday that North Korea stole classified military documents in 2016
North Korean hackers have been accused of a handful of crimes in recent years
CNN
—
North Korea’s hackers have been accused of carrying out some of the most audacious cyber attacks of the past few years, from siphoning millions of dollars to stealing state secrets.
Analysts say cyber capabilities have become a key asset in North Korea’s war chest, used for a wide range of purposes including hacking adversaries like South Korea and pilfering money.
Pyonyang’s increasingly bold attacks in the virtual space have come in tandem with the hermit nation’s rapidly progressing ballistic missile and nuclear programs.
“North Korea’s cyber weapons are as destructive as its conventional weapons,” Lim Jong-in, a cyber security professor at Korea University, told CNN. “Tomahawk missiles can paralyze a major country’s power grid and financial system. So do North Korea’s cyber weapons.”
In the latest revelation, a member of the South Korean ruling party said Tuesday that North Korea stole classified military documents from a South Korean Defense Ministry database in September 2016. They included a document that included plans to “decapitate” the North Korean leadership.
And cybersecurity firm FireEye said Tuesday that it detected and stopped an attack on US electric companies by people with links to the North Korean government.
The hackers’ skill is all the more surprising considering they come from a reclusive country where internet use is heavily restricted.
Inside North Korea, citizens only have access to a government-run, heavily censored intranet rather than the full depths of the world wide web.
But that hasn’t stopped its hackers from becoming some of the best in the business.
“North Korea almost certainly has the capability to conduct disruptive and potentially destructive attacks, as well as more traditional cyber espionage operations,” Bryce Boland, the chief technology officer for Asia-Pacific at FireEye, told CNN.
How big a security threat is North Korean hacking?
North Korea’s cyber capabilities are yet another dangerous arrow in a quiver that includes chemical weapons, nuclear warheads and the world’s fourth-largest standing army.
“Cyber experts say North Korea should be ranked among the top 5 in the world. I believe North Korea can steal anything they want through cyber espionage. No country is safe from its cyber espionage,” Lim said.
South Korea said in December that Pyongyang had broken into the South Korean military intranet and leaked confidential information.
South Korea has strong cyber security defenses, but North Korea’s isolation gives it an unexpected advantage, Boland said.
“North Korea has little connectivity and relatively limited reliance on technology, making it less vulnerable to attacks,” he said.
And the latest revelations from South Korea allege that North Korean hackers stole some 235 gigabytes worth of data, including a joint South Korea-US wartime operational plan.
“If the North Koreans in fact accessed the US/South Korean defense plans, this is a treasure trove of information and presents a real danger,” said CNN military analyst Lt Col Rick Francona.
“The only good thing about it is that we know that it happened and when. That at least allows us to do damage control – mitigate the damage done to national security.”
What tactics do they use?
Boland said spear phishing – messages which appear to be from a trusted source or about a topic specific to the person being targeted but in fact conceal malware or another way for a hacker to attempt to gain access to computers – is a favorite tactic of the North Koreans.
“Once the victim organization has been comprised, we see additional tools being deployed,” he said.
Another tactic they’ve been caught using, Boland said, is called a “watering hole attack.” That involves compromising websites that people visit and placing weaponized content there for them to click.
Top South Korean government officials’ smartphones were also hacked in 2016, according to the country’s spy agency. Seoul accused North Korea of stealing text messages and voice communications by “sending enticing text messages.”
Pyongyang is also suspected of turning 60,000 computers in South Korea into “zombies,” or computers that have been compromised by hackers and can then be used for cyberattacks. South Korea’s spy agency estimated that Pyongyang took control of 10,000 computers in a single month in 2015.
Whatever the type of attack, North Korea will conduct reconnaissance and research ahead of time and tailor it to the specific organization or victim they’re targeting, Boland told CNN.
How do they operate?
Child prodigies are sought from a young age and recruited, according to Kim Heung-kwang, a North Korean defector who worked as a computer science professor in Pyongyang before escaping in 2004.
The country has established about 250 elite schools for computer education, Kim told CNN Wednesday. From there, authorities select 500 of the most talented students for even more advanced training in cyber combat at two schools in Pyongyang.
Once their studies are done, some are assigned to cyber units for hands-on training. Others end up working in places like Shenyang, China, where a secret network of hackers called “Bureau 121” operates, Kim explained.
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2015-01-06T14:12:21Z"
data-video-section="world"
data-canonical-url="https://www.cnn.com/videos/world/2015/01/06/nkorea-defector-claims-hackers-living-in-shenyang-china-ripley.cnn"
data-branding-key=""
data-video-slug="nkorea defector claims hackers living in shenyang china ripley"
data-first-publish-slug="nkorea defector claims hackers living in shenyang china ripley"
data-video-tags="asia,china,digital security,east asia,north korea,technology,travel and tourism"
data-details="">
However, a recent move by Russia to provide North Korea a new internet connection increases the bandwith available in country. According to FireEye’s Boland, that also carries risks for the regime.
“It gives Russia a stake, influence in North Korea it didn’t previously have. Russia can also track North Korea’s internet to potentially identify the targets picked up by North Korea,” he said.
Previously, North Korean internet traffic was funneled through one sole link, provided by Chinese telecommunications firm China Unicom, according to experts.
Who does North Korea target?
Whatever the methods are, North Korea has been accused of some of the most damaging hacking operations of the 21st century.
They include the Sony hack of 2014, in which servers were brought down, movies were leaked and a trove of emails, Social Security numbers and employee salaries were released. The finger was pointed at North Korea due to the fact that Sony was about to release “The Interview,” a comedy about a plot to kill North Korean leader Kim Jong Un.
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2017-06-07T22:30:47Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/cnnmoney/2017/06/07/north-korea-cyber-wars-cnntech.cnnmoney"
data-branding-key=""
data-video-slug="North Korea cyber wars cnntech"
data-first-publish-slug="North Korea cyber wars cnntech"
data-video-tags="2014 sony hack,asia,bureau 121,business and industry sectors,business, economy and trade,companies,computer science and information technology,crime, law enforcement and corrections,criminal offenses,cyberterrorism,digital crime,digital security,east asia,information warfare,international relations and national security,malware,national security,north korea,samuel burke,software and applications,sony corp,sony pictures entertainment,technology,terrorism,terrorism and counter-terrorism,unrest, conflicts and war"
data-details="">
In February 2016, $101 million was fraudulently transferred out of the Bangladesh central bank’s account at the New York Federal Reserve and eventually made its way to the Philippines.
Researchers found that the hackers responsible for the theft carefully routed their signal through France, South Korea and Taiwan to setup their attack server, but made a critical mistake that established a connection to North Korea.
Most of the funds have not been recovered.
Analysts say North Korea has been preparing similar operations targeting cryptocurrencies like Bitcoin, as international sanctions make it harder for North Korea to use the dollar.