Popular Posts Last 7 days_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

Popular Posts Last 30 days_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

Popular Posts Last year_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

Popular Posts All time_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular


Saudi Arabia$type=two$count=2$h=250$space=1$icon=1$m=0$sn=0$rm=0$show=/search/label/Muslim%20World



North Korea hacking increasingly focused on making money more than espionage: South Korea study


SEOUL  - North Korea is behind an increasingly orchestrated effort at hacking into computers of financial institutions in South Korea and around the world to steal cash for the impoverished country, a South Korean state-backed agency said in a report.

In the past, suspected hacking attempts by North Korea appeared intended to cause social disruption or steal classified military or government data, but the focus seems to have shifted in recent years to raising foreign currency, the South's Financial Security Institute (FSI) said.

The isolated regime is suspected to be behind a hacking group called Lazarus, which global cybersecurity firms have linked to last year's $81 million cyber heist at the Bangladesh central bank and the 2014 attack on Sony's Hollywood studio.

The U.S. government has blamed North Korea for the Sony hack and some U.S. officials have said prosecutors are building a case against Pyongyang in the Bangladesh Bank theft.

In April, Russian cybersecurity firm Kaspersky Lab also identified a hacking group called Bluenoroff, a spin off of Lazarus, as focused on attacking mostly foreign financial institutions.

The new report, which analyzed suspected cyber attacks between 2015 and 2017 on South Korean government and commercial institutions, identified another Lazarus spinoff named Andariel.

"Bluenoroff and Andariel share their common root, but they have different targets and motives," the report said. "Andariel focuses on attacking South Korean businesses and government agencies using methods tailored for the country."

Pyongyang has been stepping up its online hacking capabilities as one way of earning hard currency under the chokehold of international sanctions imposed to stop the development of its nuclear weapons program.

Cyber security researchers have also said they have found technical evidence that could link North Korea with the global WannaCry "ransomware" cyber attack that infected more than 300,000 computers in 150 countries in May.

"We've seen an increasing trend of North Korea using its cyber espionage capabilities for financial gain. With the pressure from sanctions and the price growth in cryptocurrencies like Bitcoin and Ethereum - these exchanges likely present an attractive target," said Luke McNamara, senior analyst at FireEye, a cybersecurity company.

North Korea has routinely denied involvement in cyber attacks against other countries. The North Korean mission to the United Nations was not immediately available for comment.

Atm, Online Poker

The report said the North Korean hacking group Andariel has been spotted attempting to steal bank card information by hacking into automated teller machines, and then using it to withdraw cash or sell the bank information on the black market. It also created malware to hack into online poker and other gambling sites and steal cash.

"South Korea prefers to use local ATM vendors and these attackers managed to analyze and compromise SK ATMs from at least two vendors earlier this year," said Vitaly Kamluk, director of the APAC research center at Kaspersky.

"We believe this subgroup (Andariel) has been active since at least May 2016."

The latest report lined up eight different hacking instances spotted within the South in the last few years, which North Korea was suspected to be behind, by tracking down the same code patterns within the malware used for the attacks.

One case spotted last September was an attack on the personal computer of South Korea's defense minister as well as the ministry's intranet to extract military operations intelligence.

North Korean hackers used IP addresses in Shenyang, China to access the defense ministry's server, the report said.

Established in 2015, the FSI was launched by the South Korean government in order to boost information management and protection in the country's financial sector following attacks on major South Korean banks in previous years.

The report said some of the content has not been proven fully and is not an official view of the government.


EMAIL NEWSLETTER$desc=Subscribe to receive inspiration, ideas, and news in your inbox



Ads,5,Afghanistan,34,Animals,31,Bahrain,2,Barcelona,1,Business,659,China,42,Egypt,9,Headlines,11,Health,142,India,64,Indonesia,8,International,75,Iran,42,Iraq,35,Islamophobia,17,Israel,1,Kuwait,1,Lebanon,1,Lifestyle,273,Malaysia,3,Middle East,14,Muslim World,370,Nawaz Sharif,5,Opinion,26,Pakistan,939,Palestine,25,Pics,66,Popular,1,Qatar,83,Saudi Arabia,53,Science,124,Showbiz,256,Sports,999,Sudan,1,Syria,46,Technology,163,Top News,732,Turkey,38,UAE,16,Videos,73,World,3378,Yemen,5,
Muslim Global: North Korea hacking increasingly focused on making money more than espionage: South Korea study
North Korea hacking increasingly focused on making money more than espionage: South Korea study
Muslim Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy