Analyse discloses North Korean cyber-espionage has reached new heights

Spying unit is widening its operations into aerospace and defence industries, according to US security firm

An increasingly sophisticated North Korean cyber-espionage unit is using its skills to widen snooping operations to aerospace and defence industries, a new examine has revealed.

FireEye, a US private security company that tracks cyber-attackers around the world, has identified a North Korean group, which it names APT3 7( Reaper) and which it says is utilizing malware to infiltrate computer networks.

The report suggests different groups has been active since 2012, but has now graduated to the level of an advanced persistent threat.

Until now, the group has substantially focused its cyber-espionage endeavors on South Korea, but FireEye outlines evidence that it” has expanded its operations in both scope and sophistication “.

” We assess with high confidence that this activity is carried out on behalf of the North Korean government ,” research reports says.

The group’s cyber operation is now said to be targeting Japan, Vietnam and the Countries of the middle east and is striving to steal secrets from companies and organisations involved in the chemical, electronics, manufacturing, aerospace, automotive and healthcare industries.

” We judge that APT3 7′ s primary mission is covert intelligence gathering in support of North Korea’s strategic, military, political and economic interests ,” research reports says.

The report comes after months of increasingly hot rhetoric between Kim Jong-un and Donald Trump amid US fears that North Korea is its biggest threat, as Pyongyang makes progress in developing a nuclear warhead and ballistic missile system capable of reaching the US mainland.

The scale of North Korea’s cyber-espionage endeavour was outlined in 2015 when South Korea claimed the north’s” cyber army” had doubled in sizing to more than 6,000 people.

In December last year, it was suggested the UK and US may have launched retaliatory cyber-attacks against North Korea. The UK and the Trump administration blamed North Korea for the WannaCry malware attacks which brought chaos to hospitals, banks and other companies in May 2017.

Play Video

0:51 Rex Tillerson says the North Korea nuclear threat is growing- video

” The attack was widespread and cost billions, and North Korea is directly responsible ,” Tom Bossert, Trump’s homeland security adviser, wrote in the Wall street Journal.

John Hultquist, director of intelligence analysis at FireEye, said APT3 7 had so far received very little public attention.

” We have been tracking their actions for some time, collecting clues from incidents mainly focused in South Korea. North Korea is an increasingly aggressive actor willing to leverage a variety of tools against their neighbours and the world ,” he said.

” Previous incidents, such as the WannaCry attacks, have been a surprise. If we want to neutralize this astonish, we have to seek out these actors and expose them .”

APT3 7′ s targets have included 😛 TAGEND A Middle Eastern company that entered into a joint venture” that had gone bad” to provide North Korea with telecommunications service.
Individuals involved in trade and international affairs issues. People working with Olympics organisations. A journalist and a research fellow links with North Korean human rights issues. An entity in Japan associated with United Nations missions on sanctions and human rights.

Leave a Reply

Your email address will not be published. Required fields are marked *