By Joel Day |
NORTH KOREA has embarked on developing a strategy for a deadly new weapon capable of replicating the death toll of a nuclear bomb, according to reports
North Korea has embarked on a new weaponry programme which has seen the nation syphon millions of dollars out of the banks of foreign nations, in order to fund its nuclear weapons programme, according to the United Nations (UN). The dictatorship has turned to sharpening its expertise in cyber-hacking, with Kim Jong-un seeming more than capable of hitting the heart of several international financial institutions.
According to the Associated Press, North Korea has generated almost $2billion (£1.6billion) in unprecedented cyber activities against finance institutions and unregulated cryptocurrency transactions around the world.
The large sum of money reportedly intended to fund North Korea’s nuclear weapons advancement, is being investigated by the UN.
Many fear that the most recent cyber-attacks may soon go beyond the theft of money, with Jeremy Straub, an assistant professor of Computer Science at North Dakota State University, expressing his concern that cyberattacks could result in “mass injury and death rivalling the toll of a nuclear weapon.”
The UN is looking into at least 35 instances of illegal monetary activity in 17 countries.
Some of the victims include Costa Rica, Gambia, Guatemala, Kuwait, and Liberia.
The countries hit typically have lower defence systems in place to prevent cyberattacks, leaving funds, public and private, susceptible to rogue agents.
Of the nations targeted, South Korea is often the hardest hit.
The Kim family dictatorial dynasty has historically struggled economically, with it’s current Supreme Leader also experiencing economic hardship.
Tackling this, the country started to bolster its cyberattack capabilities in the late 2000s in order to counter-sanctions imposed by the UN Security Council sanctions.
North Korea had for a short period toned-down its cyber endeavours, and, given that the country only has two internet connections, its attacking financial institutions via computers was almost overlooked.
Seungjoo Kim, a professor at Korea University’s Graduate School of Information Security, said North Korea’s ability to attack on such grand scales is because hackers go abroad to carry out the illegal activities.
He said: “North Korea practices their craft under real conditions, like hacking cryptocurrency sites or stealing information.
“These repeated exercises help to improve their skills.”
Targeting financial institutions hasn’t been the only way North Korea has bared its technological teeth.
In 2014, the “Guardians of Peace”, a hacker group thought to be located in North Korea, furiously resounded to Sony Pictures for releasing the film, “The Interview”.
The film, a satire about Americans recruited to assassinate Kim.
The hackers leaked sensitive information from the studio, including personal information from the studio, details about employees, their internal emails, copies of unreleased Sony films, and plans for future films.
They went one step further, utilising the Shamoon wiper malware to remove Sony’s computer infrastructure.
North Korean hackers advanced on the incident and performed a heist soon after by rupturing Bangladesh Bank’s systems and exploiting the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to send fraudulent remittance orders to the New York branch of the US Central Bank in 2016
This proved successful for North Korea, resulting in their gaining $101million (£81.2million) form five of the 35 fraudulent instructions they had sent out.
Around $20million (£16million) of this was traced back to Sri Lanka, and $81million (£65million) to the Philippines.
The level of the regime’s commitment to developing its cybersecurity capabilities aligns with its advancement in technologies such as nuclear, chemical, and biological weaponry.
North Korea’s cyberattacks are often handled as separate from other issues raised in the peninsula, which have, may reason, resulted in western powers often leaving strategic conclusions incomplete.