Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people who have escaped to South Korea, their main target is none other than Western infrastructure of critical value.

Over 3,000 cyber experts have been recruited by North Korea, in the country’s attempt to harm the West. According to the statements of a former president of North Korea, Kim Heung-Kwang, there is great interest on behalf of the Korean security gladiators (the cyber warriors) towards penetrating the systems of Western Governments and harming their infrastructure to the bone. Kim Heung-Kwang is also the founder of the organization called “North Korea Intellectuals Solidarity”, which aims to raise awareness and inform people of the malicious intent of North Korea. However, the interests of Heung-Kwang’s home country are not limited to governmental sources; instead, they also include sources from the private sector and they can harm the Internet to a huge extent.

Targeting nuclear power businesses and transportation, as well as organizations handling public utilities, the hacking results of North Korea can lead to grave negative consequences in the near future. Given the fact that the cyber warriors in this country are sophisticated and particularly devoted to what they do, the concern becomes even bigger and more direct. According to what the professor who had been working in North Korea’s Hamhung University of Computer Technology had told Reuters in December:

“North Korea’s ultimate goal in cyber strategy is to be able to attack national infrastructure of South Korea and the United States”.

Another thing that is worth highlighting about the interview given by Kim Heung-Kwang is the striking resemblance of the tactics used by the North Koreans and the recent attacks to Sony:

“The hacking of Sony Pictures is similar to previous attacks that were blamed on North Korea and is a result of training and efforts made with the goal of destroying infrastructure.”

The shocking story of Kim Heung-Kwang includes his arrest for holding illegal films and his transfer to labor camps. He managed to escape from the camps, after giving money to a guard of the borders and after having spent about a year under horrible conditions. He later swam across Tumen River and reached China, before settling to South Korea and residing there till now.

“They have trained themselves by launching attacks related to electronic networks”, Jang Se-yul commented on the skills and sophistication of North Korea. Jang Se-yul is another expert in computer science having studied at the military college before leaving North Korea and escaping to the South. “The ultimate target that they have been aiming at for long is infrastructure”, he reveals as to the ultimate goal of these cyber attacks.

The NSA has found evidence about the correlation of the North Koreans with the recent attacks launched against Sony, as well as other similar attacks. Based on the testaments of people who have worked in this field and have learned everything within North Korea, most of the attacks are launched within China by the notorious “Bureau 121”,  which is the group of hackers working under the direction of the General Bureau of Reconnaissance.

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at “Security Gladiators“, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

(Security Affairs –  North Korea, cyber warfare)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

7 hours ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

18 hours ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

19 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

1 day ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

2 days ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

2 days ago

This website uses cookies.