Jump to content

Invite Scene - #1 to Buy, Sell, Trade or Find Free Torrent Invites

#1 TorrentInvites Community. Buy, Sell, Trade or Find Free Torrent Invites for Every Private Torrent Trackers. HDB, BTN, AOM, DB9, PTP, RED, MTV, EXIGO, FL, IPT, TVBZ, AB, BIB, TIK, EMP, FSC, GGN, KG, MTTP, TL, TTG, 32P, AHD, CHD, CG, OPS, TT, WIHD, BHD, U2 etc.

LOOKING FOR HIGH QUALITY SEEDBOX? EVOSEEDBOX.COM PROVIDES YOU BLAZING FAST & HIGH END SEEDBOXES | STARTING AT $5.00/MONTH!

Why it’s almost impossible to defend against North Korean hacking


grimm

Recommended Posts

The rogue nation is a threat to the West in more ways than one

North Korea finally has an ideal weapon against its Western adversaries, one that will not only destroy enemies’ infrastructure and create panic and disarray, but also help make money for the hermit state.

And, no, I’m not talking about nuclear weapons, but a danger many have scoffed at: cyberwarfare.

Before you start wondering how a country that has fewer IP (internet protocol) addresses than an average block in New York can pose any threat to the developed world, remember that having almost nonexistent online infrastructure is actually an advantage.

Case in point: North Korean hackers can launch attacks aimed at networked institutions of developed countries without the risk of retaliation. North Korea is already the most isolated country in the world, with a growing list of sanctions imposed on the state. This means there’s little any country can do to “punish” the rogue nation for digital intrusions.

Tracking the perpetrators

Cyber retaliations are also limited in scope, again, because of the small size of its own online apparatus. Furthermore, most of those responsible for attacks aren’t even operating from their own country. They’re launching attacks from Malaysia, New Zealand, Nepal, Kenya, Mozambique, Indonesia and India, where 20% of all attacks originate. Fighting those hackers is less about cybersecurity and more about tracking the perpetrators — figuring out their favorite hotels, cybercafés and forums.

So how dangerous are these hackers?

I’m sure you’re familiar with their attack on Sony Pictures Entertainment, which ended up crippling the company’s capacity and disrupting the release of the movie “The Interview.” That’s just one of many increasingly successful attacks at a global network of communications, infrastructure and finance.

Speaking of finance, North Korea is now capable of stealing hundreds of millions of dollars a year from ransomware. A popular attack is based on WannaCry ransomware, which according to Interpol, has infected around 200,000 computers in 150 countries. The attack also affected many National Health Service hospitals in England and Scotland, and up to 70,000 devices, including computers, MRI scanners, blood-storage refrigerators and theater equipment. On May 12, some NHS services had to turn away non-critical emergencies, and some ambulances were diverted.

Hacking on many fronts

North Korean hackers take a multi-pronged approach, including attacks based on infecting pirated (“cracked”) games and software, attacks on digital banks (such as the assault on Tien Phong bank in Vietnam, during which hackers tried to steal $1.13 million) and a digital heist on the South Korean bitcoin exchange. That attack compromised the data of 30,000 customers, and $870,000 worth of bitcoin were stolen.

All this comes to show that when you target developed countries with interconnected, digitally dependent infrastructures, the potential to create mayhem is almost limitless. Just as its nuclear tests were considered laughable until they weren’t, so is North Korean hacking prowess. Granted, the U.S. and South Korea are taking countermeasures as we speak, but there’s not much anyone can do when faced with an opponent that has little or nothing to lose.

This also speaks volumes about the lack of sense in digital security and prevention among most hacker victims, but this is a topic for another time.
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Check out what our members are saying

  • Our picks

×
×
  • Create New...