Cyber Disruption and Cybercrime: Democratic People’S Republic of Korea

Cyber Disruption and Cybercrime: Democratic People’S Republic of Korea

Research Collection Report Cyber disruption and cybercrime: Democratic People’s Republic of Korea Author(s): Baezner, Marie Publication Date: 2018-06 Permanent Link: https://doi.org/10.3929/ethz-b-000314511 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library CSS CYBER DEFENSE PROJECT Hotspot Analysis: Cyber disruption and cybercrime: Democratic People’s Republic of Korea Zürich, June 2018 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Cyber disruption and cybercrime: Democratic People’s Republic of Korea Author: Marie Baezner © 2018 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching, Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie (2018): Hotspot Analysis: Cyber disruption and cybercrime: Democratic People’s Republic of Korea, June 2018, Center for Security Studies (CSS), ETH Zürich. 1 Cyber disruption and cybercrime: The Democratic People’s Republic of Korea Table of Contents 1 Introduction 4 2 Background and chronology 5 3 Description 8 3.1 Attribution and actors 8 DPRK actors 8 Other state actors 10 Non-state actor 11 3.2 Targets 11 Targets in South Korea 12 Targets in other states 12 International financial targets 12 Targets in the DPRK 12 3.3 Tools and techniques 12 Spear phishing 12 Distributed Denial of Service 13 Malware 13 4 Effects 14 4.1 Social effects 14 4.2 Economic effects 15 4.3 Technological effects 15 4.4 International effects 15 Cyberattacks attracting significant international attention 16 Cyber-activities as a complement to nuclear strategy 16 Risks from indiscriminate cyberattacks for the DPRK 16 5 Policy Consequences 17 5.1 Improve cybersecurity 17 5.2 Encourage better cybersecurity in financial institutions 17 5.3 Monitor the situation 17 6 Annex 1 18 7 Annex 2 22 8 Glossary 25 9 Abbreviations 26 10 Bibliography 26 2 Cyber disruption and cybercrime: The Democratic People’s Republic of Korea the role of actors from other countries. The study looks Executive Summary at their various targets, techniques and tools deployed, such as spear phishing and malware. Targets: South Korean institutions and media; Effects US military entities, government and businesses; financial institutions and The DPRK used its cyber capabilities at the cryptocurrency exchanges; and domestic level to spy on its own citizens. DPRK leaders institutions of the Democratic People’s sought to maintain power by controlling their nation’s Republic of Korea (DPRK)1. information sphere. Tools: Spear phishing, Distributed Denial of Economically, cyberattacks attributed to the Service2 (DDoS) attacks and malware DPRK caused financial losses for the targeted (DDoS-KSig, Destover, Jokra, institutions and businesses. DDoS and wiper malware MYDOOM, Dozer, Hangman, damaged firms’ websites and hardware, resulting in a DOGCALL, WannaCry, Android need for costly cybersecurity intervention or hardware malware and others). replacement. Effects: Cyber capabilities used to spy on the The technological impact of DPRK cyber-activities DPRK’s own citizens; economic losses was observed in the discovery of new malware families. for businesses targeted by DDoS Actors allegedly linked to the DPRK created specific attacks and hacked financial malware to fit their targets’ networks. These actors also institutions; discovery of new malware appeared to follow technological advancements by families; cyber capabilities garnering targeting cryptocurrencies and adapting their malware the DPRK international attention to new vulnerabilities. without the inconvenience of International effects observed in DPRK cyber- economic sanctions; cyber capabilities activities were marked by the country’s use of cyber fitting in with the DPRK’s asymmetric capabilities to complement its nuclear missile strategy. strategy. Cyber-activities gave the DPRK the opportunity to Timeframe: 2009 – still ongoing. attract international attention without incurring economic sanctions such as those imposed for nuclear capabilities. In 2014, a cyberattack targeted Sony Entertainment Pictures. The attack wiped the contents Consequences of Sony’s computers and leaked sensitive information on the internet. In 2017, the US and other states attributed The policy recommendations in this report are the ransomware WannaCry, which exploited unpatched aimed at reducing states’ risk of being impacted by DPRK Windows operating systems, to the DPRK. The US also cyber-activities. First, states should improve their attributed the Sony hack to the DPRK and revealed DPRK cybersecurity by raising public awareness of spear cyber capabilities to the world. However, the DPRK has phishing attacks and the need for keeping software been developing its cyber capabilities in parallel to its updated. Second, states should encourage financial nuclear capabilities and has been attracting increasing institutions and cryptocurrency exchanges to improve attention throughout recent years. their own cybersecurity. Finally, states should closely This Hotspot Analysis studies cyber-activities monitor DPRK cyber-activities to be better prepared in related to the DPRK. It examines the impact of these the event of a DPRK cyberattack. cyber-activities on the DPRK’s domestic society, the international economy, technological development and international relations. The goal of this report is to better understand the mechanisms of the DPRK’s cyber-activities and their role in the DPRK’s strategy. Description States and cybersecurity companies regularly attribute cyberattacks to cyberactors with alleged links to the DPRK. However, these links cannot always be confirmed. This report examines these actors as well as 1 Abbreviations are listed in section 9 2 Technical terms are explained in a glossary in section 8. 3 Cyber disruption and cybercrime: The Democratic People’s Republic of Korea domestic level, the report shows that the DPRK uses its 1 Introduction cyber capabilities to spy on its own citizens to secure its The attribution3 of the Sony hack to the information sphere and the continuity of the regime. Democratic People’s Republic of Korea (DPRK) 4 shed Economically, DDoS attacks conducted by the DPRK on new light on DPRK cyber capabilities. Until then South Korean businesses caused economic losses, and cyberattacks attributed to the DPRK had mostly been other cyberattacks on financial institutions attributed to directed against South Korea, but since this event the DPRK also resulted in major economic losses. The technological effects of DPRK cyber-activities consisted cybersecurity firms and states have attributed an 5 increasing number of cyberattacks to the DPRK, of the discovery of new malware families and the revealing the DPRK’s growing cyber capabilities. The identification of the DPRK’s growing interest in unique aspect of DPRK cyberattacks resides in their cryptocurrencies. motives, as the DPRK is the only state that allegedly The examination of international effects conducts cyberattacks for both political motives and addresses the role DPRK cyber-activities played beyond financial gain. DPRK cyber capabilities also appear to the Korean peninsula. It looks at how cyberattacks develop in parallel to its nuclear capabilities. garnered the DPRK the same level of attention as its This Hotspot Analysis examines cyber-activities nuclear capabilities without the inconvenience of related to the DPRK. It looks at various cyberattacks that incurring international sanctions. This subsection were attributed to the DPRK, but also at the role of other explains how cyber capabilities fit into the DPRK’s states in these activities. asymmetric strategy and complement its nuclear missile The study of DPRK cyber-activities is relevant program. The WannaCry ransomware, for example, because of the DPRK’s unique position in international showed that DPRK cyber capabilities can be deployed to politics and its growing cyber capabilities. The latter threaten individuals through indiscriminate have attracted greater international attention in recent cyberattacks. years and warrant more detailed examination. In Section 5, this Hotspot Analysis suggests a The goal of this Hotspot Analysis is to better series of policy recommendations that states may wish understand the mechanisms of DPRK cyber-activities to implement in order to mitigate potential cyberattacks and their role in DPRK strategy. This report will be from the DPRK. States could improve their cybersecurity updated as new cyberattacks or relevant elements through awareness programs on spear phishing and by related to the DPRK emerge. This Hotspot Analysis will keeping their operating systems and software up to also form part of a broader study that comprises the date. They could also encourage financial institutions, various Hotspot Analyses published during the year. This which are at a particularly high risk, to improve their broader report will compare these Hotspot Analyses, cybersecurity. Finally, states should closely

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    33 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us