January 20, 2022
How North Korea Might Exploit New Video Games for Crypto
Pyongyang has demonstrated growing interest and capability in exploiting new financial technology to obtain valuable foreign currency needed for its weapons development programs. Given the rising popularity in trading cryptocurrency, North Korean hackers are likely to include new play-to-earn (P2E) crypto games within their illicit cyber-enabled financial schemes.
The online gaming industry has a history of illicit actors exploiting its networks and user base to conduct and facilitate cyber-enabled financial crime.
Once reserved for professional gamers winning massive cash prizes at national and global tournaments, video gaming has evolved to now provide amateur gamers and crypto enthusiasts with opportunities to earn large amounts of cryptocurrency with relative ease. Most video games follow play-to-win (P2W) mechanics that entice players to complete a series of puzzles, tasks, and activities to “beat the game” or progress to the next level. In order to earn money, professional players typically enroll in tournaments organized by third parties to win cash prices and other financial rewards. However, P2E crypto games operate on blockchain technology that facilitates the earning of cryptocurrency within the game itself, or non-fungible tokens (NFTs) that can be later sold for cryptocurrency. The technological mechanics of P2E crypto games remove the need for tournaments or third-party organizers to provide players with potential financial rewards outside of the game, which presents new financial risks within the online gaming world.
Read the full article from The Diplomat.
More from CNAS
-
Richard Nephew on the U.S. military strikes on Iran’s nuclear program
Richard Nephew, expert on sanctions and Iran’s nuclear program, joins Emily and Geoff to discuss the long history of U.S. policy towards Iran, the role of sanctions in constra...
By Emily Kilcrease & Geoffrey Gertz
-
Energy, Economics & Security / Technology & National Security
Beyond Bans: Expanding the Policy Options for Tech-Security ThreatsStuck between a rock (the fact that banning all Chinese tech that poses a risk is expensive and impractical) and a hard place (the fact that many existing mitigation proposals...
By Geoffrey Gertz
-
Indo-Pacific Security / Energy, Economics & Security
75 Years Post-Korean War: Can Trust Be Rebuilt Under the New Administration?As President Lee Jae Myung begins his term, he's taking visible steps to reset the tone with North Korea: halting propaganda broadcasts and reemphasizing past military agreeme...
By Dr. Go Myong-Hyun
-
Middle East Security / Energy, Economics & Security
Will Iran block the Strait of Hormuz?The world has held a close eye on the Strait of Hormuz lately with Israeli and U.S. strikes on Iran. Nearly a quarter of the world's seaborne oil passes through the narrow wat...
By Rachel Ziemba