February 22, 2022

Understanding the Strengths and Vulnerabilities of North Korean Hackers

The international community often incorrectly correlates North Korea’s lack of access to modern computer hardware within its borders to inferior offensive cyber capabilities. As demonstrated in a new report released by the Center for a New American Security (CNAS), North Korea has rapidly expanded its illicit activity within the cyber domain under sustained economic pressure from decades of sanctions. As such, Pyongyang will likely continue to adapt its cybercrime operations to evade the full brunt of economic sanctions as innovation within the crypto space, such as cryptocurrency, continues to outpace current regulation of financial technology The report also outlined major flaws in North Korean cyber operations, as well as areas where the United States and its allies can expand coordination to counter North Korea-led cyber-enabled financial crime.

Pyongyang continues to defy miscalculated expectations regarding its cyber capabilities by successfully employing a series of sophisticated cyberattacks that target new and developing financial technology.

In partnership with data provided by leading blockchain analysis firm TRM Labs, CNAS provides in-depth analysis of Pyongyang’s demonstrated ability to exploit cryptocurrencies by investigating three separate case studies of North Korean hacks targeting cryptocurrency exchanges. Through analyzing these hacks, the report outlined key strengths and vulnerabilities in North Korea’s ability to steal, launder, and liquidate funds. A major takeaway from the study was that North Korean hackers demonstrated only moderate concern over eventual attribution of their crimes, meaning that the process of laundering stolen funds was not executed as seamlessly as the initial hack. This signals that Pyongyang is aware of the lack of legal retribution for its illicit cyber activities, thus preferring speed over total obfuscation. For example, only one North Korean national has ever been extradited to the United States to face money laundering charges, and this was an extraordinarily rare case. Additionally, North Korean hackers have demonstrated steady improvements in the complexity of their hacks and laundering operations, including the use of cryptocurrency mixers and over-the-counter brokers to hide the origin of the stolen crypto and the initial hack.

Read the full article from The Diplomat.

  • Podcast
    • October 3, 2024
    Europe’s Take on Economic Security with EU Ambassador to the U.S. Jovita Neliupšienė

    Ambassador Jovita Neliupšienė, the European Union's Ambassador to the United States, joins Emily and Geoff for a wide-ranging conversation on Europe's growing role as a econom...

    By Emily Kilcrease & Geoffrey Gertz

  • Podcast
    • September 23, 2024
    What's behind Washington's plans to ban Chinese tech in cars?

    Geoffrey Gertz joins the BBC to discuss Washington's latest efforts to regulate Chinese tech. Listen to the full episode from Business Matters....

    By Geoffrey Gertz

  • Podcast
    • September 19, 2024
    How ASML Came to Dominate Chipmaking

    NRC Media reporter Marc Hijink joined co-host Emily Kilcrease at a CNAS event to discuss his book, Focus: The ASML Way. For decades, ASML - the most valuable technology compan...

    By Emily Kilcrease

  • Podcast
    • September 5, 2024
    Geopolitical Doomscrolling

    Geoff and Emily talk about the tensions between social media platforms and governments around the world, including Telegram’s troubles in France and X’s spats with Brazil and ...

    By Emily Kilcrease, Geoffrey Gertz & Carrie Cordero

View All Reports View All Articles & Multimedia