Search
  • Videos
  • Enterprise Software
  • Windows 10
  • Cloud
  • AI
  • Security
  • TR Premium
  • more
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Enterprise Software
    • Windows 10
    • Cloud
    • AI
    • Security
    • TR Premium
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

North Korea's history of bold cyber attacks

11 of 12 NEXT PREV
  • North Korea’s growing criminal cyberthreat

    North Korea’s growing criminal cyberthreat

    North Korean hackers, backed by the state, are believed to be responsible for an array of bold attacks made in the name of money, or the reputation of the Democratic People's Republic of Korea regime. Some of these include, but are not limited to...

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)

    SEE: Can Russian hackers be stopped? Here's why it might take 20 years (TechRepublic cover story) | download the PDF version

    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Pixabay/CC0 Creative Commons

    Caption by: Charlie Osborne

  • Nonghyup, 2011

    Nonghyup, 2011

    An attack against South Korean farm co-op Nonghyup paralyzed the bank, leaving customers unable to access funds for over a week.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Jytim/CC 4.0 International license

    Caption by: Charlie Osborne

  • South Korean banks, 2013

    South Korean banks, 2013

    The operations of three major banks and two broadcasters collapsed at the same time as North Korean news agency KNCA relayed a message from North Korean's leadership, pledging to destroy the South's government.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Kwangmo/CC 4.0 International license

    Caption by: Charlie Osborne

  • Sony, 2014

    Sony, 2014

    The FBI blamed North Korea for a brutal cyberattack on Sony which compromised the tech company's networks and led to the leak of terabytes of information online. It is believed the attack was launched in response to Sony's planned release of, The Interview, a film which tells the satirical story of journalists recruited to assassinate Kim Jong Un.

    See also: Thousands could launch Sony-style cyberattack, says ex-hacker (CNET)

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: CNET

    Caption by: Charlie Osborne

  • The Central Bank of Bangladesh, 2016

    The Central Bank of Bangladesh, 2016

    The notorious bank heist that targeted the Central Bank of Bangladesh's Federal Reserve account lead to the theft of $81 million, and was connected to the Sony breach -- and therefore North Korea -- through the malware utilized in the compromise of the SWIFT bank communications system.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: NahidSultan/CC 4.0 International license

    Caption by: Charlie Osborne

  • WannaCry, 2017

    WannaCry, 2017

    The release of NSA tools -- including EternalBlue by the Shadow Brokers hacking group -- ultimately led to the global WannaCry ransomware attack, which debilitated companies worldwide without prejudice. It is believed that North Korea threat actors implemented the exploit in distributing the ransomware.

    See also: WannaCry: The smart person's guide

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: ZDNet/CNET

    Caption by: Charlie Osborne

  • US utilities, 2017

    US utilities, 2017

    Cybersecurity firm FireEye believes that the rogue state is behind a number of attacks aimed at US electricity companies.

    See also: North Korean Actors Spear Phish U.S. Electric Companies (FireEye)

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Benh/CC 4.0 International license

    Caption by: Charlie Osborne

  • Energy services, 2017

    Energy services, 2017

    A group known as Covellite, connected to North Korea, has been linked to attacks against US, European and East Asian organizations involved in consumer energy. However, in recent months, attacks against US targets appear to have been abandoned.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: File Photo

    Caption by: Charlie Osborne

  • Cryptocurrency exchanges, South Korea

    Cryptocurrency exchanges, South Korea

    South Korea is a common target for DPRK hackers, and cryptocurrency exchanges -- containing millions of dollars' worth of virtual assets -- are lucrative. According to South Korean officials, North Korea is responsible for the theft of "billions of won" from exchanges over the past 12 months.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Caption by: Charlie Osborne

  • Cryptojacking, worldwide

    Cryptojacking, worldwide

    Cybersecurity professionals have suggested that the regime's hackers have created cryptojacking malware designed to steal victim CPU power to mine cryptocurrency. Proceeds are allegedly finding their way to North Korea's Kim Il Sung University.

    See also: Inside the early days of North Korea's cyberwar factory

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Laremenko, Getty Images/iStockphoto

    Caption by: Charlie Osborne

  • Journalists and defectors, worldwide

    Journalists and defectors, worldwide

    Malware-laden Android apps, aimed at North Korean defectors and journalists covering the regime, keep slipping through the net and appearing on Google Play.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: McAfee

    Caption by: Charlie Osborne

  • Ontario's rail system, 2018

    Ontario's rail system, 2018

    Metrolink, Ontario's transportation agency, claims that North Korea attempted to derail IT systems, without success.

    Security

    • 2020 is when cybersecurity gets even weirder, so get ready
    • FBI recommends that you keep your IoT devices on a separate network
    • A decade of malware: Top botnets of the 2010s
    • How to prevent a ransomware attack (ZDNet YouTube)
    • Best home security of 2019: Professional monitoring and DIY (CNET)
    • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Brian Karczewski/CC 3.0 license

    Caption by: Charlie Osborne

11 of 12 NEXT PREV
Charlie Osborne

By Charlie Osborne | June 11, 2018 -- 20:50 GMT (13:50 PDT) | Topic: Security

  • North Korea’s growing criminal cyberthreat
  • Nonghyup, 2011
  • South Korean banks, 2013
  • Sony, 2014
  • The Central Bank of Bangladesh, 2016
  • WannaCry, 2017
  • US utilities, 2017
  • Energy services, 2017
  • Cryptocurrency exchanges, South Korea
  • Cryptojacking, worldwide
  • Journalists and defectors, worldwide
  • Ontario's rail system, 2018

Many of the massive cyberattacks that have spread across the world in recent years were traced back or attributed to North Korea. Here are eleven examples.

Read More Read Less

Journalists and defectors, worldwide

Malware-laden Android apps, aimed at North Korean defectors and journalists covering the regime, keep slipping through the net and appearing on Google Play.

Security

  • 2020 is when cybersecurity gets even weirder, so get ready
  • FBI recommends that you keep your IoT devices on a separate network
  • A decade of malware: Top botnets of the 2010s
  • How to prevent a ransomware attack (ZDNet YouTube)
  • Best home security of 2019: Professional monitoring and DIY (CNET)
  • How to control location tracking on your iPhone in iOS 13 (TechRepublic)
Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

Caption by: Charlie Osborne

11 of 12 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | June 11, 2018 -- 20:50 GMT (13:50 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

  • The world's most famous and dangerous APT (state-developed) malware

    A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military ...

  • Best-paid tech jobs, malware warnings and shadow IT: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums