Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

North Korea's history of bold cyber attacks

2 of 12 NEXT PREV
  • North Korea’s growing criminal cyberthreat

    North Korea’s growing criminal cyberthreat

    North Korean hackers, backed by the state, are believed to be responsible for an array of bold attacks made in the name of money, or the reputation of the Democratic People's Republic of Korea regime. Some of these include, but are not limited to...

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)

    SEE: Can Russian hackers be stopped? Here's why it might take 20 years (TechRepublic cover story) | download the PDF version

    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Pixabay/CC0 Creative Commons

    Caption by: Charlie Osborne

  • Nonghyup, 2011

    Nonghyup, 2011

    An attack against South Korean farm co-op Nonghyup paralyzed the bank, leaving customers unable to access funds for over a week.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Jytim/CC 4.0 International license

    Caption by: Charlie Osborne

  • South Korean banks, 2013

    South Korean banks, 2013

    The operations of three major banks and two broadcasters collapsed at the same time as North Korean news agency KNCA relayed a message from North Korean's leadership, pledging to destroy the South's government.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Kwangmo/CC 4.0 International license

    Caption by: Charlie Osborne

  • Sony, 2014

    Sony, 2014

    The FBI blamed North Korea for a brutal cyberattack on Sony which compromised the tech company's networks and led to the leak of terabytes of information online. It is believed the attack was launched in response to Sony's planned release of, The Interview, a film which tells the satirical story of journalists recruited to assassinate Kim Jong Un.

    See also: Thousands could launch Sony-style cyberattack, says ex-hacker (CNET)

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: CNET

    Caption by: Charlie Osborne

  • The Central Bank of Bangladesh, 2016

    The Central Bank of Bangladesh, 2016

    The notorious bank heist that targeted the Central Bank of Bangladesh's Federal Reserve account lead to the theft of $81 million, and was connected to the Sony breach -- and therefore North Korea -- through the malware utilized in the compromise of the SWIFT bank communications system.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: NahidSultan/CC 4.0 International license

    Caption by: Charlie Osborne

  • WannaCry, 2017

    WannaCry, 2017

    The release of NSA tools -- including EternalBlue by the Shadow Brokers hacking group -- ultimately led to the global WannaCry ransomware attack, which debilitated companies worldwide without prejudice. It is believed that North Korea threat actors implemented the exploit in distributing the ransomware.

    See also: WannaCry: The smart person's guide

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: ZDNet/CNET

    Caption by: Charlie Osborne

  • US utilities, 2017

    US utilities, 2017

    Cybersecurity firm FireEye believes that the rogue state is behind a number of attacks aimed at US electricity companies.

    See also: North Korean Actors Spear Phish U.S. Electric Companies (FireEye)

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Benh/CC 4.0 International license

    Caption by: Charlie Osborne

  • Energy services, 2017

    Energy services, 2017

    A group known as Covellite, connected to North Korea, has been linked to attacks against US, European and East Asian organizations involved in consumer energy. However, in recent months, attacks against US targets appear to have been abandoned.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: File Photo

    Caption by: Charlie Osborne

  • Cryptocurrency exchanges, South Korea

    Cryptocurrency exchanges, South Korea

    South Korea is a common target for DPRK hackers, and cryptocurrency exchanges -- containing millions of dollars' worth of virtual assets -- are lucrative. According to South Korean officials, North Korea is responsible for the theft of "billions of won" from exchanges over the past 12 months.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Caption by: Charlie Osborne

  • Cryptojacking, worldwide

    Cryptojacking, worldwide

    Cybersecurity professionals have suggested that the regime's hackers have created cryptojacking malware designed to steal victim CPU power to mine cryptocurrency. Proceeds are allegedly finding their way to North Korea's Kim Il Sung University.

    See also: Inside the early days of North Korea's cyberwar factory

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Laremenko, Getty Images/iStockphoto

    Caption by: Charlie Osborne

  • Journalists and defectors, worldwide

    Journalists and defectors, worldwide

    Malware-laden Android apps, aimed at North Korean defectors and journalists covering the regime, keep slipping through the net and appearing on Google Play.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: McAfee

    Caption by: Charlie Osborne

  • Ontario's rail system, 2018

    Ontario's rail system, 2018

    Metrolink, Ontario's transportation agency, claims that North Korea attempted to derail IT systems, without success.

    Security

    • Trump decrees American cloud providers need to maintain records on foreign clients
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Brian Karczewski/CC 3.0 license

    Caption by: Charlie Osborne

2 of 12 NEXT PREV
Charlie Osborne

By Charlie Osborne | June 11, 2018 -- 20:50 GMT (13:50 PDT) | Topic: Security

  • North Korea’s growing criminal cyberthreat
  • Nonghyup, 2011
  • South Korean banks, 2013
  • Sony, 2014
  • The Central Bank of Bangladesh, 2016
  • WannaCry, 2017
  • US utilities, 2017
  • Energy services, 2017
  • Cryptocurrency exchanges, South Korea
  • Cryptojacking, worldwide
  • Journalists and defectors, worldwide
  • Ontario's rail system, 2018

Many of the massive cyberattacks that have spread across the world in recent years were traced back or attributed to North Korea. Here are eleven examples.

Read More Read Less

Nonghyup, 2011

An attack against South Korean farm co-op Nonghyup paralyzed the bank, leaving customers unable to access funds for over a week.

Security

  • Trump decrees American cloud providers need to maintain records on foreign clients
  • Cyber security 101: Protect your privacy from hackers, spies, and the government
  • Best antivirus software and apps in 2021: Keep your PC, smartphone, and tablet safe
  • The best VPNs for business and home use
  • The best security keys for two-factor authentication
  • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
  • How to improve the security of your public cloud (TechRepublic)
Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

Caption by: Charlie Osborne

2 of 12 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | June 11, 2018 -- 20:50 GMT (13:50 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums