Security

Uncle Sam accuses three suspected North Korean govt hackers of stealing $1.3bn+ from banks, crypto orgs

Oh yes, and hacking Hollywood, allegedly


Three suspected North Korean military intelligence hackers have been charged with, among other things, conspiring to loot more than $1.3bn (£938m) from banks, ATMs, and cryptocurrency companies, according to an indictment unsealed by the US Department of Justice on Wednesday.

“North Korea’s operatives, using keyboards rather than masks and guns, are the world’s leading 21st century nation-state bank robbers,” Assistant Attorney General John Demers of the Justice Department’s National Security Division, said in a statement.

Court documents, filed in the District Court in Los Angeles in December last year and now made public [PDF], claim Park Jin Hyok, 36, Jon Chang Hyok, 31, and Kim Il, 27, were hackers employed by the Reconnaissance General Bureau (RGB), a North Korean intelligence agency.

The three men have been charged with a long list of wrongdoing, including the hacking of Sony in 2014 for its film, The Interview, that depicted a fictional assassination of the North Korean leader Kim Jong Un. More financially rewarding was their alleged hand in creating the WannaCry ransomware in 2017 that knackered the UK’s National Health System and hit businesses from the automotive to banking industries.

North Korean attacks on crypto exchanges reportedly netted $316m in two years

READ MORE

WannaCry ended up infecting 74 countries, causing havoc worldwide. British malware-prober Marcus Hutchins famously found and activated the domain-name-based killswitch for the software nasty, halting its spread.

The indictment also claimed the suspected Pyongyang cyber-spies pilfered and extorted as much as $1.2bn dollars (£866m) from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta, and Africa between 2015 and 2019 by hacking into their computer networks.

The men also, it is claimed, siphoned $6.1m (£4.4m) from ATMs in Pakistan, targeted digital currency exchanges and trading platforms to pinch $111.7m (£80.6m), and even went as far as inventing their own blockchain and cryptocurrency to enrich the North Korean regime. A total of $1.9m (£1.4m) worth of various allegedly stolen cryptocurrencies were seized by the FBI and the US Attorney’s Office, and will be returned to two companies in New York.

On top of hacking for money, the North Koreans carried out multiple phishing attacks to steal sensitive data from US government contractors and agencies, such as the Department of State and the Department of Defense, it is claimed.

The trio have been charged with one count of conspiracy to commit computer fraud and abuse, and one count of conspiracy to commit wire fraud and bank fraud, which carry a maximum sentence of five years and 30 years in prison, respectively, if convicted. It's unlikely they will ever stand trial in the United States. Park was also identified as a member of the RGB and part of a team known as the Lazarus Group in a previous DoJ complaint.

“The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” said Acting US Attorney Tracy Wilkison. “The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.” ®

Send us news
7 Comments

Misconfigured cloud server leaked clues of North Korean animation scam

Outsourcers outsourced work for the BBC, Amazon, and HBO Max to the hermit kingdom

That Asian meal you eat on holidays could launder money for North Korea

United Nations finds IT contract and crypto scams are just two of DPRK's illicit menu items

Execs in Japan busted for winning dev bids then outsourcing to North Koreans

Government issues stern warning over despot money-making scheme

It's 2024 and North Korea's Kimsuky gang is exploiting Windows Help files

New infostealer may indicate a shift in tactics – and maybe targets too, beyond Asia

Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability

PLUS: NSA shares cloud security tips; Infosec training for Jordanian women; Critical vulnerabilities

North Korea running malware-laden gambling websites as-a-service

$5k a month for the site. $3k for tech support. Infection with malware and funding a despot? Priceless

Think tank warns North Korea uses AI for battle planning, maybe using cloudy resources

Calls for clouds, and scientists, to take care they're not aiding Pyongyang

Korean peninsula space race sees South and North launch tit for tat spy sats

North claims it took photos of stuff. South points to success of homegrown booster

North Korea readies third attempt at 'spy satellite' launch

What a coincidence! The South is just about to lauch one, too. And it probably won't be junk like the hermit kingdom's recent efforts

Russia joins North Korea in sending state-sponsored cyber troops to pick on TeamCity users

National security and infosec authorities band together to help victims sniff out stealthy Russian baddies hiding in networks

Think tank report labels NSO, Lazarus as 'cyber mercenaries'

Sure, they do crimes. But the plausible deniability governments adore means they deserve a different label

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Latest offensive cyber group to switch to atypical programming for payloads