{"id":9080,"date":"2020-04-28T13:56:24","date_gmt":"2020-04-28T17:56:24","guid":{"rendered":"http:\/\/blogs.shu.edu\/thediplomaticenvoy\/?p=9080"},"modified":"2020-04-28T13:56:24","modified_gmt":"2020-04-28T17:56:24","slug":"north-koreas-hacking-grows","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/","title":{"rendered":"North Korea\u2019s Hacking Grows"},"content":{"rendered":"<p><strong>Luisa Chainferber<br \/>\n<\/strong><strong><em>Senior Correspondent\u00a0<\/em><\/strong><\/p>\n<p>North Korea\u2019s hacking capabilities are growing significantly, which allows the country to rob financial institutions and evade international sanctions, reports the <a href=\"https:\/\/www.wsj.com\/articles\/north-korea-raises-millions-through-hacking-smuggling-u-n-report-finds-11587159007\">The Wall Street Journal<\/a>.<\/p>\n<p>A recent <a href=\"https:\/\/www.wsj.com\/articles\/north-korea-raises-millions-through-hacking-smuggling-u-n-report-finds-11587159007\">UN report<\/a> presented to the President of the United Nations Security Council (UNSC) on April 13 showed pictures, maps, and other forms of evidence that indicate North Korea\u2019s effort to counter sanctions. Many security experts believe that with the revenue accumulated from hacking, the North Korean regime is surviving the pressure to abandon its nuclear weapons program, reports the Wall Street Journal.<\/p>\n<p>Besides financial institutions, North Korean cyber attacks also targeted government representatives in the UN and even the UNSC itself. For example, according to the report, in September of 2019, the National Cybersecurity Agency of France issued a warning that there was spear phishing activity in the earlier month, which targeted countries that were in the UNSC, such as China, France, Belgium, Peru, and South Africa. Although investigations are still in process, there is evidence that more attacks ensued in 2020 as well.<\/p>\n<p>In addition to hacking, the report also noted that North Korea is buying far more petroleum than allowed according to UNSC sanctions. In fact, the report denounced that although more vessels are under investigation, there is evidence that vessels came to North Korea \u201cat least 157 times to deliver refined petroleum products illegally procured via ship-to-ship transfers within the first 10 months of 2019,\u201d through the use of obfuscation strategies.<\/p>\n<p>The report believes North Korea has a minimum of a thousand information technology workers abroad in order to generate revenue. It is estimated that the country makes approximately $1,700 monthly in revenue from each worker, meaning that these workers bring roughly $20.4 million per year to the North Korean regime.<\/p>\n<p>To help explain the extent of the hacker\u2019s operations, it is worth noting that the United States promised a reward of $5 million for assistance to identity these hackers, reports <a href=\"https:\/\/studentshu-my.sharepoint.com\/:w:\/g\/personal\/chainflu_shu_edu\/EeEk5QiPMc1NvpflsaEY4Z4B9UgPG743o4K2tfsbps4jHQ\">Forbes<\/a>. In an advisory released on April 15, the US government noted that the hackers are not just a threat to all nations, but also a \u201ca significant threat to the integrity and stability of the international financial system.\u201d Examples of previous attacks include the Sony Pictures network hacking during 2014 and a robbery of at least $81 million from a Bangladeshi bank in 2016.<\/p>\n<p>Besides hacking, North Korea\u2019s missile testing also seems to be on the rise. According to <a href=\"https:\/\/foreignpolicy-com.eu1.proxy.openathens.net\/2020\/04\/20\/north-korea-trump-advance-nuclear-ambitions\/\">Foreign Policy<\/a>, by the end of last year, North Korea fired at least 25 ballistic missiles. This rise in missiles aligns with the report\u2019s denouncement that North Korea increased its infrastructure for nuclear weapons.<\/p>\n<p>While North Korean hacking is rising, there a lot of uncertainty of the overall situation of the country. For example, according to <a href=\"https:\/\/nypost.com\/2020\/04\/24\/kim-jong-un-may-have-left-pyongyang-as-health-rumors-swirl\/\">The New York Post<\/a>, during this week, there was a lot of speculation about the health of Kim Jong Un as reports indicated that he was in a critical condition following heart surgery. It is speculated that the North Korean leader may have left Pyongyang, North Korea\u2019s capital, and went to unknown location on North Korea\u2019 Eastern coast.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>North Korea\u2019s hacking capabilities are growing significantly, which allows the country to rob financial institutions and evade international sanctions.<\/p>\n","protected":false},"author":4215,"featured_media":7021,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1910,382,386,1862],"tags":[420,865,1917],"class_list":["post-9080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-april-2020","category-international-news","category-asia","category-1862","tag-north-korea","tag-asia","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>North Korea\u2019s Hacking Grows - The Diplomatic Envoy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korea\u2019s Hacking Grows - The Diplomatic Envoy\" \/>\n<meta property=\"og:description\" content=\"North Korea\u2019s hacking capabilities are growing significantly, which allows the country to rob financial institutions and evade international sanctions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/\" \/>\n<meta property=\"og:site_name\" content=\"The Diplomatic Envoy\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-28T17:56:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2018\/10\/north-korea-2662076_960_720.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luisa Chainferber\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luisa Chainferber\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/\"},\"author\":{\"name\":\"Luisa Chainferber\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/d845b63cb1fe6efa436c5a77ae85d872\"},\"headline\":\"North Korea\u2019s Hacking Grows\",\"datePublished\":\"2020-04-28T17:56:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/\"},\"wordCount\":516,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2018\\\/10\\\/north-korea-2662076_960_720.jpg\",\"keywords\":[\"North Korea\",\"Asia\",\"Cyber Security\"],\"articleSection\":[\"April 2020\",\"International News\",\"Asia\",\"2020\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/\",\"name\":\"North Korea\u2019s Hacking Grows - The Diplomatic Envoy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2018\\\/10\\\/north-korea-2662076_960_720.jpg\",\"datePublished\":\"2020-04-28T17:56:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/d845b63cb1fe6efa436c5a77ae85d872\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2018\\\/10\\\/north-korea-2662076_960_720.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2018\\\/10\\\/north-korea-2662076_960_720.jpg\",\"width\":960,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2020\\\/04\\\/28\\\/north-koreas-hacking-grows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"North Korea\u2019s Hacking Grows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\",\"name\":\"The Diplomatic Envoy\",\"description\":\"Words Beyond Borders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/d845b63cb1fe6efa436c5a77ae85d872\",\"name\":\"Luisa Chainferber\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6189b25b06787a30c1773620ee28a09bd8fe7c09e3b3f7a254a95fa4a23f1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6189b25b06787a30c1773620ee28a09bd8fe7c09e3b3f7a254a95fa4a23f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6189b25b06787a30c1773620ee28a09bd8fe7c09e3b3f7a254a95fa4a23f1f2?s=96&d=mm&r=g\",\"caption\":\"Luisa Chainferber\"},\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/author\\\/chainflu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korea\u2019s Hacking Grows - The Diplomatic Envoy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/","og_locale":"en_US","og_type":"article","og_title":"North Korea\u2019s Hacking Grows - The Diplomatic Envoy","og_description":"North Korea\u2019s hacking capabilities are growing significantly, which allows the country to rob financial institutions and evade international sanctions.","og_url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/","og_site_name":"The Diplomatic Envoy","article_published_time":"2020-04-28T17:56:24+00:00","og_image":[{"width":960,"height":720,"url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2018\/10\/north-korea-2662076_960_720.jpg","type":"image\/jpeg"}],"author":"Luisa Chainferber","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Luisa Chainferber","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#article","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/"},"author":{"name":"Luisa Chainferber","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/d845b63cb1fe6efa436c5a77ae85d872"},"headline":"North Korea\u2019s Hacking Grows","datePublished":"2020-04-28T17:56:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/"},"wordCount":516,"commentCount":0,"image":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2018\/10\/north-korea-2662076_960_720.jpg","keywords":["North Korea","Asia","Cyber Security"],"articleSection":["April 2020","International News","Asia","2020"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/","name":"North Korea\u2019s Hacking Grows - The Diplomatic Envoy","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#primaryimage"},"image":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2018\/10\/north-korea-2662076_960_720.jpg","datePublished":"2020-04-28T17:56:24+00:00","author":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/d845b63cb1fe6efa436c5a77ae85d872"},"breadcrumb":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#primaryimage","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2018\/10\/north-korea-2662076_960_720.jpg","contentUrl":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2018\/10\/north-korea-2662076_960_720.jpg","width":960,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2020\/04\/28\/north-koreas-hacking-grows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/"},{"@type":"ListItem","position":2,"name":"North Korea\u2019s Hacking Grows"}]},{"@type":"WebSite","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/","name":"The Diplomatic Envoy","description":"Words Beyond Borders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/d845b63cb1fe6efa436c5a77ae85d872","name":"Luisa Chainferber","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f6189b25b06787a30c1773620ee28a09bd8fe7c09e3b3f7a254a95fa4a23f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f6189b25b06787a30c1773620ee28a09bd8fe7c09e3b3f7a254a95fa4a23f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f6189b25b06787a30c1773620ee28a09bd8fe7c09e3b3f7a254a95fa4a23f1f2?s=96&d=mm&r=g","caption":"Luisa Chainferber"},"url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/author\/chainflu\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/9080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/users\/4215"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/comments?post=9080"}],"version-history":[{"count":2,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/9080\/revisions"}],"predecessor-version":[{"id":9082,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/9080\/revisions\/9082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/media\/7021"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/media?parent=9080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/categories?post=9080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/tags?post=9080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}