Cybersecurity NewsNews

Shocking; North Korea Value Cyber Espionage Over Financial Exploit

According to analysts from cyber intelligence firm Recorded Future, North Korean hackers are surprisingly prioritizing cyber espionage over lethal system attacks.

The cyber analyst firm discovered more than 70% of cyberattacks with a known objective and attributed to North Korea since 2009 was presumably operated for data compilation rather than damage systems.

North Korea’s government seems to be keener on learning what others think of them, collecting data to help them create nuclear and ballistic missile technology, Recorded Future reported.

Analytical Insights Into North Korea Cyber Operations

Recorded Future reviewed 273 cyberattacks ascribed to North Korea since July 2009 and the top five most-targeted corporations are government, cryptocurrency, media, traditional finance, and the defense sector.

The cyber threat intelligence agency said the precise figure of cyber attacks is far higher because private corporations and government agencies do not often make known their research on attacks.

Additionally, government agencies, reporters, and NGOs with a nexus to North Korea should be better vigilant, as well as defense contractors and aerospace firms backing the U.S., South Korea, or other allied nations.

Recorded Future’s analysis ensues after North Korean hackers’ recent fierce targeting of Americans in infiltrating rate access to valuable data and sabotaging system networks.

Moreover, high-level contemporary and former U.S. intelligence officials and national security intellectuals were in the crosshairs of North Korean cyber instigators as part of a malicious cyber campaign, the Washington Times reported.

Alliance to Fend Off North Korean Aggressions

The FBI, the CISA, and the State Department allied with South Korean government agencies to issue an advisory this month that warned about social engineering and hacking threats posed by the North Koreans.

Government agencies warned, Some targeted corporations may disregard the threat posed by these social engineering movements because they do not sense their research and communications as prudent, or because they are not aware of these efforts fueling the regime’s wider spying network efforts.

Related Articles

Back to top button