www.politico.com Open in urlscan Pro
2606:4700:4400::ac40:9205  Public Scan

URL: https://www.politico.com/news/2023/12/21/north-korea-missiles-program-hackers-00132871
Submission: On December 23 via manual from US — Scanned from US

Form analysis 2 forms found in the DOM

GET https://www.politico.com/search

<form class="slide-search__form" action="https://www.politico.com/search" method="get">
  <input class="slide-search__input" type="search" name="q" id="searchTerm" aria-label="Search for any story" placeholder="Enter search term...">
  <button class="slide-search__run" type="submit" aria-label="Start search"><b class="bt-icon bt-icon--search"></b><span class="icon-text">Search</span></button>
  <button class="slide-search__close" id="search-close" type="button"><b class="bt-icon bt-icon--close" aria-label="Close Search"></b></button>
</form>

<form class="form-section">
  <input type="hidden" name="subscribeId" value="0000014f-1646-d88f-a1cf-5f46b7bd0000">
  <input type="hidden" name="processorId" value="00000179-61ab-d60d-a9f9-f5bf392e0000">
  <input type="hidden" name="validateEmail" value="true">
  <input type="hidden" name="enhancedSignUp" value="true">
  <input type="hidden" name="bot-field" value="" class="dn">
  <input type="hidden" name="subscriptionModule" value="newsletter_inline_standard_Playbook - POLITICO" class="dn">
  <input type="hidden" name="captchaUserToken" value="" autocomplete="off">
  <input type="hidden" name="captchaPublicKey" value="6LfS6L8UAAAAAAHCPhd7CF66ZbK8AyFfk3MslbKV" autocomplete="off">
  <div class="sign-up-21--msg sign-up-21--msg-spinner" aria-hidden="true">
    <div class="msg-content">
      <p>Loading</p>
      <svg class="sign-up-21--msg-icon-lg sign-up-21--spinner-icon-lg" xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 24 24" fill="none" stroke="#4D8AD2" stroke-width="1" stroke-linecap="round" stroke-linejoin="round">
        <line x1="12" y1="2" x2="12" y2="6"></line>
        <line x1="12" y1="18" x2="12" y2="22"></line>
        <line x1="4.93" y1="4.93" x2="7.76" y2="7.76"></line>
        <line x1="16.24" y1="16.24" x2="19.07" y2="19.07"></line>
        <line x1="2" y1="12" x2="6" y2="12"></line>
        <line x1="18" y1="12" x2="22" y2="12"></line>
        <line x1="4.93" y1="19.07" x2="7.76" y2="16.24"></line>
        <line x1="16.24" y1="7.76" x2="19.07" y2="4.93"></line>
      </svg>
    </div>
  </div>
  <div class="sign-up-21--msg sign-up-21--msg-completed" aria-live="assertive" aria-hidden="true">
    <div class="msg-content">
      <p>You will now start receiving email updates</p>
      <svg class="sign-up-21--msg-icon-lg" width="48" height="48" viewBox="0 0 48 48" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path
          d="M44 22.1597V23.9997C43.9975 28.3126 42.601 32.5091 40.0187 35.9634C37.4363 39.4177 33.8066 41.9447 29.6707 43.1675C25.5349 44.3904 21.1145 44.2435 17.0689 42.7489C13.0234 41.2543 9.56931 38.4919 7.22192 34.8739C4.87453 31.2558 3.75958 26.9759 4.04335 22.6724C4.32712 18.3689 5.99441 14.2724 8.79656 10.9939C11.5987 7.71537 15.3856 5.43049 19.5924 4.48002C23.7992 3.52955 28.2005 3.9644 32.14 5.71973"
          stroke="#4D8AD2" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
        <path d="M44 8L24 28.02L18 22.02" stroke="#4D8AD2" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
      </svg>
    </div>
  </div>
  <div class="sign-up-21--msg sign-up-21--msg-already-subscribed" aria-live="assertive" aria-hidden="true">
    <div class="msg-content">
      <p>You are already subscribed</p>
      <svg class="sign-up-21--msg-icon-lg" xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="1" stroke-linecap="round" stroke-linejoin="round">
        <path d="M14 9V5a3 3 0 0 0-3-3l-4 9v11h11.28a2 2 0 0 0 2-1.7l1.38-9a2 2 0 0 0-2-2.3zM7 22H4a2 2 0 0 1-2-2v-7a2 2 0 0 1 2-2h3"></path>
      </svg>
      <a href="/newsletters" target="_top"></a>
    </div>
  </div>
  <div class="sign-up-21--msg sign-up-21--msg-error" aria-live="assertive" aria-hidden="true">
    <div class="sign-up-21--msg-close">
      <svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path id="close" fill-rule="evenodd" clip-rule="evenodd"
          d="M17.513 16.6291L10.8839 9.99995L17.513 3.37082L16.6291 2.48694L10 9.11606L3.37088 2.48694L2.487 3.37082L9.11613 9.99995L2.487 16.6291L3.37088 17.513L10 10.8838L16.6291 17.513L17.513 16.6291Z" fill="#000"></path>
      </svg>
    </div>
    <div class="msg-content">
      <p style="color:#9E352C">Something went wrong</p>
    </div>
  </div>
  <fieldset class="form-container active">
    <div class="form-row row-email">
      <div class="form-row-container">
        <label class="data-form-label" for="email" aria-hidden="true">Email</label>
        <span class="sign-up-21--error-msg" aria-hidden="true">
          <span class="sign-up-21--exclamation">!</span>
          <span id="email-hint">Please make sure that the email address you typed in is valid</span>
        </span>
        <div class="form-row-container--input">
          <input type="email" name="subscribeEmail" aria-label="Email" placeholder="Your Email" required="">
        </div>
      </div>
    </div>
    <div class="form-row row-secondary-questions active">
      <div class="sign-up-21--secondary-questions-container">
        <div class="form-row-container">
          <label class="data-form-label" aria-hidden="true">Employer</label>
          <div class="form-row-container--input">
            <input type="text" name="job_employer" required="" aria-label="Employer" placeholder="Employer">
          </div>
        </div>
        <div class="form-row-container">
          <label class="data-form-label" aria-hidden="true">Job Title</label>
          <div class="form-row-container--input">
            <input type="text" name="job_title" required="" aria-label="Job Title" placeholder="Job Title">
          </div>
        </div>
      </div>
    </div>
    <div class="form-row row-notice">
      <span class="sign-up-21--notice">
        <span class="color-red">*</span> All fields must be completed to subscribe. </span>
      <button type="submit" class="submit-button" aria-disabled="true">Sign Up</button>
    </div>
    <div class="row-bottom">
      <p class="form-policy"> By signing up, you acknowledge and agree to our <a href="https://www.politico.com/privacy" target="_blank">Privacy Policy</a> and <a href="https://www.politico.com/terms-of-service" target="_blank">Terms of Service</a>.
        You may unsubscribe at any time by following the directions at the bottom of the email or by <a href="https://www.politico.com/feedback" target="_blank">contacting us here</a>. This site is protected by reCAPTCHA and the Google
        <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and <a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply. </p>
      <button type="submit" class="submit-button" aria-disabled="true"> Sign Up </button>
    </div>
  </fieldset>
</form>

Text Content

Skip to Main Content


POLITICO POLITICO LOGO

 * Congress
 * Pro
 * E&E News
 * Search
   Search


WASHINGTON & POLITICS

 * Congress
 * White House
 * Elections
 * Legal
 * Magazine
 * Foreign Affairs


2024 ELECTIONS

 * News
 * Results
 * GOP Candidate Tracker


STATE POLITICS & POLICY

 * California
 * Florida
 * New Jersey
 * New York


GLOBAL POLITICS & POLICY

 * Brussels
 * Canada
 * United Kingdom


POLICY NEWS

 * Agriculture
 * Cannabis
 * Cybersecurity
 * Defense
 * Education
 * Energy & Environment
 * Finance & Tax
 * Health Care
 * Immigration
 * Labor
 * Sustainability
 * Technology
 * Trade
 * Transportation


NEWSLETTERS

 * Playbook
 * Playbook PM
 * West Wing Playbook
 * POLITICO Nightly
 * POLITICO Weekend
 * The Recast
 * Huddle
 * All Newsletters


COLUMNISTS

 * Alex Burns
 * John Harris
 * Jonathan Martin
 * Michael Schaffer
 * Jack Shafer
 * Rich Lowry


SERIES & MORE

 * Breaking News Alerts
 * Podcasts
 * Video
 * The Fifty
 * Women Rule
 * Matt Wuerker Cartoons
 * Cartoon Carousel


POLITICO LIVE

 * Upcoming Events
 * Previous Events


FOLLOW US

 * Twitter
 * Instagram
 * Facebook

 * My Account
 * Log In Log Out



Cybersecurity


TO STEM NORTH KOREA’S MISSILES PROGRAM, WHITE HOUSE LOOKS TO ITS HACKERS

The Biden administration is doing more to counter North Korean hackers amid
concerns their cryptocurrency heists are powering the country’s weapons
programs.



A February 2023 broadcast shows an image of a North Korean military parade held
in Pyongyang. The Biden administration believes cryptocurrency heists have
become a lifeline for the regime's weapons program. | Jung Yeon-Je/AFP via Getty
Images

By John Sakellariadis

12/22/2023 05:00 AM EST

 * 
 * 

 * * Link Copied
 * * 
   * 
   * 

The Biden administration has spent much of the last two years bracing key U.S.
networks and infrastructure against crippling cyberattacks from Russia, Iran and
China.

But it is following a different playbook as it ramps up its efforts to thwart
digital threats from North Korea: Follow the crypto — and stop it.



Convinced North Korea primarily sees hacking as a way to funnel money back to
the cash-strapped Kim Jong Un regime, the White House has focused on blocking
the country’s ability to launder the cryptocurrency it steals through its
cyberattacks.



In the last year, the administration has unveiled a flurry of sanctions against
North Korean hacking groups, front companies and IT workers, and blacklisted
multiple cryptocurrency services they use to launder stolen funds. Earlier this
month, national security adviser Jake Sullivan announced a new partnership with
Japan and South Korea aimed at cracking down on Pyongyang’s crypto bonanza —
thereby choking off money to its nuclear and conventional weapons programs.

“In countering North Korean cyber operations, our first priority has been
focusing on their crypto heists,” Anne Neuberger, the National Security
Council’s top cybersecurity official, said in an interview.

The stepped-up effort to blunt North Korea’s cyber operations is fueled by
growing alarm about where the fruits of those attacks are going, Neuberger said.

Hacking, she argued, has enabled North Korea to “either evade sanctions or evade
the steps the international community has taken to target their weapons
proliferation … their missile regime, and the growth in the number of launches
we’ve seen.”

Poor regulation and shoddy security in the fast-growing cryptocurrency industry,
which is dominated by start-ups, make it an easy target for Pyongyang’s hackers.
Because of crypto’s inbuilt privacy features and the fact that it can be sent
across borders at the click of a mousepad, it also offers a powerful tool to
circumvent sanctions.

North Korea has conducted roughly 100 ballistic missile tests in the last year,
and it staged its first intercontinental ballistic missile test in five months
on Monday. Between November and August, it also exported more than a million
artillery shells to Russia, according to South Korean intelligence services.

U.S. officials increasingly believe the key to slowing that type of activity
lies at the intersection of hacking and cryptocurrency.

Last year, Pyongyang-linked hackers stole roughly $1.7 billion worth of digital
money, according to estimates from cryptocurrency tracing firm Chainalysis.

And in May, Neuberger estimated that about half of North Korea’s missile program
is funded by cyberattacks and cryptocurrency theft.

North Korean hackers “directly fund” North Korea’s weapons of mass destruction
and ballistic missile programs, said State Department spokesperson Vedant Patel.




Until recently, North Korea’s cyber prowess has garnered relatively little
attention in Washington. Fear of digital strikes spilling over from the
conflicts in Ukraine and Gaza, or during a possible Chinese invasion of Taiwan,
has overshadowed the issue, experts say.

Cybersecurity

How hackers piled onto the Israeli-Hamas conflict

By Antoaneta Roussi and Maggie Miller | October 15, 2023 12:00 PM

“People tend to think, … how could the quote-unquote ‘Hermit Kingdom’ possibly
be a serious player from a cyber perspective?” Adam Meyers, a senior vice
president at cybersecurity firm CrowdStrike, said in an interview. “But the
reality couldn’t be further from the truth.”

Pyongyang’s hackers have repeatedly caught Western companies off-guard with
their technical ingenuity, an ability to blend old-fashioned spy tricks with
cyber operations and sheer brazenness, according to private sector researchers.

And while those who study North Korean cyber operations say their proficiency at
stealing cryptocurrency represents a major challenge to the West today, they
also argue it would be dangerous to pigeonhole Pyongyang as little more than a
money-stealing threat.

By some metrics, North Korea has launched more than a dozen supply-chain attacks
in the last year — a sophisticated tactic in which hackers compromise the
software delivery pipeline to get nearly unfettered access to a wide range of
companies.

The significance of those attacks has been “extremely underplayed in the
public,” said Tom Hegel, a threat researcher at cybersecurity firm SentinelOne,
because they caused little harm outside the direct victims of the attacks —
often individuals or obscure cryptocurrency startups.

But some of the same techniques they’ve honed in targeting those firms could
have been used to cause widespread digital disruption, say cybersecurity
experts.

In April, researchers at cybersecurity firm Mandiant uncovered that North Korean
hackers had pulled off the first publicly known instance of a “double” software
supply-chain hack — jumping from one software maker into a second and from there
to the company’s customers.

Mandiant assessed the hackers were after cryptocurrency. Had they wanted to,
however, the North Koreans could have used tactics like that to inflict “a
massive level of damage,” said SentinelOne’s Hegel.

What North Korea “is able to do on a global scale, no one has replicated,” added
Mick Baccio, global security adviser at security firm Splunk.

Asked about her level of concern that North Korean hackers had grown more
capable and could pivot to destructive activity, Neuberger acknowledged
Pyongyang’s hackers are “capable, creative and aggressive.”

But she said the White House was confident the North Koreans are focused on
stealing money or intellectual property that could be used for the country’s
weapons programs. She also argued that cutting off the profitability of North
Korea’s hacks is one of the best ways to deter them.

“The goal is to aggressively cut the profitability of the regime’s hacking,” she
said.

North Korea’s proficiency in computer warfare has surprised onlookers for almost
a decade now.


MOST READ


 1. ‘YOU NO LONGER REPRESENT US’: NEW JERSEY MUSLIMS MOBILIZE AGAINST LONGTIME
    CONGRESSMAN OVER ISRAEL STANCE


 2. TRUMP VOWS A PEACEFUL TRANSFER OF POWER IF REELECTED


 3. NEWSOM PANS EFFORTS TO BLOCK TRUMP FROM CALIFORNIA BALLOT


 4. WHAT TRUMP HAS TO FEAR FROM THE MICHIGAN TAPE


 5. IN TRUMP’S UNFOLDING LEGAL DRAMA, ‘THE CAMPAIGN WILL BE CONDUCTED IN A
    COURTROOM’



They famously burst onto the public consciousness in 2014, when Pyongyang’s
operatives hacked into Sony Pictures Entertainment and threatened the movie
studio against releasing “The Interview,” a raunchy comedy that portrayed the
assassination of Kim Jong Un. Years later, in 2017, they unleashed a
self-spreading computer virus that is estimated to have caused billions of
dollars in damages in a matter of hours.

But in addition to the growing technical proficiency of North Korean hackers, it
is the volume and variety of their activity that has recently alarmed onlookers.

In the last 18 months, U.S. intelligence agencies have warned that Pyongyang is
targeting think tanks and academics to collect intelligence and staging
ransomware attacks — in which they scramble victims’ data until they pay an
extortion fee — against U.S. healthcare companies.

More recently, the Justice Department, FBI and Treasury Department have also
accused Pyongyang of dispatching thousands of tech workers to Russia and China,
where they secured remote IT jobs with global companies under a false identity,
and then funneled their salaries back to the regime.

In one recent case that received little attention outside the region, North
Korean hackers conspired with insiders at a South Korean data recovery company
to bilk millions from unwitting victims of Pyongyang’s attacks.

Just a fraction of that money appears to have found its way back to Pyongyang,
according to South Korean law enforcement. But the scheme dated back to 2017 and
involved a variant of ransomware that was not previously linked to Pyongyang.

The case speaks to how creative the country has gotten at finding ways to avoid
scrutiny and skirt international sanctions, said Erin Plante, vice president of
investigations at Chainalysis.

“It shows that they’re always thinking outside the box, evolving and keeping up
with the news in the same way we do, which is a little bit scary,” she said.

Michael Barnhart, a North Korea expert at cybersecurity firm Mandiant, said the
scheme was reminiscent of several other operations the country’s hacking forces
have pulled off in recent memory — some of which are not yet public.

The common theme, he argued, was how adept Pyongyang has become at mixing cyber
operations with more traditional spying and money laundering tactics.

“This is a very, very well-organized criminal family,” he said.


 * Filed under:
 * White House,
 * Cyber Security,
 * North Korea,
 * Foreign Affairs,
 * Hacking,
 * Cyberattack


POLITICO
 * 
 * 

 * * Link Copied
 * * 
   * 
   * 


PLAYBOOK

The unofficial guide to official Washington, every morning and weekday
afternoons.


Playbook

The unofficial guide to official Washington, every morning and weekday
afternoons.

By signing up, you acknowledge and agree to our Privacy Policy and Terms of
Service. You may unsubscribe at any time by following the directions at the
bottom of the email or by contacting us here. This site is protected by
reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Loading

You will now start receiving email updates

You are already subscribed

Something went wrong

Email ! Please make sure that the email address you typed in is valid

Employer

Job Title

* All fields must be completed to subscribe. Sign Up

By signing up, you acknowledge and agree to our Privacy Policy and Terms of
Service. You may unsubscribe at any time by following the directions at the
bottom of the email or by contacting us here. This site is protected by
reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Sign Up

Sponsored
Continue watching

How to Increase Sales and Interest by Boosting Your Company's Online Presence
SPONSORED CONTENT

Recommended by

 * About Us
 * Advertising
 * Breaking News Alerts
 * Careers
 * Credit Card Payments
 * Digital Edition
 * FAQ
 * Feedback
 * Headlines
 * Photos
 * POWERJobs
 * Press
 * Print Subscriptions
 * Request A Correction
 * Write For Us
 * RSS
 * Site Map

 * Terms of Service
 * Privacy Policy
 * Do Not Sell or Share My Personal Information and Opt Out of Targeted
   Advertising

© 2023 POLITICO LLC




COOKIE SETTINGS

At this time, only residents from certain U.S. States have the right to opt-out.
To disable cookies, please use your device settings. You can learn more about
our privacy practices by reading our Privacy Policy


COOKIES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

 * STRICTLY NECESSARY COOKIES
   
   Always Active
   
   These cookies are necessary for the website to function and cannot be
   switched off in our systems. They are usually only set in response to actions
   made by you which amount to a request for services, such as setting your
   privacy preferences, logging in or filling in forms. You can set your browser
   to block or alert you about these cookies, but some parts of the site will
   not then work.

ADVERTISING, ANALYTICS, FUNCTIONAL AND PERFORMANCE COOKIES

Advertising, Analytics, Functional and Performance Cookies



Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices