Search
  • Videos
  • Smart Cities
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Smart Cities
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

North Korea's history of bold cyber attacks

1 of 12 NEXT PREV
  • North Korea’s growing criminal cyberthreat

    North Korea’s growing criminal cyberthreat

    North Korean hackers, backed by the state, are believed to be responsible for an array of bold attacks made in the name of money, or the reputation of the Democratic People's Republic of Korea regime. Some of these include, but are not limited to...

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Pixabay/CC0 Creative Commons

    Caption by: Charlie Osborne

  • Nonghyup, 2011

    Nonghyup, 2011

    An attack against South Korean farm co-op Nonghyup paralyzed the bank, leaving customers unable to access funds for over a week.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Jytim/CC 4.0 International license

    Caption by: Charlie Osborne

  • South Korean banks, 2013

    South Korean banks, 2013

    The operations of three major banks and two broadcasters collapsed at the same time as North Korean news agency KNCA relayed a message from North Korean's leadership, pledging to destroy the South's government.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Kwangmo/CC 4.0 International license

    Caption by: Charlie Osborne

  • Sony, 2014

    Sony, 2014

    The FBI blamed North Korea for a brutal cyberattack on Sony which compromised the tech company's networks and led to the leak of terabytes of information online. It is believed the attack was launched in response to Sony's planned release of, The Interview, a film which tells the satirical story of journalists recruited to assassinate Kim Jong Un.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: CNET

    Caption by: Charlie Osborne

  • The Central Bank of Bangladesh, 2016

    The Central Bank of Bangladesh, 2016

    The notorious bank heist that targeted the Central Bank of Bangladesh's Federal Reserve account lead to the theft of $81 million, and was connected to the Sony breach -- and therefore North Korea -- through the malware utilized in the compromise of the SWIFT bank communications system.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: NahidSultan/CC 4.0 International license

    Caption by: Charlie Osborne

  • WannaCry, 2017

    WannaCry, 2017

    The release of NSA tools -- including EternalBlue by the Shadow Brokers hacking group -- ultimately led to the global WannaCry ransomware attack, which debilitated companies worldwide without prejudice. It is believed that North Korea threat actors implemented the exploit in distributing the ransomware.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: ZDNet/CNET

    Caption by: Charlie Osborne

  • US utilities, 2017

    US utilities, 2017

    Cybersecurity firm FireEye believes that the rogue state is behind a number of attacks aimed at US electricity companies.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Benh/CC 4.0 International license

    Caption by: Charlie Osborne

  • Energy services, 2017

    Energy services, 2017

    A group known as Covellite, connected to North Korea, has been linked to attacks against US, European and East Asian organizations involved in consumer energy. However, in recent months, attacks against US targets appear to have been abandoned.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: File Photo

    Caption by: Charlie Osborne

  • Cryptocurrency exchanges, South Korea

    Cryptocurrency exchanges, South Korea

    South Korea is a common target for DPRK hackers, and cryptocurrency exchanges -- containing millions of dollars' worth of virtual assets -- are lucrative. According to South Korean officials, North Korea is responsible for the theft of "billions of won" from exchanges over the past 12 months.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Caption by: Charlie Osborne

  • Cryptojacking, worldwide

    Cryptojacking, worldwide

    Cybersecurity professionals have suggested that the regime's hackers have created cryptojacking malware designed to steal victim CPU power to mine cryptocurrency. Proceeds are allegedly finding their way to North Korea's Kim Il Sung University.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Laremenko, Getty Images/iStockphoto

    Caption by: Charlie Osborne

  • Journalists and defectors, worldwide

    Journalists and defectors, worldwide

    Malware-laden Android apps, aimed at North Korean defectors and journalists covering the regime, keep slipping through the net and appearing on Google Play.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: McAfee

    Caption by: Charlie Osborne

  • Ontario's rail system, 2018

    Ontario's rail system, 2018

    Metrolink, Ontario's transportation agency, claims that North Korea attempted to derail IT systems, without success.

    More security news

    • Vendors are shipping Android devices with diagnostic port exposed
    • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
    • China blamed for data theft from US Navy contractor
    • Password reset flaw at internet giant Frontier allowed account takeovers
    • US government takes on botnets and other automated attacks
    Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

    Photo by: Brian Karczewski/CC 3.0 license

    Caption by: Charlie Osborne

1 of 12 NEXT PREV
  • 0
  • North Korea’s growing criminal cyberthreat
  • Nonghyup, 2011
  • South Korean banks, 2013
  • Sony, 2014
  • The Central Bank of Bangladesh, 2016
  • WannaCry, 2017
  • US utilities, 2017
  • Energy services, 2017
  • Cryptocurrency exchanges, South Korea
  • Cryptojacking, worldwide
  • Journalists and defectors, worldwide
  • Ontario's rail system, 2018

Many of the massive cyberattacks that have spread across the world in recent years were traced back or attributed to North Korea. Here are eleven examples.

Read More Read Less

North Korea’s growing criminal cyberthreat

North Korean hackers, backed by the state, are believed to be responsible for an array of bold attacks made in the name of money, or the reputation of the Democratic People's Republic of Korea regime. Some of these include, but are not limited to...

More security news

  • Vendors are shipping Android devices with diagnostic port exposed
  • Online at World Cup 2018: Traveling to Russia? Here's what you need to know
  • China blamed for data theft from US Navy contractor
  • Password reset flaw at internet giant Frontier allowed account takeovers
  • US government takes on botnets and other automated attacks
Published: June 11, 2018 -- 20:50 GMT (13:50 PDT)

Caption by: Charlie Osborne

1 of 12 NEXT PREV

Related Topics:

Security Government Security TV Data Management CXO Data Centers
  • 0
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • How computers of the future will recognise us

    Security

    How computers of the future will recognise us

  • 24 internet-connected things that really shouldn't be online

    Security

    24 internet-connected things that really shouldn't be online

  • Apricorn Aegis Secure Key 3z (in pictures)

    Storage

    Apricorn Aegis Secure Key 3z (in pictures)

ZDNet
Connect with us

© 2018 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums