X
Edition:
United States

  • Business
    • Business Home
    • Legal
    • Deals
    • Aerospace & Defense
    • Finance
    • Autos
    • Reuters Summits
    • ADventures
    • Data Dive
  • Markets
    • Markets Home
    • U.S. Markets
    • European Markets
    • Asian Markets
    • Global Market Data
    • Stocks
    • Bonds
    • Currencies
    • Commodities
    • Futures
    • Funds
    • Earnings
    • Dividends
  • World
    • World Home
    • U.S.
    • Special Reports
    • Reuters Investigates
    • Euro Zone
    • Middle East
    • China
    • Japan
    • Mexico
    • Brazil
    • Africa
    • Russia
    • India
  • Politics
    • Politics Home
    • Polling Explorer
    • Live: U.S. Politics
    • Supreme Court
  • Tech
    • Technology Home
    • Science
    • Top 100 Global Innovators
    • Media
    • Environment
    • Innovation
  • Commentary
    • Commentary Home
    • Podcasts
  • Breakingviews
    • Breakingviews Home
    • Breakingviews Video
  • Money
    • Money Home
    • Retirement
    • Lipper Awards
    • Analyst Research
    • Stock Screener
    • Fund Screener
  • Life
    • Health
    • Sports
    • Arts
    • Entertainment
    • Oddly Enough
  • Pictures
    • Pictures Home
    • The Wider Image
    • Photographers
    • Focus 360
  • Video
Exclusive: North Korea's Unit 180, the cyber warfare cell that worries the...
  • Africa
    América Latina
  • عربي
    Argentina
  • Brasil
    Canada
  • 中国
    Deutschland
  • España
    France
  • India
    Italia
  • 日本
    México
  • РОССИЯ
    United Kingdom
  • United States
Cyber Risk | Mon May 22, 2017 | 11:34am EDT

Exclusive: North Korea's Unit 180, the cyber warfare cell that worries the West

left
right
FILE PHOTO: Military trucks carry soldiers through central Pyongyang before sunset April 15, 2017. REUTERS/Damir Sagolj/File Photo
1/2
left
right
FILE PHOTO: Military trucks carry soldiers through central Pyongyang, North Korea April 13, 2017. REUTERS/Damir Sagolj/File Photo
2/2
By Ju-min Park and James Pearson | SEOUL

SEOUL North Korea's main spy agency has a special cell called Unit 180 that is likely to have launched some of its most daring and successful cyber attacks, according to defectors, officials and internet security experts.

North Korea has been blamed in recent years for a series of online attacks, mostly on financial networks, in the United States, South Korea and over a dozen other countries.

Cyber security researchers have also said they have found technical evidence that could link North Korea with the global WannaCry "ransomware" cyber attack that infected more than 300,000 computers in 150 countries this month. Pyongyang has called the allegation "ridiculous".

The crux of the allegations against North Korea is its connection to a hacking group called Lazarus that is linked to last year's $81 million cyber heist at the Bangladesh central bank and the 2014 attack on Sony's Hollywood studio. The U.S. government has blamed North Korea for the Sony hack and some U.S. officials have said prosecutors are building a case against Pyongyang in the Bangladesh Bank theft.

No conclusive proof has been provided and no criminal charges have yet been filed. North Korea has also denied being behind the Sony and banking attacks.

North Korea is one of the most closed countries in the world and any details of its clandestine operations are difficult to obtain. But experts who study the reclusive country and defectors who have ended up in South Korea or the West have provided some clues.

Kim Heung-kwang, a former computer science professor in North Korea who defected to the South in 2004 and still has sources inside North Korea, said Pyongyang's cyber attacks aimed at raising cash are likely organized by Unit 180, a part of the Reconnaissance General Bureau (RGB), its main overseas intelligence agency.

"Unit 180 is engaged in hacking financial institutions (by) breaching and withdrawing money out of bank accounts," Kim told Reuters. He has previously said that some of his former students have joined North Korea's Strategic Cyber Command, its cyber-army.

"The hackers go overseas to find somewhere with better internet services than North Korea so as not to leave a trace," Kim added. He said it was likely they went under the cover of being employees of trading firms, overseas branches of North Korean companies, or joint ventures in China or Southeast Asia.

James Lewis, a North Korea expert at the Washington-based Center for Strategic and International Studies, said Pyongyang first used hacking as a tool for espionage and then political harassment against South Korean and U.S. targets.

"They changed after Sony by using hacking to support criminal activities to generate hard currency for the regime," he said.

"So far, it's worked as well or better as drugs, counterfeiting, smuggling – all their usual tricks," Lewis said.

COST-EFFECTIVE, DENIABLE

The U.S. Department of Defense said in a report submitted to Congress last year that North Korea likely "views cyber as a cost-effective, asymmetric, deniable tool that it can employ with little risk from reprisal attacks, in part because its networks are largely separated from the Internet".

"It is likely to use Internet infrastructure from third-party nations," the report said.

South Korean officials say they have considerable evidence of North Korea's cyber warfare operations.

"North Korea is carrying out cyber attacks through third countries to cover up the origin of the attacks and using their information and communication technology infrastructure," Ahn Chong-ghee, South Korea's vice foreign minister, told Reuters in written comments.

Besides the Bangladesh Bank heist, he said Pyongyang was also suspected in attacks on banks in the Philippines, Vietnam and Poland.

In June last year, police said the North hacked into more than 140,000 computers at 160 South Korean companies and government agencies, planting malicious code as part of a long-term plan to lay the groundwork for a massive cyber attack on its rival.  

North Korea was also suspected of staging cyber attacks against the South Korean nuclear reactor operator in 2014, although it denied any involvement.

That attack was conducted from a base in China, according to Simon Choi, a senior security researcher at Seoul-based anti-virus company Hauri Inc.

"They operate there so that regardless of what kind of project they do, they have Chinese IP addresses," said Choi, who has conducted extensive research into North Korea's hacking capabilities.

MALAYSIA LINK

Malaysia has also been a base for North Korean cyber operations, according to Yoo Dong-ryul, a former South Korean police researcher who studied North Korean espionage techniques for 25 years.

"They work in trading or IT programming companies on the surface," Yoo told Reuters. "Some of them run websites and sell game and gambling programs".

Two IT firms in Malaysia have links to North Korea's RGB spy agency, according to a Reuters investigation this year, although there was no suggestion either of them was involved in hacking.

Michael Madden, a U.S.-based expert on the North Korean leadership, said Unit 180 was one of many elite cyber warfare groups in the North Korean intelligence community.

"The personnel are recruited from senior middle schools and receive advanced training at some elite training institutions," Madden told Reuters.

"They have a certain amount of autonomy in their missions and tasking as well," he said, adding that they could be operating from hotels in China or Eastern Europe.

In the United States, officials said there was no conclusive evidence that North Korea was behind the WannaCry ransomware, but that was no reason to be complacent.

"Whether or not they are directly involved with ransomware doesn't change the fact that they are a real cyber threat," said a senior administration official, who spoke on condition of anonymity.

Dmitri Alperovitch, co-founder of prominent U.S. security firm CrowdStrike Inc, added: "Their capabilities have improved steadily over time, and we consider them to be a threat actor that is capable of inflicting significant damage on U.S. private or government networks."

(To view a graphic on 'Don't click: The ransomware WannaCry worm' click here)

(Additional reporting by David Brunnstrom in Washington, Joseph Menn in San Francisco,; Rozanna Latiff and Tom Allard in Kuala Lumpur; Editing by Raju Gopalakrishnan)

Our Standards: The Thomson Reuters Trust Principles

Next In Cyber Risk

New Ecuador president says Assange a 'hacker,' but can stay at embassy

QUITO Ecuador's new leftist president Lenin Moreno said on Monday Julian Assange is a "hacker," making his strongest comments to date against the WikiLeaks founder while still stressing he could stay on in the country's London embassy.

British Airways vows 'never again' after costly IT collapse

LONDON British Airways (BA) said it would take steps to ensure there was no repeat of a computer system failure that stranded 75,000 passengers over a holiday weekend and turned into a public relations disaster.

British Airways resumes flights from London after IT outage but many passengers still wait

LONDON British Airways resumed some flights from Britain's two biggest airports on Sunday after a global computer system failure created chaos, but hundreds of passengers were still waiting for hours at London Heathrow.

MORE FROM REUTERS

Sponsored Content

From Around the WebPromoted by Revcontent

Trending Stories

    Pictures

    Photos of the day

    Sponsored Topics

    X
    Follow Reuters:
    • Follow Us On Twitter
    • Follow Us On Facebook
    • Follow Us On RSS
    • Follow Us On Instagram
    • Follow Us On YouTube
    • Follow Us On LinkedIn
    Subscribe: Feeds | Newsletters | Podcasts | Apps
    Reuters News Agency | Brand Attribution Guidelines | Careers

    Reuters is the news and media division of Thomson Reuters. Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Learn more about Thomson Reuters products:

    Eikon
    Information, analytics and exclusive news on financial markets - delivered in an intuitive desktop and mobile interface
    Elektron
    Everything you need to empower your workflow and enhance your enterprise data management
    World-Check
    Screen for heightened risk individual and entities globally to help uncover hidden risks in business relationships and human networks
    Westlaw
    Build the strongest argument relying on authoritative content, attorney-editor expertise, and industry defining technology
    ONESOURCE
    The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs
    CHECKPOINT
    The industry leader for online information for tax, accounting and finance professionals

    All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.

    • Site Feedback
    • Corrections
    • Advertising Guidelines
    • Cookies
    • Terms of Use
    • Privacy Policy