WASHINGTON/TORONTO (Reuters) - The U.S. government on Tuesday issued a rare alert squarely blaming the North Korean government for a raft of cyber attacks stretching back to 2009 and warning that more were likely.
The joint warning from the U.S. Department of Homeland Security and the Federal Bureau of Investigation said that “cyber actors of the North Korean government,” referred to in the report as “Hidden Cobra,” had targeted the media, aerospace and financial sectors, as well as critical infrastructure, in the United States and globally.
The new level of detail about the U.S. government’s analysis of suspected North Korean hacking activity coincides with increasing tensions between Washington and Pyongyang because of North Korea’s missile tests. The alert warned that North Korea would continue to rely on cyber operations to advance its military and strategic objectives.
North Korea has routinely denied involvement in cyber attacks against other countries.
The North Korean mission to the United Nations was not immediately available for comment.
Tuesday’s alert said Hidden Cobra has been previously referred to by private sector experts as Lazarus Group and Guardians of the Peace, which have been linked to attacks such as the 2014 intrusion into Sony Corp’s (6758.T) Sony Pictures Entertainment.
Symantec Corp (SYMC.O) and Kaspersky Lab both said last month it was “highly likely” that Lazarus was behind the WannaCry ransomware attack that infected more than 300,000 computers worldwide, disrupting operations at hospitals, banks and schools.
The alert did not identify specific Hidden Cobra victims. It said the group had compromised a range of victims and that some intrusions had resulted in thefts of data while others were disruptive. The group’s capabilities include denial of service attacks, which send reams of junk traffic to a server to knock it offline, keystroke logging, remote access tools and several variants of malware, the alert said.
John Hultquist, a cyber intelligence analyst with FireEye Inc (FEYE.O), said that his firm was concerned about increasingly aggressive cyber attacks from North Korea.
The hacks include cyber espionage at South Korean finance, energy and transportation firms that appears to be reconnaissance ahead of other attacks that would be disruptive or destructive, he said.
“It suggests they are preparing for something fairly significant,” he added.
Hidden Cobra commonly targets systems that run older versions of Microsoft Corp (MSFT.O) operating systems that are no longer patched, the alert said, and also used vulnerabilities in Adobe Systems Inc’s (ADBE.O) Flash software to gain access into targeted computers.
The report urged organizations to upgrade to current versions of Adobe Flash and Microsoft Silverlight or, when possible, uninstall those applications altogether.
Microsoft said it an emailed statement that it had “addressed” the Silverlight issue in a January 2016 software update. Adobe said via email that it patched the vulnerabilities in June 2016.
North Korean hacking activity has grown increasingly hostile in recent years, according to Western officials and cyber security experts.
The alert arrived on the same day that North Korea released an American university student who had been held captive by Pyongyang for 17 months.
Otto Warmbier, 22, was on his way back to the United States on Tuesday but in a coma and in urgent need of medical care, according to Bill Richardson, a veteran former diplomat and politician who has played a role in past negotiations with North Korea.
“The U.S. government seeks to arm network defenders with the tools they need to identify, detect and disrupt North Korean government malicious cyber activity that is targeting our country’s and our allies’ networks,” a DHS official said about the alert. The official was not authorized to speak publicly.
Reporting by Dustin Volz in Washington and Jim Finkle in Toronto; Additional reporting by Michelle Nichols at the United Nations; editing by Jonathan Oatis, Lisa Shumaker, Grant McCool