Office 39
Like some of the communist regimes upon which it once depended but which it has long since outlived, North Korea’s hereditary regime has a colorful history of engaging in criminal activity as a means to accumulate foreign currency.
In the 1970s North Korea’s then-ruler Kim Il Sung, the grandfather of present ruler Kim Jong Un, tasked his son and successor Kim Jong Il with establishing a cell within the ruling Workers’ Party of Korea to raise money for the dictatorship’s founding family.
Called Office 39, it was one of several entities created by the regime to bring in billions of dollars a year from schemes ranging from producing and distributing counterfeit cigarettes and US dollar bills to selling illegal drugs, minerals, arms, and even rare animal species.
North Korean officials, diplomats, spies, and assorted operatives were all mobilized in support of this illicit shadow economy, which continues to operate through a complex network of shell companies, financial institutions, foreign brokers, and organized crime groups that facilitate the country’s proliferation and sanctions evasion efforts.
Pyongyang has also spent recent decades building up its formidable cyber capabilities, a project that dates back to the late 1980s and early 1990s when the Kim regime sought to develop what was then a nascent nuclear weapons program.
Regime defectors have described how Kim Jong Il saw the value of networked computers as an efficient means to direct regime officials while remaining in seclusion. He also saw them as a platform to underpin the country’s nuclear and conventional weapons development.
Kim Jong Il is quoted in a book published by the North Korean army as having said that “if the Internet is like a gun, cyberattacks are like atomic bombs.” But it was only under his son Kim Jong Un, who assumed power in 2011, that the country’s cyber capabilities started to garner international attention.
While less than 1 percent of the North Korean population is estimated to have restricted and closely monitored access to the Internet, potential members of the country’s army of approximately 7,000 hackers are identified while still at school. They are then trained and groomed at elite government institutions, with some also receiving training and additional experience in China and other foreign countries.
“They train people who show early indications of being strong in cyber and they send them to other places around the world and embed them into organizations, embed them into the society and culture,” says Erin Plante, vice president of investigations at Chainalysis. “You have these hacking cells based all around the Asia-Pacific region merging in with the rest of the tech community.”
In 2014, North Korean hackers launched an attack on Sony Pictures ahead of its release of The Interview, a Hollywood comedy about a fictional assassination attempt on Kim Jong Un. The hack shut down the production studio’s computer network before threatening executives with the release of sensitive and embarrassing internal documents.
That was followed in 2016 by a raid on Bangladesh’s central bank. Members of the Lazarus Group, the same syndicate that was behind the Axie Infinity hack, broke into the bank’s computer network and lurked inside it for a year before issuing instructions to the Federal Reserve Bank in New York to drain $951 million of Bangladeshi reserves.
The money was transferred to a bank in the Philippines and was only identified because one of the orders happened to contain a word that was also the name of a sanctioned Iranian ship, alerting US authorities. The hackers ended up getting away with less than 10 percent of their haul.
North Korean hackers have also demonstrated their offensive capabilities, causing widespread chaos through ransomware attacks. In 2017, the Lazarus Group unleashed the devastating WannaCry virus, which infected at least 200,000 computers at hospitals, oil companies, banks, and other organizations around the world.
The transactions on the Axie Infinity game were supported by Ronin Network, a so-called “cross-chain bridge” that links different blockchains, that is supposed to have a high level of security. Hackers gained access to five of nine private keys, digital compartments that contain key information allowing hackers to approve withdrawals in their favor.
According to Nils Weisensee, a cyber security expert with Seoul-based information service NK Pro, the Axie Infinity hack demonstrates how North Korean hackers can now “exploit new vulnerabilities in the latest blockchain technologies almost as quickly as they arise.”
“Just a few years ago, North Korean hackers were specializing in distributed denial-of-service attacks, which is a relatively crude method of flooding your victims’ servers with Internet traffic,” says Weisensee. “But if a DDOS attack is the cyber equivalent of beating someone with a baseball bat, then the successful raids on cross-chain bridges like Ronin and Horizon are the equivalent of stealing someone’s wallet through a hole in their pocket they didn’t even know existed.”
Analysts cite the Bangladesh Bank heist as an example of just how much more labor-intensive and time-consuming it is to target traditional financial institutions.
The North Korean hackers who infiltrated the bank’s computer network had lurked in the system for a year before executing the theft. The proceeds were transferred through several banks to casinos in Manila, where operatives then had to spend several painstaking weeks playing baccarat with the stolen money so as to swap it with unsullied cash. The clean cash was then sent to Macau, and most likely onward to North Korea.
Cryptocurrency also opens a fresh opportunity for would-be money launderers. To avoid triggering alerts on crypto exchanges by making large deposits in one go, hackers use a so-called “peel chain”—setting up a long chain of addresses and “peeling off” small amounts of digital currency with each transfer. According to a US Treasury indictment from 2020, two Chinese nationals successfully transferred $67 million in bitcoin on behalf of North Korean hackers using this method, making 146 separate transactions between them.
“Because blockchain technology is a child of the Internet, everything you need to know about its vulnerabilities can also be found on the Internet,” says Weisensee. “All you need is smart people, and the North Koreans have that.”
According to researchers at Harvard University’s Belfer Center for Science and International Affairs, North Korea has also been accumulating digital currencies through running its own crypto-mining operations, powered by abundant coal reserves that Pyongyang is unable to export due to UN sanctions.
The researchers note that the ethereum blockchain’s move to a much less energy-intensive “proof of stake” mechanism, while less damaging for the environment, could give energy-starved North Korea the opportunity to increase the amount of revenue it can afford to generate through crypto mining.
North Korea has also been able to exploit the rise in popularity of non-fungible tokens, or NFTs—either by artificially inflating their value using a technique known as “wash trading,” or by using NFTs to launder stolen funds, or through outright theft using spear-phishing attacks.
According to a US justice department indictment unsealed in 2021, North Korean hackers also carried out an illegal initial coin offering for a fraudulent blockchain that offered investors digital tokens in exchange for ownership of micro stakes in its shipping fleet.
Weisensee says that the dizzying pace of development of blockchain technology affords North Korean hackers constant opportunities to innovate.
“If you look at the vulnerability they exploited in the Swift financial messaging service for the Bangladesh Bank heist, that is something that could be fixed relatively easily—it would be a hard operation to repeat,” he says. “But crypto is evolving so quickly, and the North Koreans are so adept at tracking these developments, that they are regularly one step ahead of those who are trying to stop them.”
Recommended Comments
There are no comments to display.
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.