North Korean hackers are tapping into banks around the globe to make fraudulent money transfers and cause ATMs to spit out cash, the US government warned on Wednesday.
A technical cybersecurity alert jointly written by four different federal agencies, including the Treasury Department and FBI, said there had been a resurgence in financially motivated hacking efforts by the North Korean regime this year after lull inactivity.
“Since February 2020, North Korea has resumed targeting banks in multiple countries to initiate fraudulent international money transfers and ATM cashouts,” the warning reads.
Earth flying through ancient supernovae's dust
US law enforcement titled the hacking campaign “Fast Cash” and blamed North Korea’s Reconnaissance General Bureau, a spy agency, for it. They described the operation as going on since at least 2016 but ramping up in sophistication and volume recently.
Over the last several years, North Korea has been blamed by US authorities and private sector cybersecurity companies for hacking numerous banks in Asia, South America, and Africa.
“North Korean cyber actors have demonstrated an imaginative knack for adjusting their tactics to exploit the financial sector as well as any other sector through illicit cyber operations,” Bryan Ware, a senior cybersecurity official at the US Homeland Security Department, said in a prepared statement.
Fitbit unveils stress-tracking smartwatch with Google deal pending
Cybersecurity experts and foreign policy analysts have said these types of hacking operations are conducted to help fund the North Korean government, which is cash-strapped due to expansive sanctions continuously placed on it by the US and other western countries.
“The continued attacks are proof of the reliance the regime has on these funds, along with being a testament to their technical ability and determination,” said Vikram Thakur, a technical director for US cybersecurity firm Symantec.
COMMENTS
Comments are moderated and generally will be posted if they are on-topic and not abusive.
For more information, please see our Comments FAQ