How North Korea Conducts Cyber Operations
How could a nation like North Korea conduct an elaborate hack against Sony over "The Interview"? What about the $100 million dollar bank heist against the Central Bank of Bangladesh? In this video we cover North Korea's cyber operations and overall strategy.
Ever since the 90's, North Korea has viewed cyber warfare and a network military as a power projection tool. For years, they've sent dozens of their soldiers abroad to learn computer science and hacking. Partner countries like China or Russia, have aided them.
Additionally, North Korea organizes political structure to strategically maximize resources geared towards cyber. It's estimated that they currently have about 7,000 soldiers working in their cyber operations.
Many people have the idea that building a cyber operations group is as simple as assembling a few talented penetration testers. The truth is that it takes a lot more than this. Some key positions include:
1. Developer (engineer tool chains)
2. Operator (execute tool chains)
3. Operations System Administrator (maintain systems and networks)
4. Administrative Assistant
5. Senior Analysts (sort and analyze hacked data)
6. Junior Analysts and Translators
7. Analysis System Administrator
8. Support Engineers (write software)
9. Leadership Personnel
Approximate Cost: $2,000,000
While this may seem like a lot of money, it's a drop in the bucket for the GDP of a developed national government.
These hacking groups create shell companies and websites to recon and then attack their objectives. Kim Jung Un and his army of cyber operators, are able to achieve high-reward results with fairly low-sophisticated techniques.
00:00 Intro
00:48 Operation Blockbuster
01:17 Kim Jung Un's Hacker Army
03:57 Funding a Cyber War
05:01 Build Your Hacking Team
08:18 North Korean Spies and Hackers
10:52 Counteroffensive Cybersecurity
Resources
The All Purpose Sword: https://ccdcoe.org/uploads/2019/06/Art_08_The-All-Purpose-Sword.pdf
Ignore the Penetration Testers: https://medium.com/@thegrugq/cyber-ignore-the-penetration-testers-900e76a49500
#Hacking #NorthKorea #Cyberspatial
Видео How North Korea Conducts Cyber Operations канала Cyberspatial
Ever since the 90's, North Korea has viewed cyber warfare and a network military as a power projection tool. For years, they've sent dozens of their soldiers abroad to learn computer science and hacking. Partner countries like China or Russia, have aided them.
Additionally, North Korea organizes political structure to strategically maximize resources geared towards cyber. It's estimated that they currently have about 7,000 soldiers working in their cyber operations.
Many people have the idea that building a cyber operations group is as simple as assembling a few talented penetration testers. The truth is that it takes a lot more than this. Some key positions include:
1. Developer (engineer tool chains)
2. Operator (execute tool chains)
3. Operations System Administrator (maintain systems and networks)
4. Administrative Assistant
5. Senior Analysts (sort and analyze hacked data)
6. Junior Analysts and Translators
7. Analysis System Administrator
8. Support Engineers (write software)
9. Leadership Personnel
Approximate Cost: $2,000,000
While this may seem like a lot of money, it's a drop in the bucket for the GDP of a developed national government.
These hacking groups create shell companies and websites to recon and then attack their objectives. Kim Jung Un and his army of cyber operators, are able to achieve high-reward results with fairly low-sophisticated techniques.
00:00 Intro
00:48 Operation Blockbuster
01:17 Kim Jung Un's Hacker Army
03:57 Funding a Cyber War
05:01 Build Your Hacking Team
08:18 North Korean Spies and Hackers
10:52 Counteroffensive Cybersecurity
Resources
The All Purpose Sword: https://ccdcoe.org/uploads/2019/06/Art_08_The-All-Purpose-Sword.pdf
Ignore the Penetration Testers: https://medium.com/@thegrugq/cyber-ignore-the-penetration-testers-900e76a49500
#Hacking #NorthKorea #Cyberspatial
Видео How North Korea Conducts Cyber Operations канала Cyberspatial
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
What's It Like As A Red Team Operator? (w/ Chris M.)OSINT: Sharpen Your Cyber Skills With Open-source IntelligenceGetting Into Cyber Security: 5 Skills You NEED to Learn in 2020Webinar - The Threat Posed by North Korean Cyber AttackersPassword Manager: How to Get Started in 2020 (Tutorial)CallStranger: Another UPnP Vulnerability (Overview)Cyber Crime and Hunting Cyber CriminalsShopping the Darknet for PANDEMIC Protection GearStrong Password: Everything You Know IS WRONG (Here's Why)Virtualbox Tutorial: How to Build Virtual Machines in 2020Nmap Tutorial to find Network VulnerabilitiesWhy You Need a DIFFERENT EMAIL Address for Every AccountHow to Become a Red Team OperatorRemote Work Secrets for the Coming IT/Cyber Boom (Look Good, Sound Good)learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains)How North Korean Hacking Actually Works | The WannaCry AttackIs Coding Important for Cyber Security?Educational Barriers in Cyber SecurityFind Information from a Phone Number Using OSINT Tools [Tutorial]Why Cyber Security is Hard to Learn (Tips For Success!)