March 25, 2022

How to follow North Korean hackers

While the open and public nature of blockchain technology allows for more visibility into online transactions compared to traditional financial institutions, like banks, cryptocurrency exchanges often lack rigorous know-your-customer (KYC) and anti-money laundering protocols that are crucial in curbing cyber-enabled financial crime. North Korean hackers are a prime example of how bad actors can exploit these vulnerabilities to finance illicit activity, such as nuclear weapons development.

As outlined in a new report released by the Center for a New American Security (CNAS), Pyongyang continues to enjoy high overall success in infiltrating cryptocurrency exchanges in order to steal, launder, and liquidate funds for its nuclear weapons programs. The report also provides a snapshot of key policy oversights within the regulatory environment in the crypto space of central stakeholders and countries, such as China, the US, and South Korea, as well as a prospective look into the future of North Korea-led crypto hacks. How can the US strengthen its cyber resilience against these efforts?

The rate by which cryptocurrency and blockchain technology evolves continues to far outpace the rate by which national governments and international institutions are able to regulate and understand it. This is a major vulnerability that North Korean hackers continue to exploit.

The main impetus for this report was linked to common misconceptions surrounding the cyber threat emanating from Pyongyang. North Korea’s lack of access to modern computer hardware within its borders is not related to its ability to successfully execute cyberattacks, intrusions, and other unwanted cyber activity, because these often rely on software, not hardware — a tool that North Korean hackers have become very skilled at developing, trading, and using. While Beijing and Moscow captivate the attention of most democratic governments concerned about pending cyber intrusions, Pyongyang continues to defy miscalculated expectations by successfully employing myriad sophisticated cyberattacks that target new and developing financial technology. As such, North Korea will likely continue to adapt its cybercrime tactics targeting cryptocurrency to circumvent obstacles presented by economic sanctions on more traditional forms of financial activity and commerce.

Read the full article from Inkstick.

  • Commentary
    • The Atlantic
    • February 24, 2025
    How America Wasted Its Most Powerful Economic Weapon

    As Donald Trump embarks on his much-anticipated peace negotiations, they will provide important leverage—Putin will be desperate to recover them, while Ukrainian President Vol...

    By Edward Fishman

  • Podcast
    • February 19, 2025
    Edward Fishman on the Age of Economic Warfare

    In the latest episode of the Sanctions Space Podcast, Justine is joined by Edward Fishman, author of Chokepoints: American Power in the Age of Economic Warfare and an adjunct ...

    By Edward Fishman

  • Podcast
    • February 19, 2025
    What Have U.S. Sanctions on Russia Achieved Since the War in Ukraine Began?

    Three years after Russia's full-scale invasion of Ukraine began, what have U.S. sanctions achieved? NPR talks to Edward Fishman, author of "Chokepoints: American Power in the ...

    By Edward Fishman

  • Video
    • February 17, 2025
    Ziemba: Sanctions Enforcement on Russia To Ease Up

    Rachel Ziemba, an Adjunct Senior Fellow at the Center for a New American Security (CNAS), speaks with Bloomberg TV’s Joumanna Bercetche on the Horizons Middle East and Africa ...

    By Rachel Ziemba

View All Reports View All Articles & Multimedia