• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Government Cyber Security » DHS Offers $5M Reward for North Korean Hackers

DHS Offers $5M Reward for North Korean Hackers

2020-04-16 by Max

North Korean Hackers

Homeland Security Details North Korean Hackers aka HIDDEN COBRA Cyber Threats and Hacking Activities – Offers Reward

The US Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) issued alert AA20-106A to offering guidance as well as a $5 million USD reward for information on North Korean hackers. The alert is a joint bulletin from the U.S. Departments of State, the US Treasury, Homeland Security, and the Federal Bureau of Investigation (FBI)

The four federal agencies issued a comprehensive list of past and current North Korean cybercrimes and hacking activities. North Korea has repeatedly targeted government and military IT networks belonging to the United States as well as other nations. They also attack private organizations including financial institutions and critical infrastructure sectors to steal money, conduct corporate espionage, and carry out disruptive cyberattacks. US and United Nations (UN) economic sanctions cause North Korea to steal money through cyberwarfare to fund their operations.

State sponsored hackers from the Democratic People’s Republic of Korea (DPRK), commonly referred to as North Korea, are an Advanced Persistent Threat (APT) group the U.S. government refers to as HIDDEN COBRA. North Korean hackers carry out cybercrimes to collect money to generate revenue for North Korean operations and programs. HIDDEN COBRA deploys hackers, cryptologists, and software developers who use phishing emails and malware to conduct cyber espionage, steal money from financial institutions and cryptocurrency exchanges, and conduct politically motivated operations.

Department of State Rewards for Justice

The Department of the Treasury’s Office of Foreign Assets Control (OFAC) can sanction on any person or institution that has undermining cyber security by working with North Korea, HIDDEN CORBA, or the Workers’ Party of Korea. OFAC can also impose sanctions on anyone who has operated in the IT industry in North Korea, engaged in malicious cyber activities. Of course, because of US and UN sanctions no one can import from or export to any goods, services, or technology to North Korea.

DHS HIDDEN COBRA FastCASH
Image Credit: DHS CISA Fast CASH

Anyone can anonymously report information about North Korean hackers or the people who work with them including their activities and whereabouts. Rewards of up to $5 Million USD are available for information on past or current activity. To report HIDDEN COBRA threats, visit the Department of State’s Rewards for Justice program website at www.rewardsforjustice.net

Cyber Attacks Attributed to North Korea’s HIDDEN COBRA

Australia, Canada, New Zealand, the United States, and Britain blamed HIDDEN COBRA for the 2017 WannaCry 2.0 ransomware attack on Windows computers. Denmark and Japan also issued “supporting statements.” WannaCry ransomware locked up hundreds of thousands of computers around the world. The cyberattack exploited a known vulnerability in Microsoft Windows computers. The entire British healthcare system was crippled by WannaCry. Months beforehand, Microsoft had already issued a security update but any machine that was left unpatched could be compromised.

North Korean hackers, referred to as HIDDEN COBRA, primarily targets financial sector organizations to steal money through theft, money laundering, extortion, and crypto jacking. The US federal government has publicly attributed the following cyber incidents to DPRK state-sponsored hackers, HIDDEN COBRA, and co-conspirators.

  • Sony Pictures Data Breach – A retaliatory cyberattack for Sony’s film “The Interview.” Hackers stole confidential data, threatened Sony employees, and damaged computers.
  • Bangladesh Bank Heist – Hackers used spear phishing emails to compromise the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network and stole $1 billion from financial institutions globally and $81 million from Bangladesh Bank
  • WannaCry 2.0 ransomware
  • FASTCash Campaign – HIDDEN COBRA used malware to steal tens of millions of dollars from ATMs in Asia and Africa. In 2017, HIDDEN COBRA hackers withdrew cash from ATMs in over 30 countries simultaneously. They did it again in 2018, this time withdrawing cash from ATMs in 23 countries
  • Digital Currency Exchange Hack – HIDDEN COBRA hacked into a digital currency exchange and stole about $250 million worth of digital currency. Two Chinese nationals and co-conspirators were indicted for money laundering

The United States also seeks to enhance the capacity of foreign governments and the private sector to understand, identify, defend against, investigate, prosecute, and respond to DPRK cyber threats and participate in international efforts to help ensure the stability of cyberspace.

Filed Under: Government Cyber Security Tagged With: HIDDEN COBRA, North Korea

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version