Feeds

NORKS hacker corps reaches 5,900 sworn cyber soldiers - report

Hermit Kingdom doubles infosec headcount for strikes on Seoul strikes from China

Choosing a cloud hosting partner with confidence

North Korea has doubled the number of government hackers it employed over the last two years according to military sources from the South.

The allegations claim 5900 "elite" personnel were employed in Pyongyang's hacking unit, up from 3000 in 2012.

The hackers had their crosshairs firmly fixed on Seoul but operate from bureaux in China, the source told the Yonhap News Agency.

"The communist country operates a hacking unit under its General Bureau of Reconnaissance, which is home to some 1200 professional hackers," the source told the agency.

The hackers developed and foisted malware against South Korean banks, media websites and government and defence agencies during the employment surge and were fended off by a 900 strong South Korean security blue team.

South Korea in 2013 planned to train 5000 security bods to combat attacks from the North but it was unclear if these personnel have yet been trained.

Pyongyang denied launching attacks and accused Seoul of fueling diplomatic tensions.

The source said the North had more "elite" hackers than the United States with 900, and Japan housing 90.

Pyongyang trained 100 hackers a year through Mirim and Moranbong universities, said to be run by the Government's Operations Department that spearheaded cyber war efforts.

Hackers were divided up into 600 strong brigades taught by Russian professors from the Frunze Military Academy, North Korean defector Jang Se-yul told the popular Seoul Chosun newspaper in 2011.

Intriguingly the same source said in prior years a lack of local facilities meant hackers had to be taught in "faraway locations" including Canada and Australia.

In 2013, North Korea was blamed for distributed denial of service attacks against government agencies including the Presidential Blue House and media companies. It followed much larger attacks in March that year infecting banks, insurance firms and broadcasters with malware that permanently crashed computers. ®

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.