• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

North Korea Continues to Launch Aggressive Cyberattacks

Despite the fact that they have stepped down regarding nuclear weapons, cyber attacks on Western entities remain a dangerous staple in North Korea’s military strategy.

March 21, 2019 Sam Harton Leave a Comment

Hacking

According to the New York Times, researchers at cybersecurity company McAfee found that attacks in which North Korean hackers have launched on American and European banks, utilities, and oil and gas companies began in 2017 and continued through Trump’s recent meeting with the country’s autocratic leader in Hanoi. While Trump has championed his positive relationship with the dictator and North Korea has entered a period of nuclear disarmament, the country has not let up on cyber attacks against Western entities.

“For 15 months, they haven’t tested weapons because of this negotiation but over those same 15 months they have not stopped their cyber activity,” said Victor Cha, the Korea chairman at the Center for Strategic and International Studies in Washington.

An unnamed foreign law enforcement agency provided the McAfee researchers with access to a primary computer server on which the North Korean hackers stage their attacks. The researchers say they watched live as North Korean hackers infiltrated the computer networks of more than a hundred companies worldwide, including many in the United States.

The Times wrote that no motive is particularly clear, but the attacks with carried out with clear expertise against “engineers and executives who had broad access to their companies’ computer networks and intellectual property.”

This attack launched in 2017 is certainly not North Korea’s first rodeo when it comes to cyber attacks. In 2014, North Korean hackers went after Sony Pictures Entertainment in retaliation to a movie that mocked their leader, destroying Sony’s computer servers, halting the studio’s operations and eventually leaking many executives’ embarrassing emails. This served as a loose blueprint for the Russian hackers involved in tampering with the 2016 US presidential election.

“[North Korea’s] very aggressive cyberactivity will have to be addressed in future discussions,” said Cha, who says that cyber attacks remained are an integral element of North Korea’s general military strategy. “They’re never going to compete with the United States and South Korea soldier to soldier, tank for tank,” he said. “So they have moved to an asymmetric strategy of nuclear weapons, ballistic missiles, and the third leg is cyber.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.