U.S. imposes sanctions on North Korean hacking groups blamed for global attacks
The U.S. Treasury in September 2019 announced sanctions on three North Korean hacking groups it said were involved in the WannaCry ransomware attacks and hacking of international banks and customer accounts.
It named the groups as Lazarus Group, Bluenoroff and Andariel and said they were controlled by the RGB, North Korea’s primary intelligence bureau, which is already subject to U.S. and United Nations sanctions.
The action blocks any U.S.-related assets of the groups and prohibits dealings with them. The Treasury statement said any foreign financial institution that knowingly facilitated significant transactions or services for them could also be subject to sanctions.
“Treasury is taking action against North Korean hacking groups that have been perpetrating cyber attacks to support illicit weapon and missile programs,” said Sigal Mandelker, Treasury undersecretary for terrorism and financial intelligence.
“We will continue to enforce existing U.S. and U.N. sanctions against North Korea and work with the international community to improve cyber security of financial networks.”
The United States has been attempting to restart talks with North Korea aimed at pressing the country to give up its nuclear weapons. The talks have been stalled over North Korean demands for concessions, including sanctions relief.
Earlier in September, North Korea denied United Nations allegations it had obtained U.S. $2 billion through cyber attacks on banks and cryptocurrency exchanges and accused the United States of spreading rumors.
The Treasury statement said Lazarus Group was involved in the WannaCry ransomware attack that the United States, Australia, Canada, New Zealand and the United Kingdom publicly attributed to North Korea in December 2017.
It said WannaCry affected at least 150 countries and shut down about 300,000 computers, including many in Britain’s National Health Service (NHS). The NHS attack led to the cancellation of more than 19,000 appointments and ultimately cost the service over U.S. $112 million, the biggest known ransomware attack in history.
The Treasury said Lazarus Group was also directly responsible for 2014 cyber attacks on Sony Pictures Entertainment.
The statement cited industry and press reporting as saying that by 2018, Bluenoroff had attempted to steal over U.S. $1.1 billion from financial institutions and successfully carried out operations against banks in Bangladesh, Chile, India, Mexico, Pakistan, Philippines, South Korea, Taiwan, Turkey, and Vietnam.
It said Bluenoroff worked with the Lazarus Group to steal approximately U.S. $80 million from the Central Bank of Bangladesh’s New York Federal Reserve account.
Andariel, meanwhile, was observed by cyber security firms attempting to steal bank card information by hacking into ATMs to withdraw cash or steal customer information to later sell on the black market, the statement said.
Andariel was also responsible for developing and creating unique malware to hack into online poker and gambling sites and, according to industry and press reporting, targeted the South Korean military to gather intelligence, it said.