News of the test-launch comes amid stepped up efforts by North Korea to gain classified information regarding the joint military exercises. North Korean hackers tried to infiltrate security-related computers to obtain information on joint US-South Korean military drills but apparently obtained no classified information, police in South Korea said on Sunday.
Malicious emails were sent to employees at a company involved in the joint military drills by suspected North Korean hackers from April of last year, the Gyeonggi Nambu Provincial Police said in a statement. The hackers in January were able to seize one of the employee’s accounts and install a code, but there are no indications they obtained sensitive material.
The attempts to pilfer military data were unsuccessful, but some personal computers were affected, according to the statement. South Korean police concluded the case was linked to North Korea’s hacking group known as Kimsuky, which has used similar methods before.
The Kimsuky group focuses its intelligence collection activities on foreign policy and national security issues related to the Korean peninsula, according to the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency.
The 11-day joint Ulchi Freedom Shield exercises are designed to prepare responses to various threats, using computer-simulation exercises, drills in the field and civilian-defence practice. South Korean police and US authorities have been investigating a string of emails originating from someone falsely claiming to represent the US military that were sent to South Korean employees at the US Armed Forces in South Korea in July ahead of the joint military drills, the statement from police said.
North Korea for decades has denounced joint drills as a preparation for invasion and Kim’s regime in recent years has stepped up its provocations to coincide with the exercises. His army of hackers has for years conducted cybercrimes and phishing campaigns to help procure funding for its weapons programmes, hunting for information that could be of use to Pyongyang.
The drills come days after the leaders of the US, South Korea and Japan held a landmark summit at the Camp David presidential retreat in rural Maryland where they agreed on new steps to defend against the North’s nuclear and missiles threats. These include the sharing of real-time information of missile launches and bulking up joint military exercises among the three.
South Korea’s spy agency told lawmakers last week that Pyongyang appeared to be readying to test an intercontinental ballistic missile and smaller ones designed to deliver nuclear weapons.
Pyongyang had already fired 24 ballistic missiles so far this year, which included four ICBMs that could hit the US mainland. Kim’s regime launched more than 70 ballistic missiles last year, a record for the state.
Its hacker army has taken in about US$200 million in cryptocurrency theft so far this year, accounting for over one-fifth of all the crypto heists in 2023, according to a report last week from the blockchain intelligence firm TRM Labs.
Both the US and South Korea have accused Kim’s regime of deploying hackers to various corners of the world to fund its weapons programmes.
They say these in-demand workers can make as much as US$300,000 a year abroad – often remotely through freelance platforms with falsified or stolen identification – and can assist in enabling cyberattacks and cryptocurrency thefts that helped North Korea earn an estimated US$1.7 billion in 2022.