Preps and Solutions
(Sponsored Ads)
Silver
Strategic Relocation
Recently Posted Articles and Videos
Ready Nutrition - Homesteading and Preparedness
Ready Gardens - A Ready Nutrition Company
The Daily Sheeple
The Prepper Website
SGT Report
SGT Report
top Prepper Web Sites
Featured Destinations
The Liberty Mill
Web Destinations

Clarocet for Kids
Silver

North Korean Cyber Threat: ‘The Difference Between Theft And Destruction Is Often A Few Key Strokes’

Mac Slavo
November 1st, 2017
SHTFplan.com
Comments (25)
Read by 2,211 people

northkoreacyberattack

Global banks are preparing to defend themselves against a potential North Korea hacking attack. Cybersecurity experts worry that North Korea will continue to embolden themselves as the threat of United State military action over the nuclear program looms.

The threat to banking institutions is very real. North Korean hackers have stolen hundreds of millions of dollars from banks during the past three years. A 2016 heist at Bangladesh Bank yielded $81 million, according to Dmitri Alperovitch, chief technology officer at cybersecurity firm CrowdStrike. “We know they attacked South Korean banks,” said security teams in the United States. They added that fears have grown that banks in the United States will be targeted next.

The North Korean government has repeatedly denied accusations of hacking by security researchers and several governments that it has carried out cyber attacks.  But Alperovitch told the Reuters Cyber Security Summit on Tuesday that banks were concerned Pyongyang’s hackers may become more destructive by using the same type of “wiper” viruses they deployed across South Korea and at Sony Corp’s Hollywood studio.

North Korean hackers could use what they have learned through previous cyber heists about financial networks gathered to disrupt banking operations, according to Alperovitch. He also said his firm has conducted “war game” exercises for several banks fearing a North Korean attack.

“The difference between theft and destruction is often a few keystrokes,” Alperovitch said.

John Carlin, a former U.S. assistant attorney general, told the Reuters summit that other firms, among them defense contractors, retailers, and social media companies, were also concerned. “They are thinking ‘Are we going to see an escalation in attacks from North Korea?’” said Carlin, chair of Morrison & Foerster international law firm’s global risk and crisis management team.

Some others say that it is highly unlikely North Korea will use cyber tactics to attack the US because the rogue regime fears retaliation. Jim Lewis, a cyber expert with Washington’s Center for Strategic and International Studies, is one of those persons. He said it is unlikely that North Korea would launch destructive attacks on American banks because of concerns about the reaction from the US.

The concerns appear valid when considering North Korea is defying the sanctions placed on them demanding they abandon their quest to obtain nuclear weapons.

Click here to subscribe: Join over one million monthly readers and receive breaking news, strategies, ideas and commentary.
Gas Masks, Filters, Body Suits, Anti Radiation Pills
Please Spread The Word And Share This Post

Author: Mac Slavo
Views: Read by 2,211 people
Date: November 1st, 2017
Website: www.SHTFplan.com

Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats.

25 Comments...

Vote: Click here to vote for SHTF Plan as a Top Prepper Web Site
  1. Stuart says:

    This squint running DOS on his 1985 vintage Compaq couldn’t hack his own Root directory.
    North Korean propaganda is for internal consumption. Trump should ignore the fat little bastard. If he won’t allow that, kill him quietly and move on.

    • Archivist says:

      The monitor might be a Compaq, but the computer itself could be anything. Besides, Compaq wasn’t discontinued until 2013. Also, you can’t tell what operating system he’s using by looking at the screen. Anyway, you can write code on any old computer. You might need a new one to test it, but they might have a whole room full of people writing code on old computers.

      The photo doesn’t tell you much.

      Except that the guy is a dork for wearing his hat while inside working on a computer. I don’t think he’s a real programmer, just a model for the photo.

      • Genius says:

        Speaking of theft, Durango Kid are you still thinking the Bundy’s are stealing? Read my replies on the Bundy thread you ignorant liar. You must live somewhere east because if you are west you KNOW what a piece of shit the BLM is. 20 years of non payment? Are you that stupid? You know NOTHING about it I know people in the family. Maybe you should be in jail for conspiracy to overthrow the constitution! 5-600 square miles ha ha ha, you ARE an idiot! Get your FACTS straight or stfu!

        • Genius says:

          Nothin to say huh?

          • Genius says:

            Remember Lavoy Finnicum. He was a great writer and has a very good book called “only by blood and suffering”. A very good and modern novel and the proceeds go to his family. These were the true american’s not the socialist commies that statists like DK represent.

              • Genius says:

                On Tuesday, January 26, 2016, author LaVoy Finicum was killed by federal and/or state “authorities” after a three week occupation of the Malheur Wildlife Reserve in Burn, OR. Details of the shooting are in dispute and full details have not been released by the FBI or state officials. Eye-witnesses insist that LaVoy was murdered. His family is devastated at the loss of their beloved father, grandfather and husband. As publisher, we here at Legends Library have decided to donate 100% of the proceeds from the sale of LaVoy’s book to the support of his wife and family. Story overview, tells of one family’s struggle to come together and survive in the midst of national crisis. A stirring, fast-paced novel about what matters most in the face of devastating end-times chaos. Filled with gripping action and relatable characters, readers are drawn into the heart-rending dilemmas each member of the Bonham family faces. You may even find yourself stopping to ask, “What would I have done in that situation?” LaVoy Finicum is a real life Northern Arizona Rancher who loves nothing more in life than God, freedom, and family

                • Genius says:

                  A great x-mas gift I personally recommend this book. I bought multiple copies and gave them away. This man was a real hero and helping his family is a blessing too. You will love this book!

    • Plan twice, prep once says:

      Stuart,
      Were you aware the most all ATM machines still run Windows XP?

      Much of the power grid runs 386-SX computers.

      North Korean hacking efforts are assisted by the Chinese who can have NK do illegal things for them that China doesn’t want their fingerprints on.

      • Genius says:

        Who cares? I get a paper check and CASH it! I am not a card tard. I don’t care if it is a little less convinient, I have ALL my cash now! Fook you douches that hold up the line because your 3.75 purchase wont go through. Bitttchhes!

      • buttcrackofdoom says:

        just finished watching ” frontline, putin’s revenge(part 2)”. a very worthwhile show on pbs. it documents putin’s revenge on killary, and U.S. you can skip the first hour, if you want to, it’s mostly only history on putin, and why he dislikes U.S. so much. part 2 is riveting, in MY opinion…i will go see if i can find the link. there’s a little something for either side in there…pay attention to WHO is saying WHAT.

          • Plan twice, prep once says:

            The link is for part one, I skimmed through it at high speed. It linked to part two. Part two was a propaganda piece about how the Russians hacked the election, used that data to change the election, and Russian RT News was a front for leaks. In a year of federal investigations, the story that FrontLine proposes is without evidence.

            I don’t doubt the Russians did hack the DNC computer system, under Obama it was supercharged with US intelligence data provided by the deep state to win for Obama, making it a huge honeypot. Obama in his last term abandon the DNC and left them broke, leaderless, and in shambles, including the DNC IT department. Of course Russians hacked it, it was a trove of information on every voter in the US with massive amounts of personal information that includes employment, personal, financial info, it names associations and even contains personality profiles including how you feel about political issues. From it democrats can determine who you might vote for, as well as if they might flip your vote by contacting you.

            Did the Russians give emails to Wikileaks? Wiki still says they came from another source! FrontLine of course holds fast to the “Russians did it” propaganda line. At this point I believe WikiLeaks.

            • buttcrackofdoom says:

              it puts a lot of pieces/faces together to get a better idea of what happened….like i said, there’s something in there for both sides….and not a damn BIT of evidence of “collusion” with trump/putin….he just is stickin’ the stick in and stirrin’ up sh*t, to disrupt U.S.

        • Like you said, pay attention to WHO is saying WHAT. I believe we are being played on a much deeper level. When I say we, I mean everyone under the tip of the pyramid. Different arms of the same beast.

  2. Anonymous says:

    Always foreign actors, huh? Think Vault 7. False flags will predominate in the future.
    Anyone that took an oath should remember, “all enemies, foreign AND domestic.”
    Lot’s of warmongers on this side of the pond as well. Can’t trust them gubmint alphabet organizations. Tainted. Just like the information they put out.

  3. Brian says:

    The more we tighten the screws on North Korea, the more they have to turn to their remaining means to get foreign currenciy. Cut off their money from selling their countrymen into slave labor and watch the fun. Take a look at the soldier in the picture. Normally they don’t allow tourists to photograph their soldiers. In the last Korean war, they brainwashed US soldiers. This time they might cannibalize them!

  4. Traitor Hator says:

    An ANTIFA cyber bank attack on the 4th? No working EBT or credit cards , would cause what they want? Ungovernable desperate people? I try to track where people without preps would go and what route they would take from one supermarket to the next. Eventually ending up at Walmart . With neither the strength or supplies to do anything but wait there in the hopes of another food shipment?

  5. Genius says:

    How hard can it be to take out “Fat Ho”? We have the tech but won’t use it because the PTB need drama and theatre. They are keeping the real tech to take US out. I need a nap, ZZZZZZZZZZZZZZZZ.

  6. Illini Warrior says:

    a massive cyber attack on every segment of the US infrastructure and shutting down communications will be a VERY SURE part of a foreign country’s planned strategy – combining that with actual physical sabotage of facilities and key points across the country …

    if you start to see the internet dominoes going down – get your head down …….

  7. bobane says:

    An eye opener article about who Kim Jung un really is and what is his real mission working for NWO.
    All may not be true but it’s an eye opener nevertheless.

    http://new.euro-med.dk/20170813-kim-jong-un-a-swiss-indoctrinated-mason-in-the-grip-of-the-london-city-banker-north-korea-another-illuminati-stooge-play.php

  8. Anonymous says:

    Some so-called breaking news about a treasure trove of info released from documents found in the bin Laden raid. Apparently, Al-Qaida and Iran were working together against
    US interests in Saudi Arabia, blah blah blah. First of all, let’s question the timing of this
    release of info at a time when the US and Israel are trying to start some shit with Iran.
    You see, the CIA has had this “information” for years and just now are they putting this
    smoking gun (RIGHT!) out there for public consumption. It’s obvious they release things to
    the corporate media at the time and place of their choosing when they want to ratchet up
    the war drums and rhetoric. Sunnis and Shias can’t stand each other, so automatically this
    BS should be suspect. They want to tie any kind of connection that will help them to build
    public opinion against Iran. The corporate media outlets treat anything from the CIA or FBI
    like it is gospel. Never mind it might be total bullshit, the media outlets will eat that shit up.
    Hate to say it, but most of the headlines you see on Drudge are TOTAL BULLSHIT. People,
    take your filters off and really think. FOX gets a lot of its info from the same sources as CNN. We may well be on the brink of a world war. Lets think. First they were trying to start another war in Libya. Then Syria. Now, North Korea OR Iran if they can start one there. The
    truth bombs are coming out and the REAL economy (not the stock market) is collapsing.
    They need a HUGE distraction to cover up all the lies and filth. They want many events, big
    and small to distract everyone’s attention from sins past. All kinds of political witch hunts
    and investigations. Central banks out of options to fix economic problems. Time for a war.
    Maybe multiple wars. A war to end all wars. The spin being put out there for consumption
    is relentless. They are bombarding us with information and disinformation. Again, take your
    filters off and really think. There is a huge shit storm coming down the road. Soon.

  9. Genius says:

    “a massive cyber attack on every segment of the US infrastructure and shutting down communications will be a VERY SURE part of a foreign country’s planned strategy”

    OR NOT SO FORIEGN!

  10. johnfolger says:

    they cant even make a uniform that fits

Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Commenting Policy:

Some comments on this web site are automatically moderated through our Spam protection systems. Please be patient if your comment isn't immediately available. We're not trying to censor you, the system just wants to make sure you're not a robot posting random spam.

This web site thrives because of its community. While we support lively debates and understand that people get excited, frustrated or angry at times, we ask that the conversation remain civil. Racism, to include any religious affiliation, will not be tolerated on this site, including the disparagement of people in the comments section.

 

Web Design and Content Copyright 2007 - 2015 SHTF Plan - When It Hits The Fan, Don't Say We Didn't Warn You - All Rights Reserved

Our Supercharged Intel Xeon E5-2620 v4 Octo-Core Dual Servers are Powered By Liquid Web

Dedicated IP Address: 69.167.174.108

The content on this site is provided as general information only. The ideas expressed on this site are solely the opinions of the author(s) and do not necessarily represent the opinions of sponsors or firms affiliated with the author(s). The author may or may not have a financial interest in any company or advertiser referenced. Any action taken as a result of information, analysis, or advertisement on this site is ultimately the responsibility of the reader.

SHTFplan is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.