In the new era where keyboards replace missiles, the keyboards of young hackers will become the Damocles' sword of cryptocurrency.
On February 21, the cryptocurrency exchange Bybit suffered a $1.5 billion hacking incident, once again bringing the North Korean hacker group Lazarus Group into the spotlight.
In recent years, this organization has repeatedly succeeded, from the theft at KuCoin exchange to the hack of the Ronin cross-chain bridge, and even the personal wallet of the founder of Defiance Capital. The mastermind behind these attacks is this mysterious hacker organization.
You may wonder how North Korea, as one of the most closed countries in the world, has cultivated such astonishing power on the digital battlefield.
In traditional military fields, North Korea struggles to compete with the US-South Korea alliance, but cyber warfare provides it with a strategic leverage of "four taels to move a thousand pounds."
Since the 1980s, the North Korean government has expended significant effort on hacker training, internally codenamed "Secret War."
Jang Se-yul, a North Korean defector who fled to South Korea in 2007, previously studied at North Korea's top engineering school, Mirim University (now renamed University of Automation). During his university years, Jang took courses offered by the 121 Bureau alongside other hackers.
After graduation, Jang joined the North Korean government's Reconnaissance General Bureau, where the 121 Bureau is an elite spy agency. It was during this time that he began to interact with the top hackers within the 121 Bureau.
In a later interview with Business Insider, Jang Se-yul stated that compared to North Korea's nuclear threats, the threat of cyber warfare is more real and more dangerous. He said, "This is a silent war. The battle has already begun without a shot being fired."
The question is, how does such a poor and resource-scarce country invest heavily in cyber warfare?
Jang Se-yul's answer is: Because training a hacker is very cheap.
Generally speaking, North Korea is divided into three main classes: the basic masses (core class), the complex masses (ordinary middle class), and the remnants of hostile classes (landlords, rich farmers, etc.). These classes are further divided into 56 tiers, all recorded in the resident registration system and used during cadre recruitment.
Ahn Chan-il, chairman of the World North Korea Research Center, stated that in the past, North Korean hackers were also judged by their backgrounds, as a decline in their loyalty to the party could pose a threat to the regime.
It wasn't until the international community imposed comprehensive sanctions on North Korea that the country, facing obstacles in earning foreign exchange, had to resort to illegal means through cyber attacks.
This also opened a special channel for cyber warfare talent, allowing for unconventional recruitment of talent.
Jang's alma mater, the University of Automation, is the core base for training North Korean hackers. He stated, "Each class only admits 100 students, but there are as many as 5,000 applicants."
This can be seen as a PLUS version of the college entrance examination; once accepted, becoming a hacker means joining the top 1% of North Korea, though the process is particularly arduous.
Before these young hackers are deployed, they undergo nearly nine years of rigorous training, starting as young as 17.
While in school, they attend six classes a day, each lasting 90 minutes, learning various programming languages and operating systems. They spend a significant amount of time analyzing programs like Microsoft's Windows operating system, studying how to breach the computer information systems of hostile countries such as the US and South Korea.
Additionally, their core task is to develop their own hacking programs and computer viruses, rather than relying on existing external hacking programs.
In Jang's view, North Korean hackers are technically on par with top programmers at Google or the CIA, and may even be better.
From the first day of their education, these "little black generals" are assigned missions and goals, divided into different groups focusing on attacking different countries and regions, such as the US, South Korea, and Japan. Once hackers are assigned to a specific "national group," they spend nearly two years infiltrating that country, learning the local language and cultural knowledge to avoid revealing their true identities beyond their technical skills.
Jang mentioned that one of his friends worked for an overseas department of the 121 Bureau, but he appeared to be an employee of a North Korean trading company. No one knew his true identity, and his company operated normally.
Due to the unique nature of cyber warfare, these young hackers can freely use the internet, quickly grasping the latest developments abroad, and they are well aware that their country is very "closed and conservative." However, this does not shake their patriotism and loyalty to their leader.
"Even if others forcibly persuade them or offer them jobs at the South Korean presidential office, they would not betray their country," Jang stated.
Of course, becoming a hacker also means money and privileges.
Young hackers can earn a monthly salary of up to $2,000, which is double that of an ambassador stationed abroad. In addition, they can obtain luxurious apartments of over 185 square meters in the center of Pyongyang and can relocate their families to the capital, which are undoubtedly extremely tempting conditions.
In the new era where keyboards replace missiles, the keyboards of young hackers will become the Damocles' sword of cryptocurrency.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。