Thursday, April 3, 2025
HomeSecurity NewsNorth Korean Hackers Threaten to Attack Irish companies with 'almost daily' Attacks

North Korean Hackers Threaten to Attack Irish companies with ‘almost daily’ Attacks

Published on

SIEM as a Service

Follow Us on Google News

State-Sponsored Hackers from North Korea targeting Irish companies, banks, and utilities almost every day.They are likewise suspected to be in charge of the €4.3m cyber heist on Meath County Council in October 2016.

Why Ireland targeted by North Korea Hackers?

Ireland is considered as a target due to the presence of many US Multinationals, Defense Minister Paul Kehoe said we will be rapidly upgrading Ireland’s capability of defending against cyber attacks.

The cost of hacking attempts on Irish organizations has taken off from €498,000 in 2014 to €1.7m in 2016 – with examiners cautioning it is probably going to increment exponentially finished future years.

The number of cyber attacks experienced by Irish businesses increased between 2012 and 2016, but that figure is supposed to increase or even treble because of modern ransomware attacks.

Also Read Leading research and advisory firms Forrester was hacked

“There were always certain unspoken rules in terms of cyber warfare between countries and intelligence services,” Mr. Murphy said.
“But North Korea has thrown the entire rule book out the window. It is basically engaging in cyber warfare to raise funds and to cause global chaos. Reported Independent IE.

According to a nationwide cybersecurity awareness survey, over 171,000 businesses in the State could be vulnerable to crippling ransomware attacks.

Murphy said that the WannaCry ransomware assault which caused worldwide chaos not long ago was abused by North Korean leader Kim Jong-un’s cybersecurity services.

A review found that 26pc of organizations have experienced digital assaults in the previous two years, with a further 18pc uncertain in the event that they have been influenced.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...