
N. Korea hackers steal military secrets, hit Air Force bases, NASA, US says
By Karah Rucker (Anchor/Reporter), Ian Kennedy (Lead Video Editor)
In a coordinated effort, officials from the United States, Britain and South Korea issued a joint statement disclosing that North Korean hackers have been systematically infiltrating and stealing sensitive military secrets. According to the statement, North Korean-affiliated hackers have successfully breached several critical U.S. agencies.
Media Landscape
See how news outlets across the political spectrum are covering this story. Learn moreBias Summary
- Aliquet mi class porta venenatis phasellus conubia ut mattis iaculis efficitur parturient, laoreet maecenas potenti commodo tristique et netus dapibus elit aliquam.
- Velit et nisl nascetur quam orci dictumst ex scelerisque, penatibus sem eget aptent eros cras.
- Risus gravida molestie fusce ante auctor habitant lorem placerat senectus sit sollicitudin, commodo adipiscing donec id semper et vestibulum lacinia diam nisl.
- Molestie placerat duis potenti imperdiet sapien sollicitudin faucibus scelerisque quisque adipiscing dolor nisl ac tellus, neque vehicula risus nec ornare mi etiam facilisi aptent parturient ultrices condimentum.
- Feugiat molestie nullam phasellus sed ut tincidunt elementum torquent duis pellentesque, curabitur lobortis dictum tortor metus inceptos nascetur eu consectetur, at fames tellus enim placerat arcu viverra efficitur bibendum.
Bias Comparison
Bias Distribution
Left
Right
Untracked Bias
Among the affected entities are Air Force bases in Texas and Georgia, NASA, the U.S. Justice Department and the FBI. The cyberattack on NASA alone granted adversaries access to approximately 17 gigabytes of classified data.

Download the SAN app today to stay up-to-date with Unbiased. Straight Facts™.
Point phone camera here
The hacking group, which the U.S. identified as having connections to the North Korean government, is believed to be engaged in a years-long operation targeting a broad spectrum of military and defense-related information. This includes designs for tanks, rockets, submarines, fighter jets and missiles. The data is suspected to be used to bolster North Korea’s military capabilities and nuclear programs, according to the statement.
In addition to pilfering sensitive military information, the hackers have also been exploiting ransomware tactics to generate illicit revenue.
Notable among their attacks was a ransomware incident targeting a hospital system in Kansas several years ago. The Justice Department linked the attack and other cyber activities to a known North Korean hacker named Rim Jong Hyok.
A warrant has been issued for Hyok’s arrest, but he is currently believed to be residing in North Korea, complicating efforts to apprehend him.
Unbiased news.
Directly to your inbox. Free!
Learn more about our emails. Unsubscribe anytime.
By entering your email, you agree to the Terms & Conditions and acknowledge the Privacy Policy.
To counter this cyber threat, a dedicated task force is working to neutralize the hackers behind these attacks. The FBI has made notable progress in this effort, seizing an undisclosed number of online accounts associated with the hacking group. Additionally, the FBI has recovered over half a million dollars in virtual currency, which will be returned to victims impacted by the ransomware attacks.
NORTH KOREAN HACKERS ARE SUCCESSFULLY STEALING MILITARY SECRETS –
THAT’S ACCORDING TO A JOINT STATEMENT FROM THE UNITED STATES, BRITAIN, AND SOUTH KOREA.
OFFICIALS SAY SOME OF THE AGENCIES IMPACTED IN THE U.S. –
INCLUDE AIR FORCE BASES IN TEXAS AND GEORGIA.
NASA. THE U.S. JUSTICE DEPARTMENT AND FBI.
THE NASA HACK ALONE ALLOWED ADVERSARIES ACCESS TO 17 GIGABYTES OF DATA.
THE GROUP THE U.S. SAYS IS RESPONSIBLE FOR A YEARS-LONG HACKING MISSION –
HAS TIES TO NORTH KOREA’S GOVERNMENT.
IMPACTED NATIONS LIKE THE U.S. AND JAPAN –
BELIEVE THESE HACKERS ARE STEALING THE DATA TO HELP STRENGTHEN THEIR OWN MILITARY AND WEAPONS SYSTEMS – INCLUDING THEIR LONG-SOUGHT AFTER NUCLEAR PROGRAMS.
SOME OF THE SYSTEMS THEY SEEM TO BE TARGETING INVOLVE THE DESIGNS OF TANKS, ROCKETS, SUBMARINES, FIGHTER JETS, AND MISSILES.
NOT ONLY ARE THEY STEALING VALUABLE INFORMATION –
BUT THEY’RE ALSO MAKING MONEY OFF RANDOM RANSOMWARE ATTACKS ON U.S. INFRASTRUCTURE.
LIKE THE HACK A FEW YEARS AGO ON A HOSPITAL SYSTEM IN KANSAS.
THE U.S. JUSTICE DEPARTMENT BELIEVES THEY KNOW WHO WAS BEHIND THAT SPECIFIC ATTACK AND POTENTIALLY OTHER GREATER HACKING ACTIVITIES.
HIS NAME IS “JIM JONG HYOK”.
THERE IS A WARRANT FOR HIS ARREST – BUT HE IS BELIEVED TO BE **IN NORTH KOREA.
AS FOR WHAT’S BEING DONE ABOUT IT?
THERE IS A TASK FORCE SLOWLY CHIPPING AWAY AT UNCOVERING THE HACKERS.
THE FBI HAS SEIZED AN UNKNOWN NUMBER OF ONLINE ACCOUNTS BELONGING TO THE HACKING GROUP – AND HAS RECOVERED MORE THAN HALF A MILLION DOLLARS IN “VIRTUAL CURRENCY” THAT WILL BE RETURNED TO VICTIMS OF THEIR RANSOMWARE ATTACKS.
FOR MORE NEWS UPDATES THAT MATTER TO YOU –
FIND MORE OF OUR REPORTING ON THE STRAIGHT ARROW NEWS MOBILE APP OR VISIT US AT SAN DOT COM.
Media Landscape
See how news outlets across the political spectrum are covering this story. Learn moreBias Summary
- Sapien quam sem orci aptent quis laoreet adipiscing justo habitant nisl placerat, tempus ligula metus rutrum consequat nibh maecenas odio ut ante.
- Natoque nibh tortor dapibus nascetur sed vivamus urna condimentum, massa tristique vehicula congue viverra hac.
- Lorem ex efficitur cursus lobortis suscipit vel aliquet auctor dui porta himenaeos, rutrum conubia sollicitudin malesuada cubilia nibh quisque varius etiam tortor.
- Efficitur auctor ultrices metus eu leo himenaeos ornare condimentum feugiat conubia class tortor accumsan cras, dictum eget lorem nunc fames quam purus ipsum congue placerat porttitor sodales.
- Mauris efficitur sociosqu quis tincidunt adipiscing in morbi pellentesque ultrices elit, lacus lectus facilisis taciti dis gravida dapibus diam phasellus, curae senectus cras a auctor non duis nisl semper.
Bias Comparison
Bias Distribution
Left
Right
Untracked Bias
Straight to your inbox.
By entering your email, you agree to the Terms & Conditions and acknowledge the Privacy Policy.