正文
VOA常速英语:Where Did North Korea’s Cyber Army Come From?
North Korean cyber operatives, like the Lazarus Group, have been linked to computer system infiltrations like the 2014 Sony Pictures hack, prior to the release of the film “The Interview”and the 2016 attempted theft of close to one billion dollars from the central Bangladesh bank using the SWIFT banking system.
朝鲜网络操作员与计算机系统的渗透有关,就像拉撒路集团一样,在2014年电影《采访》发布前攻击了索尼影业,2016年通过全球同业银行金融电讯协会(SWIFT)通信系统盗走了孟加拉中央银行近10亿美金。
But how did Pyongyang become so adept at hacking while not possessing rich resources and being under tough international sanctions.
但在既没有拥有丰富资源又受到严厉的国际制裁的情况下,朝鲜怎么会如此擅长黑客攻击。
Korean University professor Seungjoo Kim says, the answer,in part, is because North Korea’s computer hackers operate in China and Europe with easy access to the Internet.
韩国大学教授Seungjoo Kim表示,部分是因为朝鲜的计算机黑客在中国和欧洲操作,可以轻松访问互联网。
North Korea practices that craft under real conditions, like hacking cryptocurrency sites or stealing information.
朝鲜在真实条件下实施这种技术,如攻击加密货币网站或窃取信息。
These repeated exercises help to improve skills.
不断的练习帮助他们提升技能。
There are between 6,000 and 7,500 North Korean cyber warriors,split into four units to carry out cyberterrorism against state infrastructure, financial services and to hijack the latest defense technologies, estimates NK Intellectual Solidarity director Heung Kwan Kim.
北韩知识分子联盟的Heung Kwan Kim估计,他们攻击国家基础设施、金融服务并劫持最新防御技术。北韩知识分子联盟的Heung Kwan Kim估计。
North Korea was inspired by the Chinese cyberwar units and learned from them.Recognizing their power, North Korea set up the first unit within the central government in 1993.
朝鲜受到中国网军的启发,并向他们学习。朝鲜认识到了自己的力量,于1993年在中央政府内设立了第一个单位。
With international sanctions crippling Pyongyang’s coffers,Kim says North Korea shifted their cyberattacks to private systems rather than government networks,because the smaller entities weren’t as well protected.
国际制裁削弱了朝鲜的经济收入,金表示,朝鲜从攻击政府网络转移到攻击私人系统,因为小的个体保护措施少。
It’s a problem of North Korea’s high ability and low security.
这是关于朝鲜高能力、低安全性的问题。
This has led to allegations that Pyongyang is hacking into cryptocurrency exchanges to steal virtual money, like Bitcoin.
这导致有人指控朝鲜,说其正在攻击加密货币交易以窃取虚拟货币,比如比特币。
Seungjoo Kim says, this is because stolen cryptocurrencies are difficult to trace back to their original owner.
Seungjoo Kim表示,这么做是因为被盗的加密货币难以找到原来的主人。
To earn cryptocurrency in a legitimate way, cutting-edge computers are required, but North Korea doesn’t have them,so they attack computers abroad and hack mining programs.
要用合法的方式获得加密货币,需要先进的计算机,但朝鲜没有先进的计算机,所以他们攻击国外的计算机并破解采矿程序。
The hacked computers then send any virtual coins, it uncovers to North Korean digital wallets, making convert to hard currency.
被黑客攻击的计算机发送任何虚拟硬币,都会进入到朝鲜的数字钱包,转换为硬通货。
Kim advocates that a detente in the virtual world similar to the easing of tensions taking place in the peninsula.However, that may be difficult, as it would require North Korea to admit it committed acts of cyber terrorism.
金提倡缓和虚拟世界紧张的局面,类似于缓和半岛紧张局势。但是,这可能很难,因为这要求朝鲜承认自己的网络恐怖主义行为。
相关文章
- VOA常速英语:日增20万确诊病例,印度疫情失控
- VOA常速英语:美国驱逐10名俄罗斯外交官
- VOA常速英语:US Marks One Year of Pandemic Shutdown with Hope, Concern
- VOA常速英语:US Senate Nears Vote on $1.9 Trillion Biden COVID Aid Package
- VOA常速英语:What Is Clubhouse and Why Did It Get So Popular?
- VOA常速英语:Thermal Water Helps Recovering COVID Patients
- VOA常速英语:Deadly Drug Overdoses Epidemic Rages On
- VOA常速英语:International Women’s Day Marks Year of Increased Hardships for Women Worldwide
- VOA常速英语:US States Relax Restrictions, Health Officials Warn Against It
- VOA常速英语:Virginia Starts Reopening Schools for In-Person Learning