• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
TechEngage®

TechEngage®

Connecting mankind with technology

  • News
  • Reviews
  • Cryptocurrency
  • How-to
  • Roundups
  • Science
    • Energy
    • Environment
    • Health
    • Space
  • Apps
  • More
    • Opinion
    • Noteworthy
    • Culture
    • Events
    • Deals
    • Startups
      • Startup Submissions
  • Videos
  • Tools
TechEngage » News » Security

North Korean hackers hacked personal data of 997 defectors

Avatar Of Fazeel Ashraf Fazeel Ashraf Updated: January 26, 2019

illustration contains north korea
Design by abdugeek / TechEngage

Hackers from North Korea have stolen data from roughly 997 defectors. The defectors belonged to North Korea as well. It seems the hackers wanted to confirm whether the people were dead or missing.

The personal data that was stolen included names, addresses, and birth dates of the defectors. South Korea’s Unification Ministry confirmed these hacks.

Worst of all, the hacks could have been easily avoided.

The data leak came after an employee working at the Hana Foundation unknowingly opened an email containing malware. This foundation works to help defectors leave the country, and assists North Korean citizens in settling up new lives abroad.

Also Read: China accused of hacking US Navy and NASA

The malware is what caused the defectors’ data to be leaked. Their data is supposed to be encrypted and kept offline – that is, the data has to be kept off the Internet. But according to the organization’s officials, the employee did not follow protocol.

It is important to note that the hackers have not been identified, but it’s alleged that they are North Korean.

Prominent human rights activist and defector Kang Chol-hwan confirmed his suspicions to the Wall Street Journal that North Korea wants information on whether these citizens are still alive.

This hack is extremely worrying for North Koreans who want to flee the country because of its authoritarian regime and inhumane laws. North Korea is a dictatorship that is responsible for multiple human right violations.

The dictatorship has been frequently scrutinized for its treatment of defectors. For example, North Korea punishes the families of defectors to ensure that no one else follows in their footsteps.

Threats and violence are often used by the North Korean regime to keep its citizens in line and to prevent further departures. Luckily, this hack only affects a small percentage of defectors that have fled the country since the peace treaty that ended the Korean War.

It remains unclear if the hacks targeted recent defectors or chose names at random. Despite the small percentage of victims, the hack could be devastating to those left behind.

It will leave many defectors and their families’ lives at risk. North Korea doesn’t have an ounce of remorse for defectors or enemies of the state. Kim Jong Un, the “Supreme Leader” of North Korea, allegedly killed his own brother over a minor dispute.

This hack shows how vital it is for employees of NGOs and other non-tech organizations to have proper IT skills and security knowledge. Hackers often targeting individuals of high interest and it is extremely important to keep citizens’ personal information secure.

It is the job of every country’s government to safeguard their citizens’ personal information as a basic human right. Currently, governments have become less forgiving and more suspicious of their citizens.

This is not the right approach for a democratic society. Taking away people’s freedom of speech and the right to leave the country will only lead to more angst and criticism of authority. It may lead to protests and violence.

So to prevent a dark dystopian future, governments must come together to keep their citizens personal information as private and secure as possible.

This post was orginally published on: December 30, 2018 and was updated on: January 26, 2019.

Related Tags: Data breach Data Security NorthKorea NorthKoreanHackers Privacy Security User Data User privacy

Related Stories

  • 4 Most Popular Social Media Apps And The Security Risks Associated With Them

    4 most popular social media apps and the security risks associated with them

  • Your Home Can Be Smart Or Secure, But Probably Not Both

    Your home can be smart or secure, but probably not both

  • Eu Seeking Ethical Hackers To Find Software Bugs

    EU seeking ethical hackers to find software bugs

Avatar Of Fazeel Ashraf

Fazeel Ashraf

Former Author @TechEngage

IT graduate from the National University of Science and Technology with a passion for writing. When not reading or writing, I can be found listening to rock and metal or playing some classic jams on my electric guitar. I’m also a big fan of horror movies.

Reader Interactions

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or publish anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

Become a contributor

We are accepting contributor applications. All applications will be decided in 3 days after applying. To learn more click here.
TechEngage-Apple-News
TechEngage-Google-News
A photo of Apple MacBook Pro's lid colorful

The best laptops for every budget this 2023

An Image of Board Games

5 Best family board games to buy on Amazon for 2023

Recent Stories

  • 11 best car phone mounts in 2023
  • 5 best standing desks on Amazon for 2023
  • 10 best iPhone wallpaper apps in 2023
  • Oppo Find X6 Pro: 16GB RAM, 1-inch 50MP camera sensor, and 5000 mAh battery
  • Best iPhone 12, 12 Pro wallet cases for 2023

Footer

Discover

  • About us
  • Newsroom
  • Staff
  • Advertise
  • Send us a tip
  • Startup Submission Questionnaire
  • Brand Kit
  • Contact us

Legal pages

  • Reviews Guarantee
  • Community Guidelines
  • Corrections Policy and Practice
  • Cookies Policy
  • Our Ethics
  • Disclaimer
  • GDPR Compliance
  • Privacy Policy
  • Terms and Conditions

Must reads

  • Best AirPods alternatives on Amazon
  • Best PC monitors for gaming on Amazon
  • Best family board games
  • Best Graphics Cards (GPUs) for gaming
  • Best video doorbells without subscription
  • Best handheld video game consoles
  • Best all-season tires for snow
  • Best mobile Wi-Fi hotspots
  • Best treadmills on Amazon
  • Best AM radios for long-distance reception

Download our apps

TechEngage-app-google-play-store
TechEngage app coming soon on App Store

Copyright © 2023 · All Rights Reserved · TechEngage® is a Project of TechAbout LLC.
TechEngage® is a registered trademark in United Kingdom under Trademark Number UK00003417167 and is ISSN protected under the ISSN 2690-3776 and OCLC Number 1139335774.

Go to mobile version