¡°ÝÁ, Áö³­ÇØ ¾ÏȣȭÆó 13¾ï 4õ¸¸ ´Þ·¯ Å»Ã롦Àü³â ´ëºñ 102£¥ Áõ°¡¡±

Ú¸ ¾ÏȣȭÆó ºÐ¼®±â¾÷ÀΠüÀ̳θ®½Ã½º º¸°í¼­, "ÇØÅ· ¼º°ø ºóµµµµ Áõ°¡"

Áö³­ÇØ ºÏÇÑÀÇ ¾ÏȣȭÆó ÇØÅ· °ø°ÝÀÌ Àü³âµµ¿¡ ºñÇØ 2¹è ÀÌ»ó ±ÞÁõÇÑ °ÍÀ¸·Î ³ªÅ¸³µ½À´Ï´Ù. ºÏÇÑ IT ³ëµ¿ÀÚµéÀÌ À§ÀåÃë¾÷À» ÅëÇØ ¾ÏȣȭÆó ±â¾÷ ³×Æ®¿öÅ©¿¡ ħÅõÇÏ´Â »ç·Ê°¡ Áõ°¡ÇÑ °Í°ú °ü·ÃÀÌ ÀÖ´Â °ÍÀ¸·Î ºÐ¼®µÆ½À´Ï´Ù. Á¶»óÁø ±âÀÚ°¡ º¸µµÇÕ´Ï´Ù.

¹Ì±¹ÀÇ ¾ÏȣȭÆó ºÐ¼®±â¾÷ÀΠüÀ̳θ®½Ã½º´Â 27ÀÏ ¹ßÇ¥ÇÑ ¡®2025¾ÏȣȭÆó ¹üÁË º¸°í¼­¡¯¿¡¼­ ¡°Áö³­ÇØ ºÏÇÑ ÇØÄ¿µéÀÌ ¾ÏȣȭÆó Ç÷§Æû¿¡¼­ ±× ¾î´À ¶§º¸´Ùµµ ´õ ¸¹ÀÌ ÈÉÃÆ´Ù¡±°í ÁöÀûÇß½À´Ï´Ù.

[º¸°í¼­] ¡°In 2024, North Korean hackers stole more from crypto platforms than ever before. In 2023, North Korea-affiliated hackers stole approximately $660.50 million across 20 incidents; in 2024, this number increased to $1.34 billion stolen across 47 incidents — a 102.88% increase in value stolen. These figures represent 61% of the total amount stolen for the year, and 20% of total incidents.¡±

üÀ̳θ®½Ã½º´Â º¸°í¼­¿¡¼­ Áö³­ 2023³â ÃÑ 20°ÇÀÇ »ç°ÇÀ» ÅëÇØ ¾à 6¾ï 6050¸¸ ´Þ·¯¸¦ Å»ÃëÇß´ø ºÏÇÑ ¿¬°è ÇØÄ¿µéÀÌ Áö³­ÇØ¿¡´Â ÃÑ 47°ÇÀÇ »ç°Ç¿¡¼­ 13¾ï 4õ¸¸ ´Þ·¯¸¦ ÈÉÃÄ, Å»Ãë ±Ý¾× ±âÁØÀ¸·Î 102.88%°¡ Áõ°¡Çß´Ù°í ¹àÇû½À´Ï´Ù. »ç°Ç ¹ß»ý °Ç¼ö ¿ª½Ã Àü³â ´ëºñ 2¹è ÀÌ»ó Áõ°¡Çß½À´Ï´Ù.

üÀ̳θ®½Ã½º°¡ 2025³â 2¿ù 27ÀÏ ¹ßÇ¥ÇÑ ¡®2025 ¾ÏȣȭÆó ¹üÁË º¸°í¼­¡¯ Áß Áö³­ÇØ ºÏÇÑÀÇ ¾ÏȣȭÆó Å»Ãë ±Ô¸ð ºÎºÐ ½ºÅ©¸°¼¦.
üÀ̳θ®½Ã½º°¡ 2025³â 2¿ù 27ÀÏ ¹ßÇ¥ÇÑ ¡®2025 ¾ÏȣȭÆó ¹üÁË º¸°í¼­¡¯ Áß Áö³­ÇØ ºÏÇÑÀÇ ¾ÏȣȭÆó Å»Ãë ±Ô¸ð ºÎºÐ ½ºÅ©¸°¼¦.

<¡°ºÏÇÑÇØÅ· Áֱ⠪¾ÆÁö°í ¼º°ø·ü ³ô¾ÆÁ®¡±>

±×·¯¸é¼­ Áö³­ÇØ Å»ÃëµÈ Àüü ¾ÏȣȭÆó ±Ý¾×¿¡¼­ ºÏÇÑÀÌ Â÷ÁöÇÏ´Â ºñÁßÀÌ 61%À̸ç, Àüü »ç°Ç ¼ö¿¡¼­´Â ºÏÇÑÀÌ 20%¸¦ Â÷ÁöÇÑ´Ù°í ÁöÀûÇß½À´Ï´Ù. º¸°í¼­´Â ¶Ç ºÏÇÑÀÇ ¾ÏȣȭÆó ÇØÅ· °ø°Ý »çÀÌ °£°ÝÀ» ºÐ¼®ÇÑ °á°ú ÇØÅ·ÀÌ ¹ß»ýÇÏ´Â ÁֱⰡ Á¡Á¡ ´õ ª¾ÆÁö°í ÀÖ´Â °ÍÀ¸·Î ³ªÅ¸³µÀ¸¸ç, ¼º°øÇÏ´Â ºóµµµµ Áõ°¡ÇÏ°í ÀÖ´Ù°í Æò°¡Çß½À´Ï´Ù.

ƯÈ÷ Áö³­ÇØ¿¡´Â 5õ¸¸~1¾ï ´Þ·¯ ÀÌ»óÀÇ ´ë±Ô¸ð °ø°ÝÀÌ Àü³âµµ¿¡ ºñÇØ Å©°Ô Áõ°¡Çߴٸ鼭, ÀÌ´Â ºÏÇÑÀÌ ´ëÇü ÇØÅ·À» ´õ¿í È¿°úÀûÀÌ°í ½Å¼ÓÇÏ°Ô ¼öÇàÇÏ°í ÀÖÀ½À» ½Ã»çÇϸç, °ú°Å 2³â°£ ÁÖ·Î 5õ¸¸ ´Þ·¯ ÀÌÇÏÀÇ ÇØÅ· °ø°ÝÀ» ÅëÇØ ¼öÀÍÀ» ¿Ã¸®´ø °æÇâ°ú ¶Ñ·ÇÇÑ ´ëºñ¸¦ ÀÌ·é´Ù°í ÁöÀûÇß½À´Ï´Ù.

º¸°í¼­´Â ºÏÇÑÀÇ ¾ÏȣȭÆó ºÐ¾ß ÇØÅ· °ø°Ý Ƚ¼ö¿Í Å»Ãë ±Ý¾×ÀÌ Å©°Ô ´Ã¾î³­ °ÍÀº ¡°¾ÏȣȭÆó °ü·Ã ±â¾÷¿¡ ħÅõÇØ ±×µéÀÇ ³×Æ®¿öÅ©, ¿î¿µ, ¹«°á¼ºÀ» ÈѼÕÇÏ´Â ºÏÇÑÀÇ IT ³ëµ¿ÀÚµé°ú °ü·ÃÀÌ ÀÖ´Ù¡±°í Áø´ÜÇß½À´Ï´Ù.

[º¸°í¼­] ¡°Some of these events appear to be linked to North Korean IT workers, who have been increasingly infiltrating crypto and Web3 companies, and compromising their networks, operations, and integrity. These workers often use sophisticated Tactics, Techniques, and Procedures (TTPs), such as false identities, third-party hiring intermediaries, and manipulating remote work opportunities to gain access.¡±

<¡°ºÏÇÑ IT Àη¾ÏȣȭÆó ÇØÅ· Áõ°¡ ±â¿©¡±>

ºÏÇÑ IT ÀηµéÀÌ ¾ÏȣȭÆó ±â¾÷ ³»ºÎ Á¢±Ù ±ÇÇÑÀ» È®º¸Çϱâ À§ÇØ °¡Â¥ ½ÅºÐ, Á¦3ÀÚ Ã¤¿ë Áß°³¾÷ü È°¿ë, ¿ø°Ý ±Ù¹« ±âȸ Á¶ÀÛ°ú °°Àº Á¤±³ÇÑ Àü¼ú ¹× ±â¹ý, ÀýÂ÷¸¦ È°¿ëÇÏ°í ÀÖ´Ù´Â °ÍÀÔ´Ï´Ù. ±×·¯¸é¼­ ÀÌ·¯ÇÑ À§ÇèÀ» ¿ÏÈ­Çϱâ À§ÇØ ±â¾÷µéÀº ½Å¿ø Á¶È¸ ¹× ½Å¿ø È®ÀÎ µî ä¿ë½Ã Àû±ØÀûÀÎ ½Ç»ç¸¦ ½Ç½ÃÇØ¾ß Çϸç, ÇÊ¿äÇÑ °æ¿ì ÁÖ¿ä ÀÚ»ê º¸È£¸¦ À§ÇÑ °­·ÂÇÑ °³ÀÎ Å° °ü¸® Á¤Ã¥À» À¯ÁöÇØ¾ß ÇÑ´Ù°í ÁöÀûÇß½À´Ï´Ù.

º¸°í¼­´Â ¶Ç Áö³­ÇØ 6¿ù ºí¶óµð¹Ì¸£ Ǫƾ ·¯½Ã¾Æ ´ëÅë·É°ú ±èÁ¤Àº ±¹¹«À§¿øÀåÀÌ Æò¾ç¿¡¼­ ¸¸³ª Á¤»óȸ´ãÀ» °®°í »óÈ£ ¹æÀ§ Á¶¾àÀ» ü°áÇÑ ÀÌÈÄ ºÏÇÑÀÇ ÇØÅ· È°µ¿¿¡ Å« º¯È­°¡ ÀÖ¾ú´ø Á¡¿¡µµ ÁÖ¸ñÇß½À´Ï´Ù. Áö³­ÇØ 7¿ù 1ÀÏ ±âÁØÀ¸·Î »ó¹Ý±â¿Í ÇϹݱ⠺ÏÇÑ ÇØÄ¿µéÀÇ ¾ÏȣȭÆó Å»Ãë È°µ¿À» ºñ±³ÇÑ °á°ú, Á¤»óȸ´ã ÀÌÈÄ ºÏÇÑÀÇ ÇØÅ· È°µ¿ÀÌ ¾à 54% °¨¼ÒÇß´Ù´Â °ÍÀÔ´Ï´Ù.

±×·¯¸é¼­ ºÏÇÑÀÇ ÇØÅ·ÀÌ ÁÙ¾îµç °ÍÀº Á¤±ÇÀÌ ±º»ç ¹× Á¤º¸ ºÐ¾ß ¸ðµç ¿ª·®À» ¿ìÅ©¶óÀ̳ª ÀüÀï Áö¿øÀ¸·Î µ¹·È±â ¶§¹®ÀÏ °¡´É¼ºÀÌ ÀÖÀ¸¸ç, ·¯½Ã¾Æ¿ÍÀÇ Çù·ÂÀÌ °­È­µÇ¸é¼­ »çÀ̹ö È°µ¿¿¡µµ Àü·«ÀûÀÎ º¯È­°¡ ÀÖ¾úÀ» °¡´É¼ºÀÌ ÀÖ´Ù°í ºÐ¼®Çß½À´Ï´Ù.

 
 
 
<¡°ºÏÇÑ ÇØÅ· ´õ Á¤±³ÇØÁ®¡¦ºí·ÏüÀÎ º¸¾È±â¼ú È°¿ëÇؾߡ±>

À̹ø º¸°í¼­ ÀÛ¼º¿¡ Âü¿©ÇÑ ¾Øµå·ù ÇǾî¸Õ üÀ̳θ®½Ã½º ±¹°¡¾Èº¸Á¤º¸ ÆÀÀåÀº 28ÀÏ VOA¿¡ ¡°ºÏÇÑÀÇ Áö¿øÀ» ¹Þ´Â »çÀ̹ö ÇØÅ·Á¶Á÷°ú ¾ÇÀÇÀû ÇàÀ§ÀÚµéÀÌ Á¡Á¡ ´õ Á¤±³ÇØÁö°í ÀÖ´Ù¡±°í ÁöÀûÇß½À´Ï´Ù.

[ÇǾî¸Õ ÆÀÀå] ¡°As DPRK-backed cyber attackers and bad actors are becoming more sophisticated. Cryptocurrency businesses must take a proactive approach to threat prevention. Real-time monitoring and advanced predictive technologies for detecting emerging threats will become essential. Exchanges will also need to demonstrate to their regulators and users how they ensure that user funds are protected.¡±

±×·¯¸é¼­ ¡°¾ÏȣȭÆó ±â¾÷µéÀº À§Çù ¿¹¹æÀ» À§ÇØ ´õ¿í Àû±ØÀûÀ¸·Î ´ëóÇØ¾ß ÇÑ´Ù¡±¸ç, ½Ç½Ã°£ ¸ð´ÏÅ͸µ°ú »õ À§ÇùÀ» °¨ÁöÇÏ´Â °í±Þ ¿¹Ãø ±â¼úÀ» ÇʼöÀûÀ¸·Î µµÀÔÇØ¾ß ÇÑ´Ù°í °­Á¶Çß½À´Ï´Ù. ¾Æ¿ï·¯ ¾ÏȣȭÆó °Å·¡¼Òµéµµ ±ÔÁ¦ ±â°ü°ú »ç¿ëÀÚ¿¡°Ô ±×µéÀÇ ÀÚ±ÝÀÌ ¾î¶»°Ô º¸È£µÇ°í ÀÖ´ÂÁö °è¼Ó ÀÔÁõÇØ¾ß ÇÑ´Ù°í µ¡ºÙ¿´½À´Ï´Ù.

ÇǾî¸Õ ÆÀÀåÀº ¶Ç ºÏÇÑ ÇØÄ¿µéÀÌ ÈÉÄ£ ÀÚ±ÝÀ» ¼¼Å¹ÇÏ°í Çö±ÝÈ­ÇÏ´Â ¿ª·®À» ¹æÇØÇÏ´Â °Íµµ ¹«¾ùº¸´Ù Áß¿äÇÑ °úÁ¦¶ó¸é¼­, ´ç±¹°ú »çÀ̹ö º¸¾È ±â¾÷ÀÌ ºÏÇÑ µî ¾Ç¼º ÇàÀ§ÀÚµéÀÇ ºÒ¹ý È°µ¿À» ½Ç½Ã°£À¸·Î ÃßÀûÇÏ°í ¸ð´ÏÅ͸µÇÒ ¼ö ÀÖ´Â ºí·ÏüÀÎ º¸¾È ±â¼úÀ» ´õ¿í Àû±ØÀûÀ¸·Î È°¿ëÇØ¾ß ÇÑ´Ù°í °­Á¶Çß½À´Ï´Ù.


  • Æ®À§ÅÍ
  • ÆäÀ̽ººÏ
  • ¡èÀ§·Î
Copyright ¨Ï Á¶°©Á¦´åÄÄ - ¹«´ÜÀüÀç ¹× Àç¹èÆ÷ ±ÝÁö
´ñ±Û´Þ±â ´ñ±Û¾²±â ÁÖÀÇ»çÇ×

´ñ±Û´Þ±â´Â ·Î±×ÀÎÈÄ »ç¿ëÇÏ½Ç ¼ö ÀÖÀ¸¸ç, ³»¿ëÀº 100ÀÚ À̳»·Î Àû¾îÁֽʽÿÀ. ±¤°í, ¿å¼³, ºñ¼Ó¾î, ÀνŰø°Ý°ú ÇØ´ç ±Û°ú °ü·Ã ¾ø´Â ±ÛÀº »çÀüÅ뺸¾øÀÌ »èÁ¦µË´Ï´Ù.

¿Ö´õÄ«¸£ÅÚÀ»Àú°ÝÇÑ´Ù
ÀÇ·É ¿ì¹ü°ï ¼ø°æ ÃѱⳭ»ç »ç°Ç
¹Ú½Â¿ëÀÇ FREEDOM ±³¾ç ¿µ¾î
¾ö»óÀÍ º¯È£»çÀÇ ¸ø´ÙÇÑ À̾߱â
UFO¿Í ȯ»ýÀ̾߱â
±è¿µÀÇ åëÖåºñÆÇ
 »ï¼º¹è³Ê

PC ¹öÀü