Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Posted on November 10, 2025November 10, 2025 By CWS

The Australian authorities introduced sanctions in opposition to 4 entities and a person believed to be concerned in cybercriminal actions supporting North Korea’s weapons packages.

“The Australia Authorities is taking this motion with the US to use strain on North Korea’s unlawful income technology networks and handle its persistent challenges to safety and stability,” International Minister Penny Wong stated.

The monetary sanctions, accompanied by journey bans, goal entities believed to have deep hyperlinks with North Korea’s malicious cyber actions, comparable to cryptocurrency theft, fraudulent IT employee schemes, and espionage.

In early October, blockchain evaluation agency Elliptic estimated that North Korean hackers stole over $2 billion in cryptocurrency throughout the first 9 months of 2025.

“Australia will proceed to work with worldwide companions to answer malicious cyber exercise, promote the framework for accountable state habits in our on-line world and preserve Australians secure,” Wong stated.

The minister additionally known as on North Korea to adjust to the United Nations Safety Council (UNSC) resolutions to desert its weapons packages irreversibly.

The sanctions have been introduced shortly after the US imposed sanctions in opposition to a gaggle of bankers, monetary establishments, and others allegedly concerned in laundering cash for North Korean cybercriminals.

Pyongyang, the Treasury Division stated, is laundering funds from illicit cyber actions by means of a community of banking representatives, monetary establishments, and shell firms, primarily in North Korea, China, and Russia.Commercial. Scroll to proceed studying.

Final week, the Treasury’s Workplace of International Belongings Management (OFAC) added North Korean nationals Choe Chun Pom, Han Hong Gil, Ho Jong Son, Ho Yong Chol, Jang Kuk Chol, Jong Sung Hyok, Ri Jin Hyok, and U Yong Su to its listing of sanctioned people.

OFAC additionally sanctioned North Korean organizations Korea Mangyongdae Pc Expertise Company and Ryujong Credit score Financial institution, and listed 53 cryptocurrency addresses linked to cybercriminal and espionage actions.

Associated: North Korea’s Pretend Recruiters Feed Stolen Knowledge to IT Staff

Associated: US Sanctions Russian Nationwide, Chinese language Agency Aiding North Korean IT Staff

Associated: US Targets North Korea’s Illicit Funds: $15M Rewards Provided as American Girl Jailed in IT Employee Rip-off

Associated: US Storms 29 Laptop computer Farms in Crackdown on North Korean IT Employee Schemes

Security Week News Tags:Australia, Hackers, Koreas, North, Program, Sanctions, Supporting, Weapons

Post navigation

Previous Post: Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges
Next Post: QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland

Related Posts

Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files Security Week News
Ransomware Gang Leaks Alleged Kettering Health Data Security Week News
HoundBytes Launches Automated Security Analyst Security Week News
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities Security Week News
Docker Desktop Vulnerability Leads to Host Compromise Security Week News
European Airport Disruptions Caused by Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News