Categories
Cybercrime Cybersecurity

Cybercrime in North Korea and the threat to the cryptocurrency industry

North Korea is one of the main perpetrators of the growing threat to cyber security. At least since the attack on Sony Pictures in 2014, the country has been perceived as a major cyber player on the international stage. Since then, Pyongyang has used its hacking skills to circumvent international sanctions and steal funds.

Pyongyang was able to use the captured funds to finance the development of its nuclear and missile program. North Korea also uses cyber operations for (digital) espionage. The targets are wide-ranging: they are directed against universities, human rights organizations and media companies, create discontent or distrust through election fraud and attack critical national infrastructures. The increasing importance of North Korea in the area of cybercrime and cybersecurity is also the reason why we maintain a separate blog post on the topic here.

As an example, a study by Recorded Future’s Insikt Group paints an alarming picture of North Korean cybercrime. These activities, which have increased since 2017, target the cryptocurrency industry and have enabled North Korea to steal an estimated 3 billion dollars in cryptocurrencies.

Categories
Cybercrime Cybersecurity

Iran’s cyber capabilities and hackers

In recent years, Iran has significantly expanded its cyber capabilities and is using them aggressively against Western states. These measures include a variety of attacks ranging from data theft to destructive cyberattacks. Iran’s cyber strategy reflects the country’s overall asymmetric warfare and demonstrates how Tehran uses its limited resources to achieve significant impact.

Categories
Cybercrime Cybersecurity

Hacker activities and espionage from China

As digitalization progresses, the landscape of international security has changed considerably. The activities of state-supported hacker groups in particular are increasingly becoming the focus of global attention. One of these groups, which has become particularly prominent in recent years, operates from China.

These hackers, often directly or indirectly linked to the Chinese government, are known for their efforts to gain technological and economic advantages through cyber attacks. In this blog post, I will address the topic in a casual style.

Categories
Cybercrime Cybersecurity

Russian hackers and their activities

Russian hacker groups are known worldwide for their sophisticated and far-reaching cyberattacks. These groups are often associated with state support and pursue a variety of objectives, including political manipulation, espionage, economic sabotage and disinformation. Their activities have a significant impact on global cyber security and pose a serious threat to state and private organizations.

The Russian hacker ecosystem is a complex and diverse network of actors, platforms and methods that is used for both financially motivated and state-sponsored cyber attacks. The close links between criminal actors and government agencies make this ecosystem particularly dangerous and difficult to combat. An effective defense against these threats requires a deep understanding of the structures and motivations within this ecosystem as well as international cooperation and robust cybersecurity measures.

Categories
Criminal Defense Cybercrime Cybersecurity

The Criminal Liability of DDoS Attacks and Botnets under German Criminal Law

In the age of digital infrastructures, Distributed Denial of Service (DDoS) attacks and the use of botnets have become emblematic of modern cybercrime. While these acts are often discussed in technical or operational terms, their legal dimension—particularly under German criminal law—is both sophisticated and rigorous. This article provides a detailed legal analysis of DDoS attacks and botnets, grounded in German jurisprudence and supported by insights derived from current case law and cybercrime reports.

Categories
Cybercrime Cybersecurity

Cybersecurity: findings from the I-Soon data leak

In an increasingly networked world, cyber espionage is becoming a growing threat. A recently published paper by the German Federal Office for the Protection of the Constitution (BfV) sheds light on the structures and procedures of the APT units of the Chinese company i-Soon. This document, part 1 of the 4-part series “CYBER INSIGHT”, offers first valuable insights into the methods and strategies behind the industrialization of cyber espionage. There are now four parts with in-depth insights.

Categories
Cybercrime

Cyberwar, Disinformation, and Hackbacks: Legal and Strategic Challenges in the Digital Battlespace

The increasing militarization of cyberspace and the rise of disinformation campaigns are reshaping the landscape of national security, law, and public discourse. While terms like “cyberwar” dominate headlines, their legal implications are often murky. At the same time, state responses to cyber threats—notably the controversial notion of “hackbacks”—raise complex questions at the intersection of international law, domestic constitutional limits, and cybersecurity strategy.

This article delves into the tangled terrain of cyber conflict, disinformation, and digital countermeasures, arguing that a nuanced legal and strategic framework is urgently needed.

Categories
Criminal Defense Cybercrime Technology- & IT-Law

Law Enforcement’s Access to the TOR Network: Investigative Techniques and Legal Implications

The TOR (The Onion Router) network, widely used for ensuring anonymous online communication, has been a critical tool for journalists, activists, and whistleblowers. However, its reputation as a secure environment has also made it attractive to criminal organizations. This has put TOR in the crosshairs of law enforcement agencies across the globe. The once seemingly impenetrable network is no longer beyond the reach of investigators, thanks to evolving techniques such as timing attacks, traffic analysis, and international collaboration.

Categories
Criminal Defense Cybercrime

The Challenge of Investigating and Defending Against Cryptomessenger Cases in Germany and Europe

In recent years, law enforcement agencies across Europe have made headlines with high-profile operations targeting encrypted messaging services like EncroChat, ANOM, SkyECC, and more recently, Ghost. These services, which were primarily used by organized criminal networks, have posed significant challenges for both investigators and defense attorneys.

The takedown of these platforms has led to the capture of massive amounts of data, often including millions of messages that were previously thought to be inaccessible due to advanced encryption. While these operations, like “Project Overclock,” have been celebrated as major successes in the fight against organized crime, they also raise significant concerns, particularly when it comes to the rights of defendants and the difficulties their legal teams face.

Categories
Criminal Defense Cybercrime Cybersecurity Technology- & IT-Law

Current Overview of Hackbacks in Germany: Political Debates, Legal Status, and Planned Legislation

Hackbacks, also known as “active cyber defense,” involve measures where a cyber attack on IT systems is actively countered by attacking the target system of the attacker. The goal of a hackback is to stop the original attacker, restore data, or prevent further damage. This can involve infiltrating the attacker’s IT infrastructure, deleting malicious software, or even physically impairing hardware.