Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Report: The US has been hacking the hackers in North Korea for years

When President Obama last month blamed North Korea for hacking into the network of Sony Pictures, a lot of computer security experts were skeptical. They said that the evidence the FBI released linking Pyongyang to the attacks was flimsy.

Why was the US so confident that North Korea was responsible? The New York Times suggests a reason: the National Security Agency had infiltrated North Korean networks long before the Sony hacks, and so was able to directly observe the activities of North Korean hackers. But they didn’t want to admit this publicly and tip off the North Korean regime.

The Times relies primarily on comments from anonymous sources with knowledge of US intelligence operations. It also references a newly leaked NSA document that was recently published by the German newspaper Spiegel.

According to the Times, the United States has been infiltrating the North Korean regime since 2010. Initially, the NSA focused on monitoring North Korea’s nuclear and missile programs. But as the Hermit Kingdom has ramped up its overseas hacking operations — including an attack on South Korean banks in 2013, the NSA began to focus more on cyberattacks.

Still, the NSA wasn’t watching closely enough to warn Sony about North Korean attacks, which had reportedly been under way since September. The Obama administration only began investigating the attack after it was made public a few days before Thanksgiving.

Technology
Apple is trying to make your phone usable as a phone againApple is trying to make your phone usable as a phone again
Technology

You should turn on the new scam-busting iPhone feature right now.

By Adam Clark Estes
Future Perfect
AI can now stalk you with just a single vacation photoAI can now stalk you with just a single vacation photo
Future Perfect

Artificial intelligence could weaponize the data we’ve been sharing for decades.

By Kelsey Piper
Technology
Amazon would like you to hand over your palm print, pleaseAmazon would like you to hand over your palm print, please
Technology

What to know about the tech giant’s growing biometric business.

By Adam Clark Estes
Future Perfect
One chilling forecast of our AI future is getting wide attention. How realistic is it?One chilling forecast of our AI future is getting wide attention. How realistic is it?
Future Perfect

Rapid changes from AI may be coming far faster than you imagine.

By Kelsey Piper
Technology
Turn off your read receipts. They’re dangerous.Turn off your read receipts. They’re dangerous.
Technology

These days, bad manners aren’t the only reason read receipts are a bad idea.

By Adam Clark Estes
Technology
How to fight back in the war against spam textsHow to fight back in the war against spam texts
Technology

Remember: You’re smarter than the scammers.

By Adam Clark Estes