An active-duty officer charged with hacking a military computer network after being bought by a North Korean agent after being bought with bitcoin was revealed to have tried to hand over the operational plan of the North Korean leader's removal operation.



According to the indictment of 29-year-old Army Captain A, obtained by National Strength Rep. Kang Dae-sik, Captain A recorded the operation plan of his brigade in early February this year with his mobile phone and sent it to a North Korean agent who was introduced by a civilian acquaintance.



Captain A was a member of the special forces unit that carried out the operation to remove the North Korean leadership, so-called 'beheading operation', among the Special Operations Command, and served until his arrest.



Initially, the North Korean agents requested the brigade and battalion operation plans, but the military prosecutors understood that Captain A transmitted the regional operation plans that he could access.



Captain A is known to have leaked 5 more confidential cases, including 'Army security rules', in addition to the regional unit's operational plan.



Afterwards, Captain A was caught while following the order to install equipment for hacking the South Korean military's joint command and control system, that is, a 'poison tap'.



Captain A received about 48 million won worth of bitcoin from a North Korean agent, leaked military secrets, and even attempted to hack the military's core computer network, the military prosecutor's office identified.



It was mentioned in the indictment that Captain A did not have direct contact with the North Korean agent, but communicated through a telegram that was connected through an acquaintance.



The North Korean agent identified himself only as a 'Korean-Chinese broker', did not disclose his name, and only exposed the Telegram ID 'Boris' to Captain A.



Boris is a sub-organization of 'Research Center 110', a cyber division under the Reconnaissance General Bureau of North Korea's South Korea Operations Department, operates an illegal cyber gambling organization, and is recorded in the indictment as an agent belonging to the North Korean hacker unit that recruits active-duty soldiers to collect South Korean military secrets. That's it.



Meanwhile, as a result of an emergency security check conducted by the military authorities after the incident of Captain A, more than 300 cases of loss of secrets were discovered in about 400 operational units.