National Intelligence Service Seeks Expanded Authority to Investigate Foreign Cyberattacks on Companies

0
2

Key Takeaways

  • South Korea’s National Intelligence Service (NIS) is set to gain legal authority to investigate suspected cyberattacks on private companies even before a foreign‑state link is proven.
  • The amendment to the National Intelligence Service Act adds “economic security” to the NIS’s mandate and expands the powers of its National Cyber Security Center.
  • Rising cyber threats—personal data leaks up 57% year‑on‑year and reported attacks jumping from 640 in 2021 to 1,887 in 2024—drive the reform, with many intrusions taking months to detect.
  • Officials stress the change is intended to counter external threat actors, not to enable domestic surveillance of businesses.
  • Complementary preventive measures, including proactive government inspections and fines of up to 10% of revenue for data‑protection violations, are being introduced by the Personal Information Protection Commission.

Background and Legislative Change
On May 7, the National Assembly’s Intelligence Committee approved a revision to the National Intelligence Service Act that formally incorporates “economic security” into the agency’s statutory duties. The amendment also permits the NIS to respond to cyber incidents that exhibit indicators consistent with attacks by foreign states or international hacking organizations, even when definitive attribution is still pending. This legislative move follows a government‑wide cybersecurity strategy unveiled jointly last year by the Ministry of Science and ICT, the National Security Office, and the intelligence agency, aiming to align legal frameworks with emerging threats to South Korea’s economic stability.

Rationale for Expanded Authority
Officials argue that the current legal constraints hinder timely responses to cyber threats that jeopardize national economic security. Many private‑sector firms fail to detect intrusions quickly, allowing attackers to remain undetected for extended periods. By empowering the NIS to act on suspicion rather than only after conclusive proof of foreign involvement, the government hopes to shorten detection windows, mitigate damage, and protect critical supply‑chain sectors such as information technology, manufacturing, and construction. The move reflects growing concern that delayed breach identification could undermine South Korea’s competitiveness and resilience.

Statistical Overview of Cyber Incidents
Data released by South Korea’s Personal Information Protection Commission show that private‑sector reports of personal data leaks rose to 319 cases in the past year, a 57 % increase from 203 cases the previous year. Simultaneously, cyberattacks targeting companies surged from 640 incidents in 2021 to 1,887 in 2024, according to government statistics. A significant portion of these assaults focused on industries deemed vital to national supply chains. Security firm SK Shieldus estimated that small and midsize enterprises required an average of 106 days to discover a cyber intrusion between 2021 and the most recent year, with some breaches remaining hidden for as long as 700 days. Authorities caution that the reported figures likely represent only a fraction of actual intrusions, as many attacks go unnoticed or undisclosed.

Role of the National Cyber Security Center
Under the revised framework, the National Cyber Security Center (NCSC), which operates under the NIS, will be authorized to monitor potential data‑leak risks and conduct investigations involving private‑sector targets when foreign‑backed cyber activity is suspected. Previously, the agency could intervene only after a clear North Korean or foreign‑state connection had been established. The expanded mandate allows the NCSC to engage earlier in the threat‑lifecycle, facilitating intelligence sharing, technical assistance, and coordination with affected firms while preserving the confidentiality of ongoing investigations.

Limitations of the Previous Framework
Before the amendment, the NIS’s involvement in private‑sector cyber incidents was contingent upon definitive attribution to a hostile foreign actor. This high evidentiary bar often delayed action, giving attackers additional time to exfiltrate data or cause operational disruption. Critics noted that the requirement created a gap in protection for businesses facing sophisticated, state‑sponsored campaigns where attribution is inherently challenging and may take months or years to ascertain. The revised law seeks to close this gap by lowering the threshold to “signs consistent” with such threats.

Government Cybersecurity Strategy Integration
The legislative change is designed to provide the legal backbone for the comprehensive cybersecurity strategy announced last year by the Ministry of Science and ICT, the National Security Office, and the NIS. That strategy emphasized a whole‑of‑government approach, integrating threat intelligence, incident response, and public‑private cooperation. By embedding economic security within the NIS’s mandate, the amendment aligns the agency’s operational capabilities with the broader strategic goals of safeguarding national critical infrastructure and preserving the competitiveness of South Korean industries.

Preventive Measures by the Personal Information Protection Commission
Parallel to the NIS expansion, the Personal Information Protection Commission announced plans to transition toward a prevention‑focused regulatory model. Under the proposed system, the commission would conduct proactive inspections of private‑sector data‑protection practices, aiming to identify vulnerabilities before they are exploited. Companies found to violate information‑security rules could face punitive fines amounting to up to 10 % of their annual revenue. This shift underscores a broader governmental emphasis on pre‑emptive risk management alongside reactive investigative powers.

Expert Perspectives and Oversight Concerns
Kim Hyun‑joong, a researcher at the Institute for National Security Strategy, contended that South Korea’s intelligence apparatus must evolve from its traditional emphasis on military and counterespionage functions toward a broader economic‑security orientation. He warned, however, that such expansion must be accompanied by clear legal delineation of authority, robust democratic oversight by elected officials, and effective collaboration between public and private entities. Without these safeguards, there is a risk of mission creep or erosion of civil liberties, even if the stated intent remains focused on external threats.

Assurance Against Domestic Surveillance
A source familiar with NIS operations sought to allay fears that the new powers would enable domestic spying on businesses. The source clarified that, historically, the agency was barred from acting on suspicions of North Korean or international hacking unless responsibility could be definitively proven. The amendment’s purpose is not to intervene in routine corporate activities but to grant the NIS normal investigative authority concerning external threat actors, thereby allowing timely assistance without overreaching into internal business affairs.

Conclusion and Outlook
The forthcoming expansion of the NIS’s mandate represents a strategic response to an escalating cyber threat landscape that increasingly targets South Korea’s economic core. By lowering the evidentiary bar for intervention, enhancing the capabilities of the National Cyber Security Center, and complementing these measures with proactive data‑protection oversight, the government aims to fortify national economic security while maintaining accountability. As state‑backed hacking groups refine their tactics, the effectiveness of these reforms will depend on sustained intelligence sharing, transparent oversight, and continued partnership between authorities and the private sector—elements that experts deem essential for a resilient and secure digital economy.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here