Feeds

Hackers mock North Korea heir-apparent birthday boy

Kim minor gets roasted

Secure remote control for conventional and virtual desktops

Hackers compromised North Korean media profiles on Saturday to mock the country's heir apparent, Kim Jong Un, on his birthday.

North Korea's YouTube channel was commandeered to post satirical footage depicting a caricature of Kim Jong Un at the wheel of a luxury sports car and out of control, mowing down women and children at the side of the road.

The hermit kingdom's Twitter account was also compromised to post criticism of current leader, Kim Jong Il, for lavishing cash on a nuclear weapons programme when "while 3 million people are starving and freezing to death". Other fake micro-blogging updates urged an armed uprising.

It's unclear who carried out the string of attacks, but hackers from South Korea are the obvious primary suspects. Several members of a South Korean internet forum, Dcinside, have claimed responsibility for the prank, Reuters reports.

Kim Jong Un, 28, appeared at a military parade dressed in a general's uniform last September. Observers saw this as a clear sign that he would take over from his father, Kim Jong Il, once Dear Leader kicks the bucket.

Official state media omitted any reports of celebratory events to mark the younger Kim’s birthday. It seems the occasion was marked only via the broadcast of patriotic radio tunes by state radio, about the only media outlet most ordinary North Korean citizens can access. Internet access in the country is reportedly restricted to senior government officials. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.