Feeds

Attack of the CYBER NORKS! Pyongyang in frontal assault online

Jong-un's a WRONG 'UN, claim southerners

Seven Steps to Software Security

As the Korean peninsula flirts with supposed nuclear war, North Korea has been accused of launching cyber-attacks on banks and TV broadcasters in the south.

Investigators in Seoul said Pyongyang was behind the hacking of tens of thousands of computers last month.

Tension is already running high on the peninsula after North Korea, claiming to be angered by joint military exercises between the south and America, warned foreigners to leave before the start of a “thermonuclear war”.

The South Korean government has already warned there is a “high risk” that its crazed and dictatorial neighbour would launch a ballistic missile in the coming days, though no reputable analysts believe that the DPRK has yet managed to develop a nuclear warhead for its missiles.

The South Korean Ministry of Science, ICT and Future Planning said the cyber attacks were carried out by the Reconnaissance General Bureau, a North Korean intelligence agency rumoured to have set up a crack formation made up of thousands of cyber warfare top guns.

The ministry said:

“The attacker gained control of personal computers or server computers within the target organizations at least eight months ago.

“After maintaining monitoring activities, [the attackers] sent out the command to delete data stored in the server, and distributed malware to individual computers through the central server.”

In response to the news, the ministry announced plans to hold an emergency cyber security conference on Thursday.

The attack command came on 20 March, when the networks and websites of broadcasters KBS, MBC and YTN were crippled and brought offline. Three banks - Shinhan, Jeju and Nonghyup - were also attacked during the blitz, which struck some 48,000 machines. All three were forced to halt operations, although South Korea's Financial Services Commission insisted that no personal information or banking details were compromised.

Investigators traced the attack on the banks to six computers in North Korea, which had accessed the banks’ networks more than 1,590 times since June 2012.

Of the 76 malware samples recovered from the hacked computers, 30 had been used in previous attacks by the Democratic People's Republic of Korea. Researchers also found that 22 of the 49 IP addresses used during the attacks had previously been involved in similar incidents.

North Korea has already been blamed for an attempt to block access to the South Korean presidential website and hacks on the Korea Joongang newspaper and the Nonghyup bank.

One South Korean commentator warned that the more-developed southern nation's cyber-defences were insufficient to block North Korean attacks.

Writing in Korea Joongang, Chae In-taek said:

"South Korea cannot cope with unpredictable and sophisticated provocations from North Korea with a bureaucratic, rigid mindset.

"National security cannot be assured through an outdated system. We must come up with an innovative security system fast."

Although Kim Jong-un normally likes to broadcast videos of himself trying out the latest Nork military tech, Pyongyang has not yet commented on the cyberattack claims. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.