Feeds

Anons: We milked Norks dry of missile secrets, now we'll spaff it online

North Korea military uses computers? AS IF, sniff experts

The Essential Guide to IT Transformation

Shadowy hacking collective Anonymous has claimed it will leak a huge cache of confidential documents from North Korea's missile programme.

Although experts warned that the Norks were unlikely to store such sensitive data digitally, the hacktivists claimed to have purloined masses of secret military files. The Anons have vowed to publish the material on 25 June, the anniversary of the beginning of the Korean War.

In a statement, Anonymous hackers claimed they had opened a "ninja gateway" into Nork servers, allowing them to "hack their s**t", "liberate their data" as well as "win public opinion and support for the upcoming citizen's uprising".

Anonymous stated: "Previously we said we would penetrate the intranet and private networks of North Korea. And we were successful. We are not a threat to the world peace like your government. We do not forcing ourselves [sic] like your government. We will no longer abide by your ways of ruling, we work toward world peace and for the Republic of Korea. Oh good people of North Korea, it is time to wake up. Soon you will experience a new culture, and your worthless leadership will be recognised by everyone. Come and join us!"

The collective also attacked the poverty-stricken hermit nation - led by ridiculous boy-king Kim Jong-un - for pulling out of talks with the South. The Anons added: “You cannot destroy ideas with missiles. You end talks by placing the blame on the Republic of Korea. And the price of your error will be costly and placed upon you.”

Jason Healey, director of the Cyber Statecraft Initiative at the Atlantic Council, said he had doubts about whether Anonymous would have access to missile documents. He tweeted:

Anonymous targeted North Korea in April this year, hacking into a propaganda site called Uriminzokkiri and other Nork government sites. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.