The Latest in IT Security

South Korea Detects Suspected North Korea Hacking Attempt


SEOUL – South Korea detected a suspected North Korean hacking attempt Thursday to steal military data by using a journalist’s notebook computer, defense ministry officials said.

The military cyber warfare command found that a notebook infected with a malicious code was used in a bid to attack the defense ministry’s computer network, a ministry spokesman said.

The notebook belonged to a reporter covering defense, he said, adding notebooks used by reporters are connected to the ministry’s Internet network.

There was no loss of data because the cyber command detected the hacking attempt in advance, the spokesman said.

After retracing the IP of the malicious code, the command concluded that hackers had used a server in Austria, he said.

“We believe the code has been produced by North Korea, or North Korean hackers are behind today’s cyber attack,” the spokesman told AFP.

The tracked server was used on March 20 last year when hackers attacked South Korean financial institutions and broadcasters, he said. At that time South Korea blamed the North’s military for the attack.

In recent years, hackers have used malware deployments and virus-carrying emails for cyber attacks on South Korean military institutions, commercial banks, government agencies, TV broadcasters and media websites.

Investigations into past large-scale cyber assaults have concluded that they originated in North Korea.

The North is believed to run an elite cyber war unit of 3,000 personnel, but it has denied any involvement and accuses Seoul of fabricating the incidents to fan cross-border tensions.

Related:South Korea’s ‘Top Gun’ Cyber Warriors

Related:New Disk Wiping Malware Used in Attacks Against South Korea


© AFP 2013Previous Columns by AFP:South Korea Detects Suspected North Korea Hacking AttemptGlobal Support for Reduction in Govt Control of Web Domain NamesSnowden Sees Turning Point in NSA Reforms Obama Proposes to End NSA Bulk Data Collection Chinas Xi Challenges Obama on Telecoms Spying Report

sponsored links

Tags: Cyberwarfare


Comments are closed.



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments