Attacks/Breaches
7/16/2013
12:58 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Anonymous Not Behind Attacks, South Korea Says

June's online attacks against South Korean government agencies and private businesses trace back to hackers operating from North Korea, not Anonymous, officials say.

South Korean officials have traced June's online attacks against government agencies and private businesses to hackers operating from North Korea, refuting the attackers' claims that they were affiliated with Anonymous.

"We speculate the hacking was done by North Korea," Park Jae-moon, a senior ministry official, said Thursday in a media briefing, reported the BBC. "[A] North Korean IP [address] was found in passages of the malignant codes and some of the damaged organizations. I can say this is the decisive evidence," he said.

Analysis of 82 different versions -- or variants -- of malware recovered after the attacks, multiple IP addresses used by attackers, as well as their tapping South Korean file-sharing sites for hosting exploit code were also consistent with previous cyber attacks that have been traced to Pyongyang, he said.

Those latest online attacks against South Korea began on June 25, 2013 -- the anniversary of the start of the start of the Korean War (1950-53) -- and continued through July 1, officials said. All told, the attacks targeted 69 government-related and private websites in South Korea, including the prime minster's office. Attacked sites, in some cases, sported defacements that read "Great leader Kim Jong-un," referring to the leader of the North Korean regime, which is based in Pyongyang. Officials at South Korea's Science Ministry said that all but about 10% of attacked sites have now been repaired.

[ IT pros have strong opinions on the balance between privacy and security. See NSA Surveillance: IT Pro Survey Says What? ]

"These were meticulously planned attacks that had been prepared at least for several months to find the weak spots of their targets," Park said, reported The New York Times.

In a statement issued Thursday, Korea's Science Ministry said that the attack signatures also correlated with the March 20 wiper malware campaign that erased the hard drives of an estimated 48,000 South Korean PCs at banks and broadcasters, as well as distributed denial-of-service attacks. The attacks were later revealed to be part of a four-year cyber-espionage campaign.

The hackers behind the June attacks had claimed to be affiliated with Anonymous. But South Korean officials said the claimed Anonymous affiliation appeared designed simply to cause confusion. Likewise, official channels of the hacktivist collective had quickly denied the attackers' assertion, with the Japanese branch of Anonymous tweeting: "We didn't Hack any #SouthKorea websites." At the time, in fact, Anonymous -- as part of its ongoing "#OpNorthKorea" campaign -- had been attacking a number of sites affiliated with Pyongyang, including numerous government websites, the airline Air Koryo and multiple business sites.

South Korea traced the last major cyber attack against the country, in March, to Pyongyang after one of the attackers apparently suffered technical difficulties, leading to the IP address being temporarily and accidentally exposed. Officials at the Korea Internet & Security Agency said the IP address was registered to a company called Star Joint Venture (Star JV), which is North Korea's sole service provider.

Prior online attacks against South Korean sites, in 2009 and 2011, were also traced to Pyongyang.

The accusation of launching yet another cyber attack against South Korea isn't this week's only potential political setback for North Korean leader Kim Jong-un, who Thursday was pictured visiting a mushroom farm. Notably, officials in Panama Thursday said they detained a ship flying the North Korean flag, which had departed from Cuba, on suspicion that it was being used to transport drugs. After the ship was stopped, the vessel's captain experienced a heart attack and then attempted to commit suicide, reported the Guardian.

After a partial search of the ship, Panamanian officials said they found, hidden in crates of brown sugar, what they described as "weapons of war" -- including missiles -- being transported in violation of United Nations arms trafficking sanctions against North Korea, which all member states are required to uphold. Police also arrested 35 North Koreans onboard the vessel after they attempted to prevent police from rerouting the vessel into the Atlantic-side port of Manzanillo.

Panama's president, Ricardo Martinelli, later tweeted a picture that showed a long, military-green tube. By late Tuesday morning, his spokesman said police had only completed searching one of the ship's five holds

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web