Attacks/Breaches
7/16/2013
12:58 PM
Connect Directly
RSS
E-Mail
50%
50%

Anonymous Not Behind Attacks, South Korea Says

June's online attacks against South Korean government agencies and private businesses trace back to hackers operating from North Korea, not Anonymous, officials say.

South Korean officials have traced June's online attacks against government agencies and private businesses to hackers operating from North Korea, refuting the attackers' claims that they were affiliated with Anonymous.

"We speculate the hacking was done by North Korea," Park Jae-moon, a senior ministry official, said Thursday in a media briefing, reported the BBC. "[A] North Korean IP [address] was found in passages of the malignant codes and some of the damaged organizations. I can say this is the decisive evidence," he said.

Analysis of 82 different versions -- or variants -- of malware recovered after the attacks, multiple IP addresses used by attackers, as well as their tapping South Korean file-sharing sites for hosting exploit code were also consistent with previous cyber attacks that have been traced to Pyongyang, he said.

Those latest online attacks against South Korea began on June 25, 2013 -- the anniversary of the start of the start of the Korean War (1950-53) -- and continued through July 1, officials said. All told, the attacks targeted 69 government-related and private websites in South Korea, including the prime minster's office. Attacked sites, in some cases, sported defacements that read "Great leader Kim Jong-un," referring to the leader of the North Korean regime, which is based in Pyongyang. Officials at South Korea's Science Ministry said that all but about 10% of attacked sites have now been repaired.

[ IT pros have strong opinions on the balance between privacy and security. See NSA Surveillance: IT Pro Survey Says What? ]

"These were meticulously planned attacks that had been prepared at least for several months to find the weak spots of their targets," Park said, reported The New York Times.

In a statement issued Thursday, Korea's Science Ministry said that the attack signatures also correlated with the March 20 wiper malware campaign that erased the hard drives of an estimated 48,000 South Korean PCs at banks and broadcasters, as well as distributed denial-of-service attacks. The attacks were later revealed to be part of a four-year cyber-espionage campaign.

The hackers behind the June attacks had claimed to be affiliated with Anonymous. But South Korean officials said the claimed Anonymous affiliation appeared designed simply to cause confusion. Likewise, official channels of the hacktivist collective had quickly denied the attackers' assertion, with the Japanese branch of Anonymous tweeting: "We didn't Hack any #SouthKorea websites." At the time, in fact, Anonymous -- as part of its ongoing "#OpNorthKorea" campaign -- had been attacking a number of sites affiliated with Pyongyang, including numerous government websites, the airline Air Koryo and multiple business sites.

South Korea traced the last major cyber attack against the country, in March, to Pyongyang after one of the attackers apparently suffered technical difficulties, leading to the IP address being temporarily and accidentally exposed. Officials at the Korea Internet & Security Agency said the IP address was registered to a company called Star Joint Venture (Star JV), which is North Korea's sole service provider.

Prior online attacks against South Korean sites, in 2009 and 2011, were also traced to Pyongyang.

The accusation of launching yet another cyber attack against South Korea isn't this week's only potential political setback for North Korean leader Kim Jong-un, who Thursday was pictured visiting a mushroom farm. Notably, officials in Panama Thursday said they detained a ship flying the North Korean flag, which had departed from Cuba, on suspicion that it was being used to transport drugs. After the ship was stopped, the vessel's captain experienced a heart attack and then attempted to commit suicide, reported the Guardian.

After a partial search of the ship, Panamanian officials said they found, hidden in crates of brown sugar, what they described as "weapons of war" -- including missiles -- being transported in violation of United Nations arms trafficking sanctions against North Korea, which all member states are required to uphold. Police also arrested 35 North Koreans onboard the vessel after they attempted to prevent police from rerouting the vessel into the Atlantic-side port of Manzanillo.

Panama's president, Ricardo Martinelli, later tweeted a picture that showed a long, military-green tube. By late Tuesday morning, his spokesman said police had only completed searching one of the ship's five holds

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.