Attacks/Breaches
4/11/2013
09:24 AM
50%
50%

How South Korea Traced Hacker To Pyongyang

Apparent mistake exposed the March bank hacker's IP address, which investigators traced to a North Korean address.

A hacker's technical blunder allowed South Korean investigators to trace back recent attacks against the country's banks and broadcasters to an IP address located in North Korea's capital, Pyongyang.

While the identity of the hacker isn't known, on February 20, the attacker inadvertently exposed his or her IP address (175.45.178.xx) for a few minutes, apparently after experiencing technical difficulties, reported South Korea's Yonhap News Agency.

According to the state-run Korea Internet & Security Agency in Seoul, the IP address was traced to the Ryugyong-dong residential district of Pyongyang. The IP address is registered to a company called Star Joint Venture (Star JV), which is North Korea's sole service provider, and also administers the country's top-level ".kp" domain.

Star JV is a joint venture between the Pyongyang regime that rules North Korea -- officially known as the Democratic People's Republic of Korea (DPRK) -- and Loxley Pacific Company, a Thai company that bills itself as a telecommunications system integration and solutions provider. Bangkok-based Loxley Pacific didn't immediately respond to an emailed request for comment -- sent outside of business hours in Thailand -- about South Korean investigators having attributed the recent bank and broadcaster cyberattacks to a network hosted by Star JV.

[ Tension escalates between North and South Korea. See South Korea Charges Alleged Hackers. ]

Officials at the Korea Internet & Security Agency said that because the IP address exposure appeared to be accidental, they think it's legitimate and wasn't spoofed, reported Yonhap. Furthermore, the IP address was logged 13 times in the course of South Korean investigators cataloging North Korean systems that accessed the attacked South Korean financial firms' systems. They said such access had occurred 1,590 times since June 2012.

The IP address finding has implications beyond just the March 20 wiper malware attacks. "The North Korean IP address made it clear that the North is behind not only the latest hacking but also previous hacking attacks," Kim Seung-joo, a professor at the Graduate School of Information Security at Korea University, told Yonhap.

After three weeks of analysis, South Korean government officials only Wednesday said they'd traced the March 20 malware attacks to North Korea, based not only on the IP addresses and domains used to launch the attacks, but also on the use of relatively outdated hacking tools and malware, much of which had been seen previously only in attacks sponsored by Pyongyang. The attacks, which targeted three South Korean banks and three broadcasters, resulted in disruptions to online banking, mobile banking and ATM networks.

Interestingly, the bank malware attacks were launched shortly after North Korea lost Internet connectivity on March 13 and 14. A statement issued at the time by the Pyongyang-run Korean Central News Agency blamed the outage on a U.S. and South Korean cyberattack, claiming that the DPRK had been targeted by "intensive and persistent virus attacks."

Without a doubt, the outage was atypical. "It should be noted that although North Korea's Internet is small, it is very stable," said Doug Madory, senior research engineer for Renesys, in a blog post. "Until [March 13 and 14], North Korean outages had been very rare."

But it's not clear whether the disruptions resulted from hack attacks launched against North Korean infrastructure, or simply internal glitches. Notably, North Korea only has four networks, all of which are routed by Star JV using a direct link to mainland Chinese service provider China Unicom, as well as via satellite communications provider Intelsat, and the outage affected both.

"Since it affected both Internet transit connections (China Unicom and Intelsat), it stands to reason the disruption was on the North Korean side," Madory said. "So perhaps it was networking equipment deeper in the North Korean network which suffered the outage."

"Was it the result of a cyber attack? Maybe," he said. "It could also have been a power failure, equipment failure or a misconfiguration by a network admin."

In related news, Pyongyang Monday bolstered the country's Internet connectivity by adding another connection to China Unicom, this time via a link to Hong Kong. "The new connection appears to [provide] a third way for traffic to reach the country, although much is unclear," reported journalist Martyn Williams, who maintains the North Korea Tech website. "It's not immediately clear if it represents a third physical connection or [is] only happening on the network level, and at present there's no way to know if it serves as an additional backup or will become an important connection."

A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
4/15/2013 | 2:08:43 AM
re: How South Korea Traced Hacker To Pyongyang
Knowing a thing or two about organizations with multiple connectivity types/carriers, it stands to reason that the North Korean outage was caused on their side.

Now, there are any number of things that can cause an outage - but for two days, sounds a bit out there. What if this was an inside job in order to give DPRK a justification for making an attack?

I figure someone at the console just typed in ATH0 and that's all it took...

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.