Attacks/Breaches
4/11/2013
09:24 AM
50%
50%

How South Korea Traced Hacker To Pyongyang

Apparent mistake exposed the March bank hacker's IP address, which investigators traced to a North Korean address.

A hacker's technical blunder allowed South Korean investigators to trace back recent attacks against the country's banks and broadcasters to an IP address located in North Korea's capital, Pyongyang.

While the identity of the hacker isn't known, on February 20, the attacker inadvertently exposed his or her IP address (175.45.178.xx) for a few minutes, apparently after experiencing technical difficulties, reported South Korea's Yonhap News Agency.

According to the state-run Korea Internet & Security Agency in Seoul, the IP address was traced to the Ryugyong-dong residential district of Pyongyang. The IP address is registered to a company called Star Joint Venture (Star JV), which is North Korea's sole service provider, and also administers the country's top-level ".kp" domain.

Star JV is a joint venture between the Pyongyang regime that rules North Korea -- officially known as the Democratic People's Republic of Korea (DPRK) -- and Loxley Pacific Company, a Thai company that bills itself as a telecommunications system integration and solutions provider. Bangkok-based Loxley Pacific didn't immediately respond to an emailed request for comment -- sent outside of business hours in Thailand -- about South Korean investigators having attributed the recent bank and broadcaster cyberattacks to a network hosted by Star JV.

[ Tension escalates between North and South Korea. See South Korea Charges Alleged Hackers. ]

Officials at the Korea Internet & Security Agency said that because the IP address exposure appeared to be accidental, they think it's legitimate and wasn't spoofed, reported Yonhap. Furthermore, the IP address was logged 13 times in the course of South Korean investigators cataloging North Korean systems that accessed the attacked South Korean financial firms' systems. They said such access had occurred 1,590 times since June 2012.

The IP address finding has implications beyond just the March 20 wiper malware attacks. "The North Korean IP address made it clear that the North is behind not only the latest hacking but also previous hacking attacks," Kim Seung-joo, a professor at the Graduate School of Information Security at Korea University, told Yonhap.

After three weeks of analysis, South Korean government officials only Wednesday said they'd traced the March 20 malware attacks to North Korea, based not only on the IP addresses and domains used to launch the attacks, but also on the use of relatively outdated hacking tools and malware, much of which had been seen previously only in attacks sponsored by Pyongyang. The attacks, which targeted three South Korean banks and three broadcasters, resulted in disruptions to online banking, mobile banking and ATM networks.

Interestingly, the bank malware attacks were launched shortly after North Korea lost Internet connectivity on March 13 and 14. A statement issued at the time by the Pyongyang-run Korean Central News Agency blamed the outage on a U.S. and South Korean cyberattack, claiming that the DPRK had been targeted by "intensive and persistent virus attacks."

Without a doubt, the outage was atypical. "It should be noted that although North Korea's Internet is small, it is very stable," said Doug Madory, senior research engineer for Renesys, in a blog post. "Until [March 13 and 14], North Korean outages had been very rare."

But it's not clear whether the disruptions resulted from hack attacks launched against North Korean infrastructure, or simply internal glitches. Notably, North Korea only has four networks, all of which are routed by Star JV using a direct link to mainland Chinese service provider China Unicom, as well as via satellite communications provider Intelsat, and the outage affected both.

"Since it affected both Internet transit connections (China Unicom and Intelsat), it stands to reason the disruption was on the North Korean side," Madory said. "So perhaps it was networking equipment deeper in the North Korean network which suffered the outage."

"Was it the result of a cyber attack? Maybe," he said. "It could also have been a power failure, equipment failure or a misconfiguration by a network admin."

In related news, Pyongyang Monday bolstered the country's Internet connectivity by adding another connection to China Unicom, this time via a link to Hong Kong. "The new connection appears to [provide] a third way for traffic to reach the country, although much is unclear," reported journalist Martyn Williams, who maintains the North Korea Tech website. "It's not immediately clear if it represents a third physical connection or [is] only happening on the network level, and at present there's no way to know if it serves as an additional backup or will become an important connection."

A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
4/15/2013 | 2:08:43 AM
re: How South Korea Traced Hacker To Pyongyang
Knowing a thing or two about organizations with multiple connectivity types/carriers, it stands to reason that the North Korean outage was caused on their side.

Now, there are any number of things that can cause an outage - but for two days, sounds a bit out there. What if this was an inside job in order to give DPRK a justification for making an attack?

I figure someone at the console just typed in ATH0 and that's all it took...

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.