ste williams
  • Home
  • Agents
  • Learn
  • New Build
  • Public Key
  • Security Library
  • Tools
  • Daily
  • About Me
  • Reference
    • 100 Open Source Security Tools
    • Country Codes – ISO 3166
    • General Reference
    • Hex Colour Values
    • New System Installs
      • Installs for OSX
      • Installs for Windows
    • Port Numbers 0-1024
    • Public Key
    • Technical Reference
      • ANSI/VT100 Terminal Control Escape Sequences
      • Basic DOS Commands
      • Basic FTP Commands
      • Basic HTML4 Tags
      • Basic NET Commands
      • Basic VI Commands
      • Mac Excel Keyboard Shortcuts
      • OSX Keyboard Shortcuts
      • Papers & Presentations
      • Security Baselines

Pages

  • Agents
  • Home
  • Learn
  • New Build
  • Public Key
  • Security Library
  • Tools
  • Daily
  • About Me
  • Reference
    • 100 Open Source Security Tools
    • Country Codes – ISO 3166
    • General Reference
    • Hex Colour Values
    • New System Installs
      • Installs for OSX
      • Installs for Windows
    • Port Numbers 0-1024
    • Public Key
    • Technical Reference
      • ANSI/VT100 Terminal Control Escape Sequences
      • Basic DOS Commands
      • Basic FTP Commands
      • Basic HTML4 Tags
      • Basic NET Commands
      • Basic VI Commands
      • Mac Excel Keyboard Shortcuts
      • OSX Keyboard Shortcuts
      • Papers & Presentations
      • Security Baselines

Tags

amazon anonymous apple Birgitta Jónsdóttir China crime data destruction ddos ecrime email EMC encryption facebook Google hack hacking IE ipad iphone jailbreak julian assange law loic lulzsec mastercard microsoft mobile phones openleaks password paypal PS3 RSA security skype sniffing snooping Sony stuxnet twitter UK Gov us gov visa website wi-fi wikileaks

South Korean TV and banks paralysed in disk-wipe cyber-blitz

Mar 20, 2013 ~ Written by adm

Banks and TV stations in South Korea have been hit by a debilitating attack on their computer networks.

Three financial instituions – Shinhan, Nonghyup and Jeju – and two insurance firms as well as broadcasters KBS, MBC and YTN have either been partially or completely crippled by malware, it appears, according to South Korean news agency Yonhapnew.


PCs on the networks of TV stations crashed and couldn’t be restarted; some displayed an error message claiming that their boot records had been destroyed, as seen in news coverage here and here. Some reports suggest that images of skulls appeared on some computer screens. The attack started at 1400 local time today.

Telly programmes continue to be transmitted despite the problems. However internet banking and cash machines operated by Shinhan Bank are not functioning. South Korean ISP LG Uplus has also been hit by the assault. Government computer networks remain largely unaffected, according to an official from the National Computing and Information Agency (NCIA). However some important websites, including KCNA and Air Koryo, were rendered temporarily inaccessible.

The authorities are trying to identify the cause of the problem. Files named KBS.exe and MBC.exe, which began circulating last week, could be key components for distributing the disk-wiping malware that apparently brought down the networks. The situation remains confused but already thoughts are turning towards who could have launched the attack; North Korea is emerging as a prime suspect.

“We do not rule out the possibility of North Korea being involved, but it’s premature to say so,” South Korea’s Defence Ministry spokesman Kim Min-seok told the BBC.

Christopher Boyd, senior threat researcher at ThreatTrack Security, commented: “There have been numerous serious attacks on South Korean networks and systems over the last few years, from recent newspaper site defacements and the most recent network attacks to the so-called ‘Ten Days of Rain’ distributed denial-of-service [DDoS] attacks on multiple government sites and the United States Forces Korea in 2011.

“While it’s tempting to attribute these attacks to the North given the current state of play in the region, many attacks are not so easy to pin down: the ‘Ten Days of Rain’ used compromised machines inside South Korea to launch the DDoS attacks.

“In 2009 the JoongAng Daily claimed that a South Korean man allegedly purchased infected games in North Korea, only to take them back home and infect other gamers – using them to DDoS the website of the Incheon International Airport. Recent reports that North Korea itself claims to have been knocked offline by hackers does nothing to clarify the issue, and in this ‘tit-for-tat’ environment we should be wary of attributing any blame until the full facts emerge.”

Some Koreans spread screen grabs of a social-networking website on which a group calling itself the “Whois Team” claimed responsibility for the outages; some captured the crew’s boasts in a video uploaded to YouTube. However LG UPlus Corp, the ISP behind the social network, denied the existence of such pages on its website, Reuters reports.

The attack appears to be wide-ranging, coordinated and targeted at high-profile institutions in South Korea. The South Korean military cyberattack readiness level was raised from three to four on the five-tier system, The Guardian reports. Defence minister Kim Kwan-jin convened a meeting to discuss the attacks.

North Korea was blamed for two previous cyber-attacks against its southern neighbour, in 2009 and 2011, that targeted government agencies and banks. Last week North Korea’s official news agency KCNA blamed the US and its allies for computer hacking attacks against its networks. Political tensions on the Korean peninsular have been running high for weeks since recent rocket and nuclear tests by the North Koreans. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/03/20/south_korea_cyberattack/

Posted in library - Tagged crime, hacking, security
Twitter • Facebook • Delicious • StumbleUpon • E-mail
←
→
Comments are disabled

Recent Posts

  • Android Lollipop 5.0.2 is out, but some Nexus users are still stuck on KitKat 31/12/2014
  • This is what you told us about computer security in 2014 31/12/2014
  • NORKS? Pffft. Infosec bods blame disgruntled insiders for savage Sony hack 30/12/2014
  • South Korea says NUCLEAR WORM is nothing to worry about 30/12/2014
  • 4 Infosec Resolutions For The New Year 30/12/2014
  • Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above? 30/12/2014
  • From Facebook, through iPhones and Androids, to Macs 30/12/2014
  • Gmail falls over after hitting ‘Great Firewall of China’ – report 30/12/2014
  • German minister fingered as hacker ‘steals’ her thumbprint from a PHOTO 30/12/2014
  • German minister photo fingerprint ‘theft’ seemed far too EASY, wail securobods 30/12/2014

Pure Line theme by Theme4Press  •  Powered by WordPress ste williams