Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
World Wide Web
Cisco UCS Invicta Series flash memory systems
Average Rating:
Rate this article:  
South Korea Cyber Attacks Remain a Mystery
South Korea Cyber Attacks Remain a Mystery

By Jennifer LeClaire
July 8, 2013 11:11AM

    Bookmark and Share
"Malware that looks for certain conditions [like that used in the South Korean hacking], whether that be keywords contained in documents or actions being taken by security solutions, is nothing new [even for South Korea]. Infecting a public social networking site to distribute super-secret government spyware seems more than a touch unlikely as well."
 



South Korea was hit by a massive cyber attack on in March that wiped out hard drives on tens of thousands of computers. Months later, analysts still are dissecting the attacks and where we go from here.

Although who conducted the attacks remains unclear, the McAfee Research Labs research points to clues left behind confirming that the two groups claiming responsibility were a fabrication to throw investigators off the trail and to mask the true source.

McAfee points to the dropper Trojan, which was primarily used to download the executable that destroyed the systems. The firm suspects that the dropper Trojan was distributed at the time of the attacks via a compromised patch-management server that pretended to run a legit update. McAfee also revealed that a MRP wiper and a remote-access Trojan were part of the cyber scheme.

Staying Under the Radar

We asked Tommy Chin, an analyst at CORE Security, to get his take on the issue. He told us South Korea is being targeted for its classified secrets and points their fingers at the North because of how similar the attack patterns were when compared to previous North Korean cyber-attacks. In short, it's military espionage.

"The United States and South Korean military carry out joint exercises every year. This type of classified information can be intriguing to foreign governments to have in their hands. Attempting to plan the exfiltration of this information can be a time consuming process," Chin said. "In 2009, McAfee said that malware was deployed into a social media Web site used by the South Korean military. After years of reconnaissance and spear-fishing attacks, the attackers finally have enough information to draw topology and connectivity of the internal network security architecture."

Chin points out that with a successful reconnaissance, the design and implementation of "Operation Troy" was as covert as possible. Attackers were able to design a regular expression engine to locate specific documents that contained concise military related keywords for exfiltration. Another feature to note is how the attackers can select which files to download, he said. This gave them the ability to stay under the radar by limiting network traffic. There was also a second piece of code that wiped hard drives based on anti-virus and anti-debugging detection.

"This implementation of a two-piece Trojan horse is state of the art. Not only does it allow the attackers to quietly perform the exfiltration of military secrets, it also wipes evidence based on the detection of its presence," Chin said. "If a computer not connected to the Internet is the protection system for classified military secrets, then people must think... How does the data get to this computer to begin with? It is very likely the machine is connected to some kind of internal network and it's pretty obvious the attackers know of an attack path on the inside." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 World Wide Web
1.   Tor Internet Privacy Service Breached
2.   Amazon Invests $2B To Grow in India
3.   Many Sites Are Studying Consumers
4.   Facebook To Force Use of Messenger
5.   OkCupid Experiments with Daters


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
BlackBerry Messenger Now Available on Windows Phone
BlackBerry's free Messenger chatting and voice app is out of beta and widely available for Windows Phone users, the company said. BBM offers secure messaging, Groups, Voice, Channels and more.
 
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.