Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Microsoft/Windows
Cisco UCS Invicta Series flash memory systems
Average Rating:
Rate this article:  
Widespread Cyberattack Hits South Korean Sites
Widespread Cyberattack Hits South Korean Sites

By Jennifer LeClaire
March 20, 2013 11:44AM

    Bookmark and Share
"The attack was first noticed when a number of Web sites began to experience problems," Symantec said in blog post about the cyberattack on South Korea. "Customers of banks could not access their online accounts and reports of other sites being down began to surface." A number of South Korean Web sites had their hard drives wiped by the Trojan virus.
 



South Korea was hit with a cyberattack Wednesday. Specifically, the computer systems at two banks, three major broadcasters and other targets were hit. Some are pointing fingers at North Korea.

According to Symantec, the attack included the defacement of a Korean ISP and telecoms provider and also the crippling of servers belonging to several organizations. The defacement displays an elaborate animated Web page with sound effects, the firm reports, showing three skulls and including a message by the claimed attackers calling themselves the "Whois" team.

"The attack was first noticed when a number of Web sites began to experience problems," Symantec said in blog post. "Customers of banks could not access their online accounts and reports of other sites being down began to surface. While specific details are not known at this time, it has been reported that a number of sites affected had their hard drives wiped, leaving the affected computers in a crippled state."

Wiping Hard Drives

Symantec detects the suspected malware as Trojan Horse/Trojan.Jokra and WS.Reputation.1 and is currently performing a detailed analysis of it. However, the security company can already confirm that the malware performs several actions, including creating a file-mapping object to reference itself, killing two processes related to local antivirus/security product vendors.

The malware also enumerates all drives and begins to overwrite the master boot record and any data stored on it by writing the either the string "PRINCPES" or "HASTATI." This, Symantec said, will wipe all contents of the hard disk. The firm said the threat may also attempt to perform the same wiping actions on any drives attached or mapped to the compromised computer, and forces the computer to reboot by executing "shutdown -r -t 0," which renders the system unusable as the master boot record and contents of the drive are now missing.

"The results of the disk wiping actions are consistent with the major outages reported in that region," Symantec said. "Disk wiping is not a new activity, in a separate incident in August 2012, a number of Middle-Eastern organizations were hit by the W32.Disttrack (Shamoon) threat which caused a similar type of damage by wiping hard disks."

Attacks on Critical Infrastructure

Amrit Williams, CTO of Lancope, said that given previous rhetoric coming from nation-sponsored threats and incidents against government and enterprise targets in the United States, we have entered an era that will be marked by unprecedented attacks on critical infrastructure.

"No matter whether the attacks are originating in North Korea, China or other nation-states, ultimately the U.S. government needs to be accountable for ensuring that services such as critical infrastructure are available and the U.S. thrives," Williams told us. "Today, however, the U.S. is ill-prepared to deal with mainstream malware outbreaks and unsophisticated network intrusions, let alone a highly coordinated attack that would actually justify such a response."
 

Tell Us What You Think
Comment:

Name:

Anonymous:

Posted: 2013-03-22 @ 2:42am PT
This is crazy. I would stay clear of warez, this is where virus' tend to reside.



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Microsoft/Windows
1.   BBM Now Available on Windows Phone
2.   Microsoft Spreads Cortana Abroad
3.   China Puts Microsoft Under the Lens
4.   Win Phone 8.1 Update Already on Way
5.   Yammer Moved to Office 365


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
BlackBerry Messenger Now Available on Windows Phone
BlackBerry's free Messenger chatting and voice app is out of beta and widely available for Windows Phone users, the company said. BBM offers secure messaging, Groups, Voice, Channels and more.
 
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.