Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Build Apps 5x Faster
For Half the Cost
Enterprise Cloud Computing

On Force.com
Apple/Mac
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
South Korea Cyber Attacks Remain a Mystery

South Korea Cyber Attacks Remain a Mystery
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

"Malware that looks for certain conditions [like that used in the South Korean hacking], whether that be keywords contained in documents or actions being taken by security solutions, is nothing new [even for South Korea]. Infecting a public social networking site to distribute super-secret government spyware seems more than a touch unlikely as well."
 


South Korea was hit by a massive cyber attack on in March that wiped out hard drives on tens of thousands of computers. Months later, analysts still are dissecting the attacks and where we go from here.

Although who conducted the attacks remains unclear, the McAfee Research Labs research points to clues left behind confirming that the two groups claiming responsibility were a fabrication to throw investigators off the trail and to mask the true source.

McAfee points to the dropper Trojan, which was primarily used to download the executable that destroyed the systems. The firm suspects that the dropper Trojan was distributed at the time of the attacks via a compromised patch-management server that pretended to run a legit update. McAfee also revealed that a MRP wiper and a remote-access Trojan were part of the cyber scheme.

Staying Under the Radar

We asked Tommy Chin, an analyst at CORE Security, to get his take on the issue. He told us South Korea is being targeted for its classified secrets and points their fingers at the North because of how similar the attack patterns were when compared to previous North Korean cyber-attacks. In short, it's military espionage.

"The United States and South Korean military carry out joint exercises every year. This type of classified information can be intriguing to foreign governments to have in their hands. Attempting to plan the exfiltration of this information can be a time consuming process," Chin said. "In 2009, McAfee said that malware was deployed into a social media Web site used by the South Korean military. After years of reconnaissance and spear-fishing attacks, the attackers finally have enough information to draw topology and connectivity of the internal network security architecture."

Chin points out that with a successful reconnaissance, the design and implementation of "Operation Troy" was as covert as possible. Attackers were able to design a regular expression engine to locate specific documents that contained concise military related keywords for exfiltration. Another feature to note is how the attackers can select which files to download, he said. This gave them the ability to stay under the radar by limiting network traffic. There was also a second piece of code that wiped hard drives based on anti-virus and anti-debugging detection.

"This implementation of a two-piece Trojan horse is state of the art. Not only does it allow the attackers to quietly perform the exfiltration of military secrets, it also wipes evidence based on the detection of its presence," Chin said. "If a computer not connected to the Internet is the protection system for classified military secrets, then people must think... How does the data get to this computer to begin with? It is very likely the machine is connected to some kind of internal network and it's pretty obvious the attackers know of an attack path on the inside." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Apple/Mac
1.   Apple Stock Soars Ahead of iPhone 6
2.   Popular Mailbox App Comes to Mac
3.   Apple Opens China iCloud Data Center
4.   Android Crushing Smartphone Rivals
5.   Apple Bans Toxic Factory Chemicals


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 

Mobile Technology Spotlight
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 
Samsung, B&N Target Amazon with Nook Tablet
They've seen the enemy and it is Amazon. So Samsung and Barnes & Noble are teaming up to combat their common foe with a 7-inch tablet that blends Samsung’s tech, Nook’s content and e-reader platform.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.