Security News > 2011 > May > Evidence Points to N.Korea in Hacker Attack on Bank

http://english.chosun.com/site/data/html_dir/2011/05/04/2011050400576.html The Chosunilbo May 4, 2011 A computer network breakdown on April 12 in agricultural cooperative lender Nonghyup was the result of a cyber attack North Korea's General Bureau of Reconnaissance prepared meticulously for more than seven months, a spokesman for the Seoul Central District Prosecutors' Office said Tuesday. A North Korean source said the bureau's department in charge of technological affairs probably carried out the attack. It reportedly has about 1,000 hackers under its control. The bureau, which consists of six departments and handles operations against South Korea, is believed to have masterminded the sinking of the Navy corvette Cheonan in March last year. According to prosecutors, North Korean hackers planted a virus in a laptop owned by an IBM Korea employee identified as Han last September. After finding out that Han was in charge of the bank's computer network maintenance at subcontractor IBM Korea, the hackers stole Internet Protocol addresses to break into the bank network. They activated the virus and paralyzed the bank servers on April 12, three days before North Korean founder Kim Il-sung's birthday. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
http://english.chosun.com/site/data/html_dir/2011/05/04/2011050400576.html
Related news
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- North Korea targets crypto developers via NPM supply chain attack (source)
- whoAMI attacks give hackers code execution on Amazon EC2 instances (source)
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)