Security News > 2011 > May > Evidence Points to N.Korea in Hacker Attack on Bank
http://english.chosun.com/site/data/html_dir/2011/05/04/2011050400576.html The Chosunilbo May 4, 2011 A computer network breakdown on April 12 in agricultural cooperative lender Nonghyup was the result of a cyber attack North Korea's General Bureau of Reconnaissance prepared meticulously for more than seven months, a spokesman for the Seoul Central District Prosecutors' Office said Tuesday. A North Korean source said the bureau's department in charge of technological affairs probably carried out the attack. It reportedly has about 1,000 hackers under its control. The bureau, which consists of six departments and handles operations against South Korea, is believed to have masterminded the sinking of the Navy corvette Cheonan in March last year. According to prosecutors, North Korean hackers planted a virus in a laptop owned by an IBM Korea employee identified as Han last September. After finding out that Han was in charge of the bank's computer network maintenance at subcontractor IBM Korea, the hackers stole Internet Protocol addresses to break into the bank network. They activated the virus and paralyzed the bank servers on April 12, three days before North Korean founder Kim Il-sung's birthday. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
http://english.chosun.com/site/data/html_dir/2011/05/04/2011050400576.html
Related news
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- Hackers increasingly use Winos4.0 post-exploitation kit in attacks (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)