2013 South Korea cyberattack

On 20 March 2013, three South Korean television stations and a bank suffered from frozen computer terminals in a suspected act of cyberwarfare.[1] ATMs and mobile payments were also affected. The South Korean communications watchdog, the Korea Communications Commission, raised their alert level on cyber-attacks to three on a scale of five. North Korea has been blamed for similar attacks in 2009 and 2011 and was suspected of launching this attack as well. This attack also came at a period of elevated tensions between the two Koreas, following Pyongyang’s nuclear test on 12 February.[2] South Korean officials linked the incident to a Chinese IP address, which increased suspicion of North Korea as "[i]ntelligence experts believe that North Korea routinely uses Chinese computer addresses to hide its cyber-attacks." [3]

The attacks on all six organizations derived from one single entity. The networks were attacked by malicious codes, rather than distributed denial-of-service (DDoS) attacks as suspected at the beginning. It appeared to have used only hard drive overwrites.[4] This cyberattack “damaged 32,000 computers and servers of media and financial companies.”[5] The Financial Services Commission of South Korea said that Shinhan Bank reported that its Internet banking servers had been temporarily blocked and that Jeju Bank and NongHyup reported that operations at some of their branches had been paralyzed after computers were infected with viruses and their files erased. Woori Bank reported a hacking attack, but said it had suffered no damage. Computer shutdowns also hit companies including the Korean Broadcasting System, Munhwa Broadcasting Corporation, and YTN.[6]

This cyberattack “caused US$750 million in economic damage alone. (Feakin 2013)”[7] Also, “[t]he frequency of cyber attacks by North Korea and rampant cyber espionage activities attributed to China are of great concern to the South Korean government. (Lewis 2013)”[8]

Another similar incident occurred on 25 June 2013. There were apparent hacking attacks on government websites. The incident happened on the 63rd anniversary of the start of the 1950-53 Korean War, which was a war that divided the Korean peninsula. Since the Blue House’s website was hacked, the personal information of a total of 220,000 people, including 100,000 ordinary citizens and 20,000 military personnel, using the “Cheong Wa Dae” website were hacked.[9] The website of the office for Government Policy Co-ordination and some media servers were affected as well.

While multiple attacks were organized by multiple perpetrators, one of the distributed denial-of-service (DDoS) attacks against the South Korean government websites were directly linked to the “DarkSeoul” gang and Trojan.Castov.[10] Malware related to the attack is called "DarkSeoul" in the computer world and was first identified in 2012. It has contributed to multiple previous high-profile attacks against South Korea.

This hacking further speculated that North Korea was responsible for the attacks. It was told by investigators that “an IP address used in the attack matched one used in previous hacking attempts by Pyongyang.”[11] Park Jae-moon, a former director-general at the Ministry of Science, ICT and Future Planning said, “82 malignant codes [collected from the damaged devices] and internet addresses used for the attack, as well as the North Korea's previous hacking patterns," proved that "the hacking methods were the same" as those used in the 20 March cyber attacks.[12]

With this incident, the Korean government publicly announced that they would take charge of the “Cyber Terror Response Control Tower” and along with different ministries, the National Intelligence Service (NIS) will be responsible to build a comprehensive response system using the “National Cyber Security Measures.”[13]

The South Korean government asserted a Pyongyang link in the March cyberattacks, which has been denied by Pyongyang.[14] A 50-year-old South Korean man identified as Mr. Kim is suspected to be involved in the attack.[15]


See also

References

  1. Tania Branigan, "South Korea on alert for cyber-attacks after major network goes down: Computer systems of banks and broadcasters are interrupted, with fingers immediately pointed at North Korea", The Guardian, 20 March 2013.
  2. "Cyber attack hits S Korea websites". 2013-06-25. Retrieved 2019-09-25.
  3. "China IP address link to South Korea cyber-attack". BBC. 21 March 2013. Retrieved September 12, 2016.
  4. "Are the 2011 and 2013 South Korean Cyberattacks Related?". Symantec Security Response. Retrieved 2019-09-25.
  5. Michael Pearson; K.J. Kwon; Jethro Mullen. "Hacking attack on South Korea traced to China". CNN. Retrieved 2019-09-25.
  6. Choe Sang-Hun, "Computer Networks in South Korea Are Paralyzed in Cyberattacks", The New York Times, 20 March 2013.
  7. "Roles for Australia, Canada and South Korea". Mutual Security in the Asia-Pacific: Roles for Australia, Canada and South Korea. McGill-Queen's University Press. 2015. JSTOR j.ctt1jktr6v.
  8. "Roles for Australia, Canada and South Korea". Mutual Security in the Asia-Pacific: Roles for Australia, Canada and South Korea. McGill-Queen's University Press. 2015. JSTOR j.ctt1jktr6v.
  9. "북한의 사이버 공격과 우리의 사이버 안보 상황". 네이버 블로그 | 통일부 공식 블로그 (in Korean). Retrieved 2019-09-25.
  10. "Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War". Symantec Security Response. Retrieved 2019-09-25.
  11. "N Korea 'behind hacking attack'". 2013-07-16. Retrieved 2019-09-25.
  12. 권혜진 (2013-07-16). ""'6·25 사이버공격'도 북한 소행 추정"(종합)". 연합뉴스 (in Korean). Retrieved 2019-09-25.
  13. "보도자료(과학기술정보통신부) | 과학기술정보통신부". www.msit.go.kr. Retrieved 2019-09-25.
  14. Lee Minji (April 10, 2013). "(2nd LD) Gov't confirms Pyongyang link in March cyber attacks". Yonhap News. Retrieved September 7, 2016.
  15. Jeyup S. Kwaak (July 31, 2013). "Seoul Suspects South Korean Tech Executive of Helping North in Cyberattacks". The Wall Street Journal. Retrieved August 3, 2013.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.