Hackers Extort S. Korea for Data on Nuclear Plants

A hacker who had posted inside information on South Korea’s nuclear power plants has made a fresh threat, demanding money in exchange for not handing over sensitive information to third countries. 

32535665.si.jpgThe hacker had posted files, including documents about the country’s indigenous advanced power reactor, on Twitter.
Using an account under the name of the president of an anti-nuclear group in Hawaii, the hacker posted additional files on Twitter, which reportedly included documents concerning the country’s indigenous advanced power reactor 1400.

“Need money. Only need to meet some demands… Many countries from Northern Europe, Southeast Asia and South America are saying they will buy nuclear reactor information. Fear selling the entire information will undermine President Park (Geun-hye)’s efforts to export nuclear reactors,” the posting said.

The hacker did not say how much money he wanted but warned that South Korea will end up losing much more if it tries to save a few hundreds of millions of dollars.

Officials from the Korea Hydro & Nuclear Power Co. (KHNP) said the documents released Thursday did not include any sensitive information and that they may have been obtained before the company boosted its security measures early last year that included completely cutting off its internal servers used to operate nuclear reactors from all outside access.
They earlier said they were not able to determine the nature or sensitivity of the released documents as safety protocol was blocking the downloading or opening of the files. 

The latest posting marked the sixth of its kind since Dec. 15. Then, a hacker who leaked information about South Korea’s nuclear plants online demanded money for not handing over sensitive information about the plants to other countries. 
The attacker had earlier demanded that KHNP shut down some of its reactors and had threatened to "bring destruction" to the power plants unless his demand was met before Christmas.

South Korea's government accused North Korea Tuesday of carrying out cyber-attacks last December on its nuclear power plant operator, describing them as a provocation, which threatened people's lives and safety.

"It's a clear provocation against our security," the unification ministry said after investigators concluded that the North was behind the attacks.

 “The malicious codes used for the nuclear operator hacking were the same in composition and working methods as the so-called ‘kimsuky’ malware that North Korean hackers use.” read a statement issued by the Republic of Korea’s Seoul Central District Prosecutor’s Office.

Recently hackers have targeted several times critical infrastructure of the South Korea, documents relates to part of the blueprints of nuclear power plants, including the hot water systems of the reactors at the Kori nuclear power plant in Gori, were blueprints of nuclear power plants, including the hot water systems of the reactors at the Kori nuclear power plant in Gori, were leaked via a Twitter account named “Who am I = No Nuclear Power.” 

Stolen data also included set of technical data and documents on reactor design. The attacker had earlier demanded that KHNP shut down some of its reactors and had threatened to "bring destruction" to the power plants unless his demand was met before Christmas. The hacker also threatened to launch 9,000 viruses as an attack against KHNP, which had reportedly found 7,000 viruses before.

"Since the so-called anti-nuclear group made its fifth release of information on Dec. 23, no cyber-attack or information leak has taken place while the documents released today appear to have been obtained long before," the company said in a press release, according to Yonhap. 

Among the information released recently was also the transcript of a telephone conversation between the South Korean president and UN Secretary General Ban Ki-moon.

ibtimes         koreatimes us edition        security affairs         independent      economic times  
 

 

« Latest Insurance Hack Affects 11 Million Customers
Anonymous and Security Agencies: Bedfellows for Good Against ISIS? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.