Could the US Use A Cyber Attack To Take Down N. Korea?

The intense clash between Donald Trump and Kim Jong-un continues to heat up and, with no sign of it abating, war looks inevitable.

Both sides have shown off their military and nuclear might, but is it possible to stop this war before it starts with a few clicks of a button? Matt Morris, vice president of strategy and products at cybersecurity company NexDefense, thinks a cyberattack might be the way forward.

He said: ‘This would undoubtedly represent a better option than wide-scale conventional, or nuclear attack. But, is it truly feasible?

‘There were two precision cyber security weapons developed around the same time when the US and Israel felt compelled to intervene into the Iran’s rapidly progressing nuclear program.

‘These two digital weapons, Stuxnet and Stuxnet 2.0, are believed to have been developed around 2009 or early 2010.’

Stuxnet was credited for successfully taking down the centrifuges being used by Iran to enrich uranium, says Matt. Since then, Stuxnet has been widely discussed and debated, celebrated and bemoaned by experts and critics all over the globe.

But Stuxnet’s brother, Stuxnet 2.0, has largely gone undiscovered since that time.

He continued: ‘Stuxnet 2.0 was designed to work with the same type of Siemens industrial control systems used to monitor and control centrifuges. According to reports, it is believed that both the Iranian and North Korean nuclear programs leverage the same general equipment and that Stuxnet 2.0 is simply waiting to activate once it detected Korean-language settings.’

But Matt said it’s now clear that North Korea is in a different phase of development versus where Iran was at the time.

He said: ‘US National security adviser has stated that “all options” are on the table, and it is clear that cyber security remains one of those options.

‘But given that North Korea does not connect most of its infrastructure to the outside world virtually ensures that there will not be a situation where the US can disarm them with a simple mouse click or two.’

However, citing King’s College in London, Matt explained that the US may have already leveraged its cyber capabilities before to seriously impeding North Korea’s mid-range ballistic missiles, leading to an estimated 88 per cent failure rate.

‘The bottom line is that the US is dealing with a different, more technically savvy and sophisticated foe with North Korean,’ he added.

‘But considering some level of success increasing failure rates for arms, it is possible that Stuxnet 2.0 or other similar types of future precision cyberattack may be already be partially achieving their ultimate goal.

‘If the US, though cyber means, is able to introduce uncertainty and doubt about whether or not North Korean’s missiles will even fire properly if and when the time comes, this could be hailed as a major success.’

Metro

You Might Also Read:

N. Korea Will Unleash Cyber Attacks On The US:

US Conducts Computer War Games in Response to North Korea Missile Launch:

 

 

« Was The German Election Hacked?
Ransomware Analysis Suggests A Bleak Future »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.