Could the US Use A Cyber Attack To Take Down N. Korea?

The intense clash between Donald Trump and Kim Jong-un continues to heat up and, with no sign of it abating, war looks inevitable.

Both sides have shown off their military and nuclear might, but is it possible to stop this war before it starts with a few clicks of a button? Matt Morris, vice president of strategy and products at cybersecurity company NexDefense, thinks a cyberattack might be the way forward.

He said: ‘This would undoubtedly represent a better option than wide-scale conventional, or nuclear attack. But, is it truly feasible?

‘There were two precision cyber security weapons developed around the same time when the US and Israel felt compelled to intervene into the Iran’s rapidly progressing nuclear program.

‘These two digital weapons, Stuxnet and Stuxnet 2.0, are believed to have been developed around 2009 or early 2010.’

Stuxnet was credited for successfully taking down the centrifuges being used by Iran to enrich uranium, says Matt. Since then, Stuxnet has been widely discussed and debated, celebrated and bemoaned by experts and critics all over the globe.

But Stuxnet’s brother, Stuxnet 2.0, has largely gone undiscovered since that time.

He continued: ‘Stuxnet 2.0 was designed to work with the same type of Siemens industrial control systems used to monitor and control centrifuges. According to reports, it is believed that both the Iranian and North Korean nuclear programs leverage the same general equipment and that Stuxnet 2.0 is simply waiting to activate once it detected Korean-language settings.’

But Matt said it’s now clear that North Korea is in a different phase of development versus where Iran was at the time.

He said: ‘US National security adviser has stated that “all options” are on the table, and it is clear that cyber security remains one of those options.

‘But given that North Korea does not connect most of its infrastructure to the outside world virtually ensures that there will not be a situation where the US can disarm them with a simple mouse click or two.’

However, citing King’s College in London, Matt explained that the US may have already leveraged its cyber capabilities before to seriously impeding North Korea’s mid-range ballistic missiles, leading to an estimated 88 per cent failure rate.

‘The bottom line is that the US is dealing with a different, more technically savvy and sophisticated foe with North Korean,’ he added.

‘But considering some level of success increasing failure rates for arms, it is possible that Stuxnet 2.0 or other similar types of future precision cyberattack may be already be partially achieving their ultimate goal.

‘If the US, though cyber means, is able to introduce uncertainty and doubt about whether or not North Korean’s missiles will even fire properly if and when the time comes, this could be hailed as a major success.’

Metro

You Might Also Read:

N. Korea Will Unleash Cyber Attacks On The US:

US Conducts Computer War Games in Response to North Korea Missile Launch:

 

 

« Was The German Election Hacked?
Ransomware Analysis Suggests A Bleak Future »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

BluescreenIT (BIT)

BluescreenIT (BIT)

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Esentry

Esentry

Esentry systems is a managed security service provider with focus on continuous security monitoring, threat detection, threat analysis and cybersecurity compliance.