Could the US Use A Cyber Attack To Take Down N. Korea?

The intense clash between Donald Trump and Kim Jong-un continues to heat up and, with no sign of it abating, war looks inevitable.

Both sides have shown off their military and nuclear might, but is it possible to stop this war before it starts with a few clicks of a button? Matt Morris, vice president of strategy and products at cybersecurity company NexDefense, thinks a cyberattack might be the way forward.

He said: ‘This would undoubtedly represent a better option than wide-scale conventional, or nuclear attack. But, is it truly feasible?

‘There were two precision cyber security weapons developed around the same time when the US and Israel felt compelled to intervene into the Iran’s rapidly progressing nuclear program.

‘These two digital weapons, Stuxnet and Stuxnet 2.0, are believed to have been developed around 2009 or early 2010.’

Stuxnet was credited for successfully taking down the centrifuges being used by Iran to enrich uranium, says Matt. Since then, Stuxnet has been widely discussed and debated, celebrated and bemoaned by experts and critics all over the globe.

But Stuxnet’s brother, Stuxnet 2.0, has largely gone undiscovered since that time.

He continued: ‘Stuxnet 2.0 was designed to work with the same type of Siemens industrial control systems used to monitor and control centrifuges. According to reports, it is believed that both the Iranian and North Korean nuclear programs leverage the same general equipment and that Stuxnet 2.0 is simply waiting to activate once it detected Korean-language settings.’

But Matt said it’s now clear that North Korea is in a different phase of development versus where Iran was at the time.

He said: ‘US National security adviser has stated that “all options” are on the table, and it is clear that cyber security remains one of those options.

‘But given that North Korea does not connect most of its infrastructure to the outside world virtually ensures that there will not be a situation where the US can disarm them with a simple mouse click or two.’

However, citing King’s College in London, Matt explained that the US may have already leveraged its cyber capabilities before to seriously impeding North Korea’s mid-range ballistic missiles, leading to an estimated 88 per cent failure rate.

‘The bottom line is that the US is dealing with a different, more technically savvy and sophisticated foe with North Korean,’ he added.

‘But considering some level of success increasing failure rates for arms, it is possible that Stuxnet 2.0 or other similar types of future precision cyberattack may be already be partially achieving their ultimate goal.

‘If the US, though cyber means, is able to introduce uncertainty and doubt about whether or not North Korean’s missiles will even fire properly if and when the time comes, this could be hailed as a major success.’

Metro

You Might Also Read:

N. Korea Will Unleash Cyber Attacks On The US:

US Conducts Computer War Games in Response to North Korea Missile Launch:

 

 

« Was The German Election Hacked?
Ransomware Analysis Suggests A Bleak Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Protergo Cyber Security

Protergo Cyber Security

Protergo Cyber Security is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).