North Korea’s Psychological Cyberwar Against Its Neighbour

North Korean hackers have been using viruses to gain access to South Korean computers, turning individual PCs into "zombies" that could then be used to conduct distributed denial-of-service, or DDoS attacks.

But investigations in Seoul have revealed North Korean how hackers are now engaging in "psychological warfare" through the seizure of information on individual computers, South Korean newspaper Herald Business reported.

The South's National Police Agency recently reported a cyberattack involving a link to a YouTube video, including derogatory content condemning South Korean President Park Geun-hye, was sent by email to South Korean broadcasters through 38,988 accounts.

Another cyberattack in February involved a bulk email from an account impersonating the cyber-criminal investigations department of the police agency, requesting 48 recipients "cooperate with a national security investigation into the anti-South Korea president video."

A fraudulent email from a false account that impersonated a South Korean academic specializing in North Korean studies was also sent to 83 local journalists, the police agency said.

The emails included malicious codes that could perform tasks through remote programming and control. A Seoul law enforcement official who spoke to press on the condition of anonymity said the hackers used a virtual private network service to hide the origin of the attack. The attack was routed through US networks but could be traced to an Internet Protocol address in the Ryugyongdong district of Pyongyang.

That IP address is identical to the source of an attack that took place on March 20, 2013, the official said.

The YouTube video the hackers distributed included content praising North Korea's nuclear development interspersed with clips of Park in South Korean news segments.

Ein News: http://bit.ly/1Us50dN

« Spying With Nano Robots Disguised As Insects
Now You See It: AI Will Become Invisible »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.