North Korea’s Psychological Cyberwar Against Its Neighbour

North Korean hackers have been using viruses to gain access to South Korean computers, turning individual PCs into "zombies" that could then be used to conduct distributed denial-of-service, or DDoS attacks.

But investigations in Seoul have revealed North Korean how hackers are now engaging in "psychological warfare" through the seizure of information on individual computers, South Korean newspaper Herald Business reported.

The South's National Police Agency recently reported a cyberattack involving a link to a YouTube video, including derogatory content condemning South Korean President Park Geun-hye, was sent by email to South Korean broadcasters through 38,988 accounts.

Another cyberattack in February involved a bulk email from an account impersonating the cyber-criminal investigations department of the police agency, requesting 48 recipients "cooperate with a national security investigation into the anti-South Korea president video."

A fraudulent email from a false account that impersonated a South Korean academic specializing in North Korean studies was also sent to 83 local journalists, the police agency said.

The emails included malicious codes that could perform tasks through remote programming and control. A Seoul law enforcement official who spoke to press on the condition of anonymity said the hackers used a virtual private network service to hide the origin of the attack. The attack was routed through US networks but could be traced to an Internet Protocol address in the Ryugyongdong district of Pyongyang.

That IP address is identical to the source of an attack that took place on March 20, 2013, the official said.

The YouTube video the hackers distributed included content praising North Korea's nuclear development interspersed with clips of Park in South Korean news segments.

Ein News: http://bit.ly/1Us50dN

« Spying With Nano Robots Disguised As Insects
Now You See It: AI Will Become Invisible »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Rwanda Information Society Authority (RISA)

Rwanda Information Society Authority (RISA)

RISA is at the forefront of all ICT project implementation, research, infrastructure and innovation within the ICT sector in Rwanda.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

SecurEyes

SecurEyes

SecurEyes is a leading cybersecurity firm that provides specialised services, including cybersecurity assessments, managed services, and governance risk and compliance services.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.