North Korea’s Psychological Cyberwar Against Its Neighbour

North Korean hackers have been using viruses to gain access to South Korean computers, turning individual PCs into "zombies" that could then be used to conduct distributed denial-of-service, or DDoS attacks.

But investigations in Seoul have revealed North Korean how hackers are now engaging in "psychological warfare" through the seizure of information on individual computers, South Korean newspaper Herald Business reported.

The South's National Police Agency recently reported a cyberattack involving a link to a YouTube video, including derogatory content condemning South Korean President Park Geun-hye, was sent by email to South Korean broadcasters through 38,988 accounts.

Another cyberattack in February involved a bulk email from an account impersonating the cyber-criminal investigations department of the police agency, requesting 48 recipients "cooperate with a national security investigation into the anti-South Korea president video."

A fraudulent email from a false account that impersonated a South Korean academic specializing in North Korean studies was also sent to 83 local journalists, the police agency said.

The emails included malicious codes that could perform tasks through remote programming and control. A Seoul law enforcement official who spoke to press on the condition of anonymity said the hackers used a virtual private network service to hide the origin of the attack. The attack was routed through US networks but could be traced to an Internet Protocol address in the Ryugyongdong district of Pyongyang.

That IP address is identical to the source of an attack that took place on March 20, 2013, the official said.

The YouTube video the hackers distributed included content praising North Korea's nuclear development interspersed with clips of Park in South Korean news segments.

Ein News: http://bit.ly/1Us50dN

« Spying With Nano Robots Disguised As Insects
Now You See It: AI Will Become Invisible »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.