North Korea’s Psychological Cyberwar Against Its Neighbour

North Korean hackers have been using viruses to gain access to South Korean computers, turning individual PCs into "zombies" that could then be used to conduct distributed denial-of-service, or DDoS attacks.

But investigations in Seoul have revealed North Korean how hackers are now engaging in "psychological warfare" through the seizure of information on individual computers, South Korean newspaper Herald Business reported.

The South's National Police Agency recently reported a cyberattack involving a link to a YouTube video, including derogatory content condemning South Korean President Park Geun-hye, was sent by email to South Korean broadcasters through 38,988 accounts.

Another cyberattack in February involved a bulk email from an account impersonating the cyber-criminal investigations department of the police agency, requesting 48 recipients "cooperate with a national security investigation into the anti-South Korea president video."

A fraudulent email from a false account that impersonated a South Korean academic specializing in North Korean studies was also sent to 83 local journalists, the police agency said.

The emails included malicious codes that could perform tasks through remote programming and control. A Seoul law enforcement official who spoke to press on the condition of anonymity said the hackers used a virtual private network service to hide the origin of the attack. The attack was routed through US networks but could be traced to an Internet Protocol address in the Ryugyongdong district of Pyongyang.

That IP address is identical to the source of an attack that took place on March 20, 2013, the official said.

The YouTube video the hackers distributed included content praising North Korea's nuclear development interspersed with clips of Park in South Korean news segments.

Ein News: http://bit.ly/1Us50dN

« Spying With Nano Robots Disguised As Insects
Now You See It: AI Will Become Invisible »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.