Russia Provides New Internet Connection to N.Korea

A major Russian telecommunications company appears to have begun providing an Internet connection to North Korea. 

The new link supplements one from China and will provide back-up to Pyongyang at a time the US government is reportedly attacking its Internet infrastructure and pressuring China to end all business with North Korea.

The connection, from TransTeleCom, began appearing in Internet routing databases at 09:08 UTC on Sunday, or around 17:38 Pyongyang time on Sunday evening. Internet routing databases map the thousands of connections between telecom providers and enable computers to figure out the best route to a destination.

Until now, Internet users in North Korea and those outside accessing North Korean websites were all funneled along the same route connecting North Korean ISP Star JV and the global Internet: A China Unicom link that has been in operation since 2010. “The addition of Russian transit would create new internet path out of the country, increasing its resilience and international bandwidth capacity,” said Doug Madory, who analyses global Internet connectivity at Dyn Research.

After this report was published, TransTeleCom issued a brief statement that didn’t directly address the link but didn’t dispute it.
“TransTeleCom (TTK) has historically had a connection to the communication network of North Korea under the agreement with Korea Posts and Telecommunications Corp, which was signed in 2009,” it said.

The new link comes at an interesting time.
It is reported that US Cyber Command has been carrying out denial of service attacks against North Korean hackers affiliated with the Reconnaissance General Bureau. The attacks attempt to overwhelm their computers and the Internet connection with traffic making them slow or impossible to use. The US cyber-attack was due to end on Saturday 7th October, according to a report in The Washington Post. That means the new Russian connection went online just after the US Cyber Command attack ended.

TransTeleCom, or TTK, is one of Russia’s biggest telecommunications companies and a subsidiary of the Russian railway operator. Fiber optic lines are laid alongside the railway and, according to a map on its website, on a route from Vladivostok right up to the North Korean border. That’s presumably at the Friendship Bridge, a railway crossing over the Tumen River that connects Khasan in Russia with Tumangang in North Korea. It’s the only connection between the two countries.

This isn’t the first time North Korea has had alternate routes for Internet connectivity.
From 2012 for about a year, a second link to Star JV existed via Intelsat, an international satellite telecommunications operator, but in recent years the Chinese link has been the sole connection to Star JV. Relying on one Internet provider has always left North Korea in a precarious situation. More than once the link has been the target of denial of service attacks. Most were claimed by the “Anonymous” hacking collective, but on at least one previous occasion, many wondered if US intelligence services had carried out the action.

North Korea has few Internet users, but access to the network is available at major universities, to foreigners via smartphone, at government departments and major companies. Elite families are also suspected of having access. The cyber units of North Korea’s military also enjoy access.

The link is also vital for overseas researchers and academics who rely on access to North Korean state media websites for information.

38 North

You Might Also Read:

Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency:

Could the US Use A Cyber Attack To Take Down N. Korea?:

US vs. North Korea Cyberwar Underway:

 

« Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency
Bermuda Super Rich Hack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Maritime Cyber Alliance

Maritime Cyber Alliance

Maritime Cyber Alliance was established in 2017 by Airbus , CSOAlliance , MCSA & Wididi to provide a medium for both public Cyber Safety advice and for businesses to discuss Cyber concerns.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

HumanFirewall

HumanFirewall

Your secuirty is dorectly proportional to the awareness of your employees. Use Phishing simulation across your organization to train & profile user behavior.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).