Yet another solid story from The New York Times by Choe Sang-Hun (with contributions from Nicole Perlroth, one of my favorite reporters on this topic, and David E. Sanger, another fine journalist). Now it appears the malware that struck South Korea on Wednesday has a name: DarkSeoul! (Fantasitc moniker!)
What these reporters don't tell you is that North Korea has been operating out of bases in China for years since the Internet connections in the Hermit Kingdom are so few and so easily identified. Indeed, according to Richard A. Clarke â who served as Bill Clinton's National Coordinator for Security, Infrastructure Protection, and Counterterrorism, and who is the co-author of the seminal work Cyber War â while North Korea hasn't invested much in their own IP infrastructure, they have invested heavily in taking down the infrastructure of other nations.
Based on the analyses of Clarke and other experts in the field, I would say the likeliest candidate responsible for Wednesday's attack of South Korea's infrastructure is probably the Korean People's Army (KPA) Unit 121, by far that nation's largest and, according to one former hacker who defected in 2004, best trained North Korean cyberwarfare unit. It specializes in disabling South Korea's military command, control, and â most notably â communications networks. They are probably working out of the Shanhai Hotel in Dandong, China (right across the river from North Korea), or in Sunyang, where North Korean agents have rented out several floors of the Myohyang Hotel. All told, North Korea has anywhere from 600 to 1,000 cyberwarfare agents acting in cells throughout the People's Republic of China.
Computer Networks in South Korea Are Paralyzed in Cyberattacks
SEOUL, South Korea â Computer networks running three major South Korean banks and the countryâs two largest broadcasters were paralyzed Wednesday in attacks that some experts suspected originated in North Korea, which has consistently threatened to cripple its far richer neighbor.
The attacks, which left many South Koreans unable to withdraw money from A.T.M.âs and news broadcasting crews staring at blank computer screens, came as the Northâs official Korean Central News Agency quoted the countryâs leader, Kim Jong-un, as threatening to destroy government installations in the South, along with American bases in the Pacific.
Though American officials dismissed those threats, they also noted that the broadcasters hit by the virus had been cited by the North before as potential targets.
The Korea Communications Commission said Thursday that the disruption originated at an Internet provider address in China but that it was still not known who was responsible.
Many analysts in Seoul suspect that North Korean hackers honed their skills in China and were operating there. At a hacking conference here last year, Michael Sutton, the head of threat research at Zscaler, a security company, said a handful of hackers from China âwere clearly very skilled, knowledgeable and were in touch with their counterparts and familiar with the scene in North Korea.â
But there has never been any evidence to back up some analystsâ speculation that they were collaborating with their Chinese counterparts. âIâve never seen any real evidence that points to any exchanges between China and North Korea, â said Adam Segal, a senior fellow who specializes in China and cyberconflict at the Council on Foreign Relations.
Depositors trying to use Shinhan Bank A.T.M.âs on Wednesday in Seoul, South Korea, while the bankâs networks were down. [NOTE: This same photo was used by the BBC yesterday in their coverage of this story. You'd think The New York Times could find something original. Hmmm. Shame on you, photo editor! ED]
The malware is called âDarkSeoulâ in the computer world and was first identified about a year ago. It is intended to evade some of South Koreaâs most popular antivirus products and to render computers unusable. In Wednesdayâs strikes, the attackers made no effort to disguise the malware, leading some to question whether it came from a state sponsor â which tend to be more stealthy â or whether officials or hackers in North Korea were sending a specific, clear message: that they can reach into Seoulâs economic heart without blowing up South Korean warships or shelling South Korean islands.
North Korea was accused of using both those techniques in attacks over the past three years.
The cyberattacks Wednesday come just days after North Korea blamed South Korea and the United States for attacks on some of its Web sites. The Northâs official Korean Central News Agency said last week that North Korea âwill never remain a passive onlooker to the enemiesâ cyberattacks that have reached a very grave phase as part of their moves to stifle it.â
The South Korean government cautioned that it was still too early to point the finger for Wednesdayâs problems at the North, which has been threatening âpre-emptive nuclear attacksâ and other, unspecified actions against its southern neighbor for conducting the military exercises with the United States this month and for supporting new American-led United Nations sanctions against the North.
âWe cannot rule out the possibility of North Korean involvement, but we donât want to jump to a conclusion,â said Kim Min-seok, a spokesman for the Defense Ministry.
The military raised its alert against cyberattacks, he added, and the Korea Communications Commission asked government agencies and businesses to triple the number of monitors for possible hacking attacks. South Koreaâs new president, Park Geun-hye, instructed a civilian-government task force to investigate the disruptions.
It could take months to determine the true source of the attacks, and sometimes investigators never come to a firm conclusion. In 2009, a similar campaign of coordinated cyberattacks over the Fourth of July holiday hit 27 American and South Korean Web sites, including South Koreaâs presidential palace, called the Blue House; its Defense Ministry; and Web sites belonging to the United States Treasury Department, the Secret Service and the Federal Trade Commission.
But those were all âdistributed denial of serviceâ attacks in which attackers flood the sites with traffic until they fall offline. While many suspected North Korea, a clear link to the country was never established.
South Koreaâs two leading television stations, the publicly financed Korean Broadcasting System and MBC, maintained normal broadcasts but said their computers were frozen. The cable channel YTN reported a similar problem. The KBS Web site was shut down.
Shinhan Bank, the countryâs fourth-largest lender, reported that its Internet banking servers had been temporarily blocked. Technicians restored operations, the governmentâs Financial Services Commission said in a statement.
Two other banks, NongHyup and Jeju, reported that operations at some of their branches had been paralyzed after computers were infected with viruses and their files erased, the commission said. After two hours, the banksâ operations returned to normal, they said. A fourth bank, Woori, reported a hacking attack, but said it had suffered no damage.
The Web site of the Washington-based Committee for Human Rights in North Korea was hacked by an entity calling itself âHitman 007-Kingdom of Morocco,â which stole the committeeâs publications and other documents, said its executive director, Greg Scarlatoiu.
He said he did not know whether the attack was linked to the disruptions in South Korea, but noted that it came a day before the United Nations Human Rights Council was to vote on the resolution calling for the establishment of an independent investigation of North Korean human rights abuses, including its running of prison gulags. The committee has been an active supporter of such an inquiry.
âThis type of mishap is not to be unexpected, given the nature of our work,â Mr. Scarlatoiu said.
In testimony to Congress last year, Gen. James D. Thurman, the American commander in South Korea, described what he called North Koreaâs âgrowing cyberwarfare capability.â
âNorth Korea employs sophisticated computer hackers trained to launch cyberinfiltration and cyberattacksâ against South Korea and the United States, General Thurman said. âSuch attacks are ideal for North Korea,â he added, âproviding the regime a means to attackâ South Korean and American businesses âwithout attribution.â
But security researchers and foreign policy experts say that North Korea faces significant hurdles. âThey simply donât have access to the same technology due to sanctions,â said Mr. Sutton, of Zscaler. âAnd a large portion of their population does not have ready access to the Internet, so they donât have that natural pool of talent to recruit from.â
Lee Seong-won, an official at the communications commission, told reporters on Wednesday that the malicious code, once activated, disrupted the booting of computers. âIt will take time for us to find out the identity and motive of those who were behind this attack,â he said.
The government investigators were also checking whether the images of skulls that reportedly popped up on some computer screens had anything to do with the virus attack.
In recent years, North Korea has vowed to attack South Korean television stations and newspapers for carrying articles critical of its government, even citing the map coordinates of their headquarters.
Nicole Perlroth contributed reporting from San Francisco, and David E. Sanger from Washington.
Recent Comments