. | . |
South Korea escapes major cyberattack
Seoul (UPI) Mar 4, 2011 South Korea's government reports little damage or disruption to its computers after a series of cyberattacks. Nearly 30 institutions and organizations were affected by distributed denial-of-service attacks that overload a site with data causing the site to break down or stop functioning. The attackers reportedly injected malware into two peer-to-peer file-sharing Web sites, the National Police Agency said. Government ministries -- including defense and unification -- the National Assembly, a military headquarters, sites for U.S. armed forces in South Korea and major banks were among those hit, an official from the president's office said. The two biggest Internet portals of Naver and Daum, as well as major commercial banks such as Kookmin, Woori and Shinhan were targeted. "There was a DDoS attack but no damage was done," the official said. South Korea's financial regulator the Financial Services Commission and an online stock trading system were shut down but for only a few minutes. AhnLab, a major security solution provider founded in South Korea in 1995, said it expects more attacks in the next several days. AhnLab said up to 11,000 personal computers were infected by the malware. "For the PC to not be infected by the malicious code, one must have the latest security patch for the computer operating system and must update the vaccine program, along with checking the system in real time," Kim Hong-sun, chief executive of AhnLab, said. The attacks are similar to those that targeted South Korean Web sites in July 2009 which were believed to have come from North Korea but never confirmed. Right after the latest attack, South Korea's state Communications Commission issued an alert for computer users. "The number of zombie PCs, which are infected by malware and taking part in the attack, currently totals up to 11,000, much smaller than the 115,000 counted during the 2009 cyber attack," a KCC official said. "However, we're aware and making preparation measures since the number is likely to increase." In April, North Korea, often suspected of being the originating country for cyberattacks, reportedly developed an operating system called Red Star to monitor user activity, even though the use of personal computers by the public isn't as widespread as in South Korea, South Korea's Science and Technology Policy Institute said. "Due to few applicable programs available, Red Star will not even be easily distributed in North Korea," the STPI said. The Linux-based Red Star operating system uses a popular Korean folk song as its startup music. In July 2009, the South Korean Defense Ministry announced it would spend more than $20 million to improve security for its computer systems after that month's cyberattacks. The Cyber Terror Response Center, part of the National Police Agency, set up a team to investigate the cyberattacks. Other departments, including the military, also launched investigations.
Share This Article With Planet Earth
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
Computer expert says US behind Stuxnet worm Long Beach, California (AFP) March 3, 2011 A German computer security expert said Thursday he believes the United States and Israel's Mossad unleashed the malicious Stuxnet worm on Iran's nuclear program. "My opinion is that the Mossad is involved," Ralph Langner said while discussing his in-depth Stuxnet analysis at a prestigious TED conference in the Southern California city of Long Beach. "But, the leading source is not Israel ... read more |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2010 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |