. | . |
SKorea to seek Chinese help to track cyber attacks Seoul (AFP) Nov 2, 2009 South Korean police said Monday they would request help from China to track the origins of cyber attacks that briefly crippled US and South Korean government and commercial websites in July. "We are now seeking help from Chinese authorities to launch a joint investigation," a national police agency official told AFP, speaking on condition of anonymity. The move follows last week's remarks by South Korea's intelligence service chief Won Sei-Hoon blaming North Korea's telecommunications ministry for the attacks. "Our search into the route of the attacks on South Korean and US sites found a line coming from China," Won told a parliamentary session last Thursday, Yonhap news agency and local newspapers reported at the time. "The line was found to be on the IP (Internet protocol) that the North Korean Ministry of Post and Telecommunications is using on rent (from China)," Won said. It was the first time the South's National Intelligence Service had named a specific body as the user of the IP address linked to the attacks. The intelligence agency had said in July that North Korea was a prime suspect in the "distributed denial of service" attacks designed to swamp selected websites with traffic. The attackers infected tens of thousands of "zombie" computers with a virus which programmed them to send a flood of requests for website access. But the origin of the attacks was never confirmed, with one Vietnamese expert saying they originated from a master server in Britain. Experts say North Korea maintains elite hacker units. The threat of cyber warfare by its neighbour has prompted South Korea to establish a specific military command, which will be active by next year. Last week Lieutenant General Jeffrey Remington, commander of the US Air Force in South Korea, called on Washington and Seoul to take "aggressive steps" to safeguard their military computer networks from increasingly sophisticated cyber attacks.
earlier related report Rogue security software remained the top hacker threat to computers during the first half of this year, but the number of infections was dropping while penetrations by worms doubled, according to the Security Intelligence Report. "We still see rogue security software in high volume but not on the rise," Microsoft Malware Protection Center principal architect Jeff Williams told AFP. "What is on the rise is resurgence of worm activity, particularly Conficker and Taterf." Worms are programmed to replicate themselves, wriggling from machine to machine by hiding in legitimate applications or piggy-backing on USB drives or other portable data storage devices. Rogue security software, or "scareware," typically spreads by tricking people with pop-up boxes bearing bogus alerts that their machines are infected. Spooked computer users are then enticed to pay for applications to fix the supposed computer problems. People that fall for the scam wind up paying hackers; providing them credit card information, and installing malware. Automated scareware blocking in Web browsers and efforts by law enforcement agencies to crack down on companies peddling rogue security software has helped curb the threat. "When selecting an anti-virus product, do it from a proven provider, not someone you never heard of who just pops up on your screen," Williams said. Improving defenses of computers was seen as a reason hackers are reverting to worms, which were a top bane about a decade ago. "We see a rise again in worms as profit-motivated criminals are digging deeper, finding more arcane vulnerabilities to execute remotely," Williams said. A Conficker worm that plagued the Internet at the start of the year was so pernicious that a task force to combat it was formed by computer software and security firms. Conficker and Taterf worms have reportedly wriggled into millions of machines. One of the troublesome ways both worms spread is by stowing away on thumb drives, which are becoming increasingly popular vehicles for people to move music, videos, games, files or other data between computers. "Think about how and where people play online games," Williams said. "What you tend to see is people remove a drive from home or an Internet kiosk and take it back into the enterprise (workplace)." A memory stick carried in by a worker tends to bypass computer security systems designed to guard against hackers breaking in from outside the walls of a business, according to Williams. Businesses should establish security protocols for removable media drives, and have new arrivals automatically scanned for malware, Microsoft recommends. "The criminals out there are becoming more overt, more malicious and more direct in their attacks," Williams said. "That emphasizes the need for multi-layer protections. It is great we have anti-virus software to remove the threats, but clearly it is better to prevent the threat from getting in." Cyber criminals are moving with increasing speed when it comes to reverse engineering patches released to fix vulnerabilities in software programs or operating systems, according to Microsoft. Hackers dissect patches to identify weakness being repaired, then craft malicious code to take advantage of flaws in machines with software that isn't kept up-to-date. "A patch is released and that is what starts these days of risk" Williams said. "There is a window of vulnerability, so we need to close that window more quickly" he said. "Making sure you are up-to-date on security updates is one strong method of protecting yourself against attack." Microsoft's security report is based on data from "billions of scans a day" in more than 200 regions of the world. Share This Article With Planet Earth
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
US boots up new unified cybersecurity center Washington (AFP) Oct 30, 2009 US Homeland Security Secretary Janet Napolitano cut the ribbon on Friday on a state-of-the-art unified command center for government cybersecurity efforts. The National Cybersecurity and Communications Integration Center (NCCIC) brings together various government organizations responsible for protecting cyber networks and infrastructure and private sector partners. "This will be a 24/7, ... read more |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2009 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |