South Korea's weapon servers compromised by unknown hackers

The attack was just a small part of a large-scale campaign against the South Korean government

Hacking

South Korea's Ministry of Defence has announced that 10 of its critical systems holding information on the military's weapon systems had been compromised by unknown hackers.

The incident occurred in October where attackers attempted to gain access to 30 of South Korea's important systems but were only successful in 10 instances.

The incident was first reported by Dong-A Ilbo, a South Korean news outlet, following an announcement by Rep. Lee Jong-myung, a Liberty Korea Party member at the National Defense Committee, on Monday.

The attack began on 4 October and ran for three weeks before being discovered on 26 October after the National Intelligence Service noticed suspicious IP server traffic at the Arms Procurement Agency.

It's believed that the attackers hacked Liberty Korea Party Rep. Baek Seung-joo's email account, as the event coincided with the date of the system breach, and used his system to infiltrate the government servers.

"It is dubious whether the agency issued a conclusion to conceal damage and minimize the scope of penetration," said Rep. Lee. "Further investigation to find out if the source of attacks is North Korea or any other party."

The government's cyber security capabilities are being questioned following the successful attack. The attempts on the servers made up only one branch of attacks made on South Korea's foreign affairs facilities including the Korean presidential office Cheong Wa Dae, the National Assembly and the Defense Acquisition Program Administration.

The reports maintain that whatever data was leaked would be of no use to a hostile government wishing to launch further attacks on South Korea.

There will be further investigations to uncover the identity of the attackers, with North Korea being alleged as a possible culprit.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
Hackers leak data from dark web marketplace
cyber security

Hackers leak data from dark web marketplace

9 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021