South Korea's weapon servers compromised by unknown hackers

The attack was just a small part of a large-scale campaign against the South Korean government

Hacking

South Korea's Ministry of Defence has announced that 10 of its critical systems holding information on the military's weapon systems had been compromised by unknown hackers.

The incident occurred in October where attackers attempted to gain access to 30 of South Korea's important systems but were only successful in 10 instances.

The incident was first reported by Dong-A Ilbo, a South Korean news outlet, following an announcement by Rep. Lee Jong-myung, a Liberty Korea Party member at the National Defense Committee, on Monday.

The attack began on 4 October and ran for three weeks before being discovered on 26 October after the National Intelligence Service noticed suspicious IP server traffic at the Arms Procurement Agency.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

It's believed that the attackers hacked Liberty Korea Party Rep. Baek Seung-joo's email account, as the event coincided with the date of the system breach, and used his system to infiltrate the government servers.

"It is dubious whether the agency issued a conclusion to conceal damage and minimize the scope of penetration," said Rep. Lee. "Further investigation to find out if the source of attacks is North Korea or any other party."

The government's cyber security capabilities are being questioned following the successful attack. The attempts on the servers made up only one branch of attacks made on South Korea's foreign affairs facilities including the Korean presidential office Cheong Wa Dae, the National Assembly and the Defense Acquisition Program Administration.

The reports maintain that whatever data was leaked would be of no use to a hostile government wishing to launch further attacks on South Korea.

There will be further investigations to uncover the identity of the attackers, with North Korea being alleged as a possible culprit.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020