South Korea's weapon servers compromised by unknown hackers

The attack was just a small part of a large-scale campaign against the South Korean government

Hacking

South Korea's Ministry of Defence has announced that 10 of its critical systems holding information on the military's weapon systems had been compromised by unknown hackers.

The incident occurred in October where attackers attempted to gain access to 30 of South Korea's important systems but were only successful in 10 instances.

Advertisement - Article continues below

The incident was first reported by Dong-A Ilbo, a South Korean news outlet, following an announcement by Rep. Lee Jong-myung, a Liberty Korea Party member at the National Defense Committee, on Monday.

The attack began on 4 October and ran for three weeks before being discovered on 26 October after the National Intelligence Service noticed suspicious IP server traffic at the Arms Procurement Agency.

It's believed that the attackers hacked Liberty Korea Party Rep. Baek Seung-joo's email account, as the event coincided with the date of the system breach, and used his system to infiltrate the government servers.

"It is dubious whether the agency issued a conclusion to conceal damage and minimize the scope of penetration," said Rep. Lee. "Further investigation to find out if the source of attacks is North Korea or any other party."

The government's cyber security capabilities are being questioned following the successful attack. The attempts on the servers made up only one branch of attacks made on South Korea's foreign affairs facilities including the Korean presidential office Cheong Wa Dae, the National Assembly and the Defense Acquisition Program Administration.

Advertisement
Advertisement - Article continues below

The reports maintain that whatever data was leaked would be of no use to a hostile government wishing to launch further attacks on South Korea.

There will be further investigations to uncover the identity of the attackers, with North Korea being alleged as a possible culprit.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/server-storage/servers/356083/the-best-server-solution-for-your-smb
Sponsored

The best server solution for your SMB

26 Jun 2020