Anonymous targets North Korean social media channels

Secretive state falls victim to hackers protesting its threats of nuclear war

Hacking group Anonymous claims to have taken control of the social media accounts of Uriminzokkiri, the online face of North Korea's state news agency.

Calling themselves AnonKorea, the hacktivists have taken over Uriminzokkiri's Twitter and Flickr accounts, as well as forcing the organisation's website offline.

The group used the hijacked Twitter account to lay claim to hacking other North Korean websites ryugyongclip.com, ryomyong.com, aindf.com and ournation-school.com.

All of the allegedly hacked websites were offline when IT Pro tried to access them.

The hackers also claim to have stolen 15,000 usernames and passwords from Uriminzokkiri and pasted a sample online.

The attacks come as part of "Operation Free Korea", which commenced with a series of Distributed Denial-of-Service (DDoS) attacks over the weekend against the country's official website and the state-owned airline Air Koryo.

Anonymous says it will end its cyber attacks if the North Korean government stops "making nukes and nuke-threats".

North Korea has recently raised the stakes in an increasingly tense relationship between it, its southern neighbour South Korea and the USA, promising to restart a mothballed nuclear complex and threatening to launch a missile against America.

Anonymous has also demanded North Korea's dynastic dictator Kim Jong Un resigns, making way for a "free direct democracy" and urged the people of North Korea to "rise up and bring ... [this] oppressive government down!"

"We are holding your back and your hand, while you take the journey to freedom, democracy and peace. You are not alone," the group said.

North Korea is not the first nation to be targeted by Anonymous. In 2012, the loose hacking collective targeted Syria, Israel, Uganda and the UK, as well as a number of non-national targets.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021

Most Popular

University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021