North Korean hackers blamed for sweeping cyber attack on US networks

By Matthew Shaer | 07.08.09A series of attacks on computer networks in South Korea and the US was apparently the work of North Korean hackers, several news agencies are reporting today. The attacks, which targeted the White House, the Pentagon, and the Washington Post, among other high-level institutions, are raising concerns that the long-simmering conflict with North Korea is expanding into a dangerous new theater.

According to Seoul’s National Intelligence Service, the “attacks appeared to have been elaborately prepared and staged by a certain organization or state.” In that statement, North Korea was not specifically named, but the Yonhap news agency said the NIS had traced the attacks to North Korea or pro-Pyongyang forces.

“The NIS has been telling committee members that North Korea or a pro-North Korean force might be behind the cyber terror,” a South Korean legislator told Yonhap. The statement has not been independently verified, and South Korean intelligence agency say the matter remains under investigation.
Meanwhile, The Associated Press has obtained a list of the targets in a coordinated attack last weekend on US networks. Included on the list are the National Security Agency, the Department of Homeland Security, the State Department, and the Nasdaq stock exchange. Many of the organizations appeared to have successfully blunted the sustained computer assaults, the AP said.

In South Korea, the sites of the presidential office, the defense ministry, and the National Assembly were saturated with access requests generated by malicious software on Tuesday, crippling server response to legitimate traffic, South Korea’s Communications Commission said in a statement.

A test

Many analysts see the attacks as a test of the US government’s ability to deal with a coordinated cyber-attack.

In late May, President Obama unveiled the details of an ambitious new cyber-security initiative, which he said would gird the nation’s infrastructure against digital threats. “We rely on the Internet to pay our bills, to bank, to shop, to file our taxes,” Obama said in a news conference. “But we’ve had to learn a whole new vocabulary just to stay ahead of the cyber criminals who would do us harm – spyware and malware and spoofing and phishing and botnets.”

At the time, the White House appeared to be responding to two high-level cyber-security incidents: the apparent breach of a top-secret strike fighter program and a viral attack on computers at a military base in Afghanistan. “[It’s] clear that we’re not as prepared as we should be, as a government or as a country,” Obama said, adding that, the US has “failed to invest in the security of our digital infrastructure.”

As Monitor reporter Gordon Lubold has noted, there were some 37,000 cyber attacks in the United States in 2007 alone – up 800 percent from 2005, according to a recently published estimate that cited data from the Department of Homeland Security.

What’s next?

The attacks on networks here and in South Korea are the latest reminder that cyber-security remains a pressing concern in the 21st century. They may also be a sign that North Korea has stumbled across a new way to provoke its neighbors to the South and its enemies to the West.

On Mashable, Stan Schroeder writes that continued attacks could have profound economic and political consequences. “What seems like a geek’s dream come true – a cyber war – might end up in tighter government control over the Internet, which can have serious privacy implications for all of us,” he argues.

Meanwhile, Ed Morrissey, a conservative blogger, sees the attacks as a clear-cut case of provocation. “The cyber attack shows that [North Korean leader Kim Jong-il] has put plenty of resources into that technology and that Pyongyang intends on pursuing hostilities on every possible battlefield in this generation of leadership and the next,” he writes. “The US had better show that we can prevail against it and make it more costly for the Kims than for us.”

http://features.csmonitor.com/innovation/2009/07/08/north-korean-ha...

Views: 56

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Marklar on July 8, 2009 at 5:28pm
And why should I care anyway. Every week I get multiple cyber terror attacks against my own computer via vicious adware, call home codes, and tracking cookies sponsored mostly by supposedly legitimate businesses. If the freakin NSA and the Pentagon can't protect themselves as well as I do they should step down in favor of a group of 16 year olds with a bit of computer savvy.
Comment by truth on July 8, 2009 at 5:06pm
Blitz of “Cyber Attacks” as Rockefeller Bill Approaches: Infowars | A determined propaganda bli.. http://tinyurl.com/lyab6g
Comment by truth on July 8, 2009 at 4:07pm
I bet it was a joint op with the 12.160 social network lol!

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone commented on tjdavis's photo
Thumbnail

Duplicity

"Ban Talmud and Quran and other supremacy ideology?"
10 hours ago
Less Prone commented on Doc Vega's blog post FBI Agent Admits Evidence of Sasquatch Existence
"Doc, you'll like it. Thanks for being with us."
10 hours ago
Doc Vega posted a blog post

What are the Characteristics of a Rogue Regime?

 What would you call a government that uses dogmatic rhetoric as its tool of communicating with the…See More
12 hours ago
Doc Vega commented on Doc Vega's blog post FBI Agent Admits Evidence of Sasquatch Existence
"Les Prone thanks for your support and I'll watch the video! "
13 hours ago
tjdavis posted a blog post
yesterday
tjdavis commented on tjdavis's video
Thumbnail

Clown World

"Previewed 6 years ago"
yesterday
tjdavis posted a video

Clown World

Support the channel for more frequent content : https://www.patreon.com/TrampStampBITCHUTE (in case I get banned): https://www.bitchute.com/TrampStamp/Clown ...
yesterday
Tori Kovach commented on rlionhearted_3's photo
Thumbnail

2DF36465-A826-443C-A3A8-6638BC1D4FFA

"If the United States would quit trying to subvert Venezuela and allowed it to blossom into…"
yesterday
Tori Kovach posted a status
"5'3""
yesterday
Profile Icont.me/TheIntelligenceLibrary and Twin City Security Fort Worth joined 12160 Social Network
yesterday
Less Prone commented on Doc Vega's blog post FBI Agent Admits Evidence of Sasquatch Existence
"Watch the Mike Cremo video. The story goes back a million…"
yesterday
Less Prone favorited Doc Vega's blog post FBI Agent Admits Evidence of Sasquatch Existence
yesterday
Less Prone posted a video

DOT-COM BUST 2.0; WHEN ALL ELSE FAILS THEY TAKE YOU TO WAR

The Trends Journal is a weekly magazine analyzing global current events forming future trends. Our mission is to present Facts and Truth over fear and propag...
yesterday
tjdavis posted photos
Sunday
tjdavis favorited Doc Vega's blog post The Great DC Ivory Tower of Deception
Saturday
tjdavis posted videos
Saturday
Doc Vega posted blog posts
Friday
Less Prone commented on Less Prone's video
Thumbnail

Forbidden Archaeology | Michael Cremo | Talks at Google

"Forbidden Archeology and the Consciousness Paradox "Michael Cremo, also known as the…"
Friday
Less Prone posted a video

Forbidden Archaeology | Michael Cremo | Talks at Google

Over the past two centuries, archaeologists have found bones, footprints, and artifacts showing that people like ourselves have existed on earth for many mil...
Friday
tjdavis posted a video
Friday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted