The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Build Apps 5x Faster
For Half the Cost Enterprise Cloud Computing
On Force.com
You are here: Home / Viruses & Malware / Cyberattack Hits South Korean Sites
Gartner's #1 for endpoint backup
Widespread Cyberattack Hits South Korean Sites
Widespread Cyberattack Hits South Korean Sites
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
20
2013


South Korea was hit with a cyberattack Wednesday. Specifically, the computer systems at two banks, three major broadcasters and other targets were hit. Some are pointing fingers at North Korea.

According to Symantec, the attack included the defacement of a Korean ISP and telecoms provider and also the crippling of servers belonging to several organizations. The defacement displays an elaborate animated Web page with sound effects, the firm reports, showing three skulls and including a message by the claimed attackers calling themselves the "Whois" team.

"The attack was first noticed when a number of Web sites began to experience problems," Symantec said in blog post. "Customers of banks could not access their online accounts and reports of other sites being down began to surface. While specific details are not known at this time, it has been reported that a number of sites affected had their hard drives wiped, leaving the affected computers in a crippled state."

Wiping Hard Drives

Symantec detects the suspected malware as Trojan Horse/Trojan.Jokra and WS.Reputation.1 and is currently performing a detailed analysis of it. However, the security company can already confirm that the malware performs several actions, including creating a file-mapping object to reference itself, killing two processes related to local antivirus/security product vendors.

The malware also enumerates all drives and begins to overwrite the master boot record and any data stored on it by writing the either the string "PRINCPES" or "HASTATI." This, Symantec said, will wipe all contents of the hard disk. The firm said the threat may also attempt to perform the same wiping actions on any drives attached or mapped to the compromised computer, and forces the computer to reboot by executing "shutdown -r -t 0," which renders the system unusable as the master boot record and contents of the drive are now missing.

"The results of the disk wiping actions are consistent with the major outages reported in that region," Symantec said. "Disk wiping is not a new activity, in a separate incident in August 2012, a number of Middle-Eastern organizations were hit by the W32.Disttrack (Shamoon) threat which caused a similar type of damage by wiping hard disks."

Attacks on Critical Infrastructure

Amrit Williams, CTO of Lancope, said that given previous rhetoric coming from nation-sponsored threats and incidents against government and enterprise targets in the United States, we have entered an era that will be marked by unprecedented attacks on critical infrastructure.

"No matter whether the attacks are originating in North Korea, China or other nation-states, ultimately the U.S. government needs to be accountable for ensuring that services such as critical infrastructure are available and the U.S. thrives," Williams told us. "Today, however, the U.S. is ill-prepared to deal with mainstream malware outbreaks and unsophisticated network intrusions, let alone a highly coordinated attack that would actually justify such a response."

Tell Us What You Think
Comment:

Name:

Anonymous:

Posted: 2013-03-22 @ 2:42am PT
This is crazy. I would stay clear of warez, this is where virus' tend to reside.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Protect 100% of your Data The prevalence of laptops and mobile devices in the enterprise makes corporate data increasingly vulnerable to loss and breach. And yet, workforce productivity is now inextricably linked to mobility. Click here to access the white paper "Top 10 Endpoint Backup Mistakes" to learn more about how to confidently protect data across platforms and devices while also providing features designed to enhance the end user experience.
MORE IN VIRUSES & MALWARE
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dairy Queen Latest Retailer To Report Hack
Dairy Queen is known for its hot fries and sweet treats, but it just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 

Enterprise Hardware Spotlight
HP Previews ProLiant Gen9 Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 

Mobile Technology Spotlight
Apple Sets Sept. 9 Event: iPhone 6, iWatch on Tap?
Save the date. Apple formally announced that its long-anticipated “special event," will take place on September 9. Does the tech giant have the iPhone 6, and the iWatch up its sleeve?
 
Samsung's New Smart Watch Makes Calls Without Phone
Following up on the Gear 2, Samsung has unveiled a new 3G smart watch, the Gear S, that stands out in its ability to make phone calls and send text messages without a smartphone.
 
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.