The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED
Let an ISACA® certification elevate your career.
Register today and save
You are here: Home / Viruses & Malware / Cyberattack Hits South Korean Sites
DDoS Protection Powered By Verisign
Widespread Cyberattack Hits South Korean Sites
Widespread Cyberattack Hits South Korean Sites
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
20
2013


South Korea was hit with a cyberattack Wednesday. Specifically, the computer systems at two banks, three major broadcasters and other targets were hit. Some are pointing fingers at North Korea.

According to Symantec, the attack included the defacement of a Korean ISP and telecoms provider and also the crippling of servers belonging to several organizations. The defacement displays an elaborate animated Web page with sound effects, the firm reports, showing three skulls and including a message by the claimed attackers calling themselves the "Whois" team.

"The attack was first noticed when a number of Web sites began to experience problems," Symantec said in blog post. "Customers of banks could not access their online accounts and reports of other sites being down began to surface. While specific details are not known at this time, it has been reported that a number of sites affected had their hard drives wiped, leaving the affected computers in a crippled state."

Wiping Hard Drives

Symantec detects the suspected malware as Trojan Horse/Trojan.Jokra and WS.Reputation.1 and is currently performing a detailed analysis of it. However, the security company can already confirm that the malware performs several actions, including creating a file-mapping object to reference itself, killing two processes related to local antivirus/security product vendors.

The malware also enumerates all drives and begins to overwrite the master boot record and any data stored on it by writing the either the string "PRINCPES" or "HASTATI." This, Symantec said, will wipe all contents of the hard disk. The firm said the threat may also attempt to perform the same wiping actions on any drives attached or mapped to the compromised computer, and forces the computer to reboot by executing "shutdown -r -t 0," which renders the system unusable as the master boot record and contents of the drive are now missing.

"The results of the disk wiping actions are consistent with the major outages reported in that region," Symantec said. "Disk wiping is not a new activity, in a separate incident in August 2012, a number of Middle-Eastern organizations were hit by the W32.Disttrack (Shamoon) threat which caused a similar type of damage by wiping hard disks."

Attacks on Critical Infrastructure

Amrit Williams, CTO of Lancope, said that given previous rhetoric coming from nation-sponsored threats and incidents against government and enterprise targets in the United States, we have entered an era that will be marked by unprecedented attacks on critical infrastructure.

"No matter whether the attacks are originating in North Korea, China or other nation-states, ultimately the U.S. government needs to be accountable for ensuring that services such as critical infrastructure are available and the U.S. thrives," Williams told us. "Today, however, the U.S. is ill-prepared to deal with mainstream malware outbreaks and unsophisticated network intrusions, let alone a highly coordinated attack that would actually justify such a response."

Tell Us What You Think
Comment:

Name:

Anonymous:

Posted: 2013-03-22 @ 2:42am PT
This is crazy. I would stay clear of warez, this is where virus' tend to reside.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN VIRUSES & MALWARE
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 

Enterprise Hardware Spotlight
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 

Mobile Technology Spotlight
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.