• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE UPDATE

May 4, 2011 by

03 May 11. North Korea was behind a cyber attack that crippled one of South Korea’s major commercial banks last month, prosecutors said Tuesday, in a high-profile case that has fueled concerns about corporate online security in the South. National Agricultural Cooperative Federation, or Nonghyup, was forced to shut down its servers last month after hackers took control of the laptop of an IT security worker, which was then used to delete information on the servers. Some 30 million customers at the bank were affected, with some unable to use their accounts for several days. Nonghyup has said it may never be able to fully recover all the data that have been lost. The Seoul Central District Prosecutors’ Office said one of the IP addresses of an overseas server used for the attack matched one used in a previous cyber attack attributed to North Korea. The prosecutor’s office also noted similarities in methods for the attack, including how malicious codes were planted in the compromised laptop. (Source: WSJ)

02 May 11. Traffic to online news sites spiked late Sunday night at 4.1 million page views per minute, driven by the news of the death of Osama bin Laden in Pakistan, according to content delivery company Akamai Technologies. Hackers also are taking advantage of the attention generated by the story, researchers report. A malicious link to a fake video has appeared on Facebook and the blog site of a man who apparently tweeted the bin Laden attack live has been found to be compromised with a malicious exploit kit, according to the security company Websense Security Labs.
“It’s not a high-profile site,” said Patrik Runald, senior manager of security research at Websense. But when breaking news stories began driving traffic to it, it came up dirty in a scan by the Websense Threat Seek Network, which identifies malicious and compromised sites.
Bin Laden was killed in a raid by U.S. forces at his hideout in Abbottabad, about 72 miles north of Islamabad, Pakistan’s capital.
“Cybercriminals are constantly exploiting where the masses go, and news on Osama bin Laden’s death is no exception,” Runald said. “We wanted to warn everyone looking for news on Osama bin Laden’s death to be cautious when clicking on new links.”
The threat is not merely from criminal hackers, said national security expert Seyom Brown, director of Studies at Tower Center of Southern Methodist University in Dallas.
“Putting it in the larger campaign against al Qaeda, the decapitation of the terrorist movement comes at a time of its substantial decentralization and global dispersal; thus, the danger of further terrorist attacks is not necessarily suddenly reduced,” Brown said. “Great vigilance against retaliatory revenge attacks is especially needed over the next weeks and months.”
Those attacks could come in the form of a cyber assault, he said. “We should not fall into the trap of assuming that our defenses can overwhelm the offense. We have to understand that we are going to be vulnerable.”
Brown said that cyber attacks lend themselves to the kind of undeclared conflicts now taking place in the Middle East and North Africa, providing ways for a nation to effectively target infrastructure such as a command-and-control networks while minimizing civilian casualties. Those capabilities also could be used against the United States, he said.
“I think others will find it attractive,” he said. “It is going to be part of the ongoing security environment in the decades ahead.” (Source: GCN)

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT