financetom
Technology
financetom
/
Technology
/
North Korea hacking teams hack South Korea defence contractors - police
News World Market Environment Technology Personal Finance Politics Retail Business Economy Cryptocurrency Forex Stocks Market Commodities
North Korea hacking teams hack South Korea defence contractors - police
Apr 22, 2024 11:48 PM

SEOUL (Reuters) - Major North Korean hacking groups have mounted "all-out" cyber attacks against South Korean defence companies for more than a year, breaching the firms' internal networks and stealing technical data, South Korea's police said on Tuesday.

Hacking teams linked to North Korea's intelligence apparatus and known as Lazarus, Kimsuky and Andariel planted malicious codes in data systems of the defence companies either directly or through contractors working with them, the police said.

The police, working with a team of national spy agency and private sector experts, traced the hacks to the groups, identifying them by the source IP addresses, the re-routing architecture of the signals and the signatures of the malwares used, it said.

In a case that began in November 2022, the hackers planted a code in the company's public network which then infected its intranet when the security program protecting the internal system was temporarily disengaged for a network test, it said.

The hackers also took advantage of the simple security lapse by employees at subcontractors who used the same passcodes for their private and official email accounts, breaching defence company networks and extracting confidential technical data.

The police did not name the companies that have been hacked or the nature of the data breached.

South Korea has emerged as a major global defence exporter, with contracts signed in recent years to sell mechanised howitzers, tanks and fighter jets valued at billions of dollars.

North Korean hacking groups have infiltrated the systems of South Korean financial institutions and news outlets, foreign defence companies, and, in a major security breach in 2014, into South Korea's nuclear power operator.

North Korean hackers are believed to be behind major cryptocurrency thefts, with the stolen funds being channelled to its weapons programmes.

North Korea denies involvement in hacking operations or crypto heists.

(Reporting by Jack Kim; Editing by Lincoln Feast.)

Comments
Welcome to financetom comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
Related Articles >
Industry Comparison: Evaluating Microsoft Against Competitors In Software Industry
Industry Comparison: Evaluating Microsoft Against Competitors In Software Industry
Jan 1, 2025
In the dynamic and cutthroat world of business, conducting thorough company analysis is essential for investors and industry experts. In this article, we will undertake a comprehensive industry comparison, evaluating Microsoft ( MSFT ) and its primary competitors in the Software industry. By closely examining key financial metrics, market position, and growth prospects, our aim is to provide valuable insights...
Investigating NVIDIA's Standing In Semiconductors & Semiconductor Equipment Industry Compared To Competitors
Investigating NVIDIA's Standing In Semiconductors & Semiconductor Equipment Industry Compared To Competitors
Jan 1, 2025
In today's rapidly changing and highly competitive business world, it is vital for investors and industry enthusiasts to carefully assess companies. In this article, we will perform a comprehensive industry comparison, evaluating NVIDIA ( NVDA ) against its key competitors in the Semiconductors & Semiconductor Equipment industry. By analyzing important financial metrics, market position, and growth prospects, we aim to...
Competitor Analysis: Evaluating Apple And Competitors In Technology Hardware, Storage & Peripherals Industry
Competitor Analysis: Evaluating Apple And Competitors In Technology Hardware, Storage & Peripherals Industry
Jan 1, 2025
In the ever-evolving and intensely competitive business landscape, conducting a thorough company analysis is of utmost importance for investors and industry followers. In this article, we will carry out an in-depth industry comparison, assessing Apple ( AAPL ) alongside its primary competitors in the Technology Hardware, Storage & Peripherals industry. By meticulously examining key financial metrics, market positioning, and growth...
How Web3 Is Disrupting AI Cloud Computing
How Web3 Is Disrupting AI Cloud Computing
Jan 1, 2025
Centralized data networks, ones that are owned and/or managed by a single entity, have been structurally broken for years. Why? Single points of failure. If one entity (or even a few) has access to a database, then there is only one “point” to compromise in order to gain full access. This is a serious problem for networks holding sensitive data...
Copyright 2023-2026 - www.financetom.com All Rights Reserved