Print 35 comment(s) - last by redbone75.. on Jul 13 at 8:25 AM

South Korean, U.S. networks still being targeted days after massive attacks

Days after systematic cyber attacks against government and financial institutions crippled computer networks in South Korea and the United States, additional cyber attacks have hit both nations.

Unlike the first wave of attacks earlier in the week, the U.S. State Department said its networks are still being targeted, but with lower volumes of attacks.  South Korean officials said some of its government networks are still being targeted, but also have noticed a dramatic decline in the attacks following July 4.

The botnet had at least 100,000 hijacked computers in South Korea, Japan, China, the U.S. and other countries, which makes accurately tracing the source of the attacks extremely difficult.

"The anticipated attack did take place, but considerable countermeasures were taken and it did act as a defense to some degree," an Ahnlab security firm official told Reuters.  Ahnlab also pointed out that "tens of thousands" of affected computers could have problems booting up, although other experts have not been able to verify that number.

Several U.S. federal agencies will now monitor popular online hacker hideouts, while security experts attempt to locate any digital fingerprints left behind in computer code.  The group responsible appears to be rather unorganized and possibly inexperienced, causing experts to note how a larger, more organized group may be able to cause a higher level of cyber damage to targets.

Security experts are now trying to figure out who is behind the cyber attacks, though early reports indicate North Korea may be behind the attacks.  China and North Korea were both immediately suspected of the attacks, but Chinese officials denied the accusations, saying there was no reason for them to launch so many attacks against South Korea.

The country, unlike China and other regions in Eastern Europe, reportedly have not launched organized cyber attacks, but this could mark its entrance into cyber warfare.

Moving forward, security experts are concerned the cyber attacks could spread from major computer networks to individual PCs, with hackers possibly hijacking them, then turning them into zombies.  If this truly is a cyber war, it appears there is very little the U.S. and South Korea can do against the perpetrators -- assuming they're accurately identified in the first place -- leading to other attacks from the same group.

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: This will be end up effecting us all
By FaaR on 7/10/2009 12:43:27 PM , Rating: 2
There are too many devices these days that are internet-capable but do not have/need antivirus software. Mandating AV on the ISP level thus wouldn't work, or else people couldn't use their PS3s, linux netbooks and whatnot online. ...Which nobody would accept of course.

What ISPs should do however is disconnect compromised PCs much faster than today. As soon as a PC is confirmed to be breached/zombiefied it should be locked out until the customer calls ISP support whining about not being able to get online, and then go through a mandatory cleaning procedure.

Zombie PCs aren't being taken NEARLY seriously enough right now. They're already a huge problem, and will become ever more so the more time passes; particulary if nothing drastic is done about it right away.

By tmouse on 7/10/2009 2:56:28 PM , Rating: 2
That's a good point, I was a little fixated on the PC problem, Of course baring imbedded apps like internet refrigerators and the like it probably would be wise to incorporate antivirus software into all net devices, since no OS is immune just under exploited. Game consoles are already used for distributed programs and these attacks are just another form so some a-hole will figure a way to use phones, game consoles ect to do this type of attack. Clearly portable devices would be noticed due to the loss of power but I know some people who leave their game systems on 24/7. Many of the exploits in software just take advantage of the functionality of the software and use it for unexpected purposes. As other net devices become more and more "multifunctional" they also become more susceptible to exploits.

"I'm an Internet expert too. It's all right to wire the industrial zone only, but there are many problems if other regions of the North are wired." -- North Korean Supreme Commander Kim Jong-il

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki