AGL38.54▲ 0.72 (0.02%)AIRLINK130▼ -3.23 (-0.02%)BOP5.61▼ -0.03 (-0.01%)CNERGY3.86▲ 0.09 (0.02%)DCL8.73▼ -0.13 (-0.01%)DFML41.76▲ 0.82 (0.02%)DGKC88.44▼ -1.25 (-0.01%)FCCL34.99▼ -0.07 (0.00%)FFBL67.35▲ 0.81 (0.01%)FFL10.6▲ 0.47 (0.05%)HUBC108.8▲ 2.24 (0.02%)HUMNL14.66▲ 1.33 (0.10%)KEL4.75▼ -0.1 (-0.02%)KOSM6.95▲ 0.15 (0.02%)MLCF41.67▲ 0.14 (0.00%)NBP59.6▲ 0.95 (0.02%)OGDC183▲ 2.36 (0.01%)PAEL26.25▲ 0.63 (0.02%)PIBTL5.97▲ 0.17 (0.03%)PPL146.5▼ -1.27 (-0.01%)PRL23.66▲ 0.5 (0.02%)PTC16.64▲ 1.44 (0.09%)SEARL68.36▼ -0.33 (0.00%)TELE7.23▲ 0 (0.00%)TOMCL35.95▲ 0.01 (0.00%)TPLP7.84▲ 0.48 (0.07%)TREET14.22▲ 0.07 (0.00%)TRG50.44▼ -0.31 (-0.01%)UNITY26.75▲ 0.3 (0.01%)WTL1.21▲ 0 (0.00%)

Suspected N. Korean hackers target S. Korea-US drills

Share
Tweet
WhatsApp
Share on Linkedin
[tta_listen_btn]

Suspected North Korean hackers have attempted an attack targeting a major joint military exercise between Seoul and Washington that starts on Monday, South Korean police said.

South Korea and the United States will kick off the annual Ulchi Freedom Shield drills on Monday through August 31 to counter growing threats from the nuclear-armed North.

Pyongyang views such exercises as rehearsals for an invasion and has repeatedly warned it would take “overwhelming” action in response.

The hackers — believed to be linked to a North Korean group dubbed Kimsuky — carried out “continuous malicious email attacks” on South Korean contractors working at the allies’ combined exercise war simulation centre, the Gyeonggi Nambu Provincial Police Agency said in a statement on Sunday.

“Police investigation confirms that North Korean hacking group was responsible for the attack,” it said in a statement, adding that military-related information was not stolen.

A joint investigation by the police and the US military found that the IP address used in the latest attack matched one identified in a 2014 hack against South Korea’s nuclear reactor operator blamed on the group, according to the statement.

The Kimsuky hackers use “spearphishing” tactics — sending malicious attachments embedded in emails — to exfiltrate desired information from victims.

According to findings by the US Cybersecurity and Infrastructure Security Agency in 2020, Kimsuky is “most likely tasked by the North Korean regime with a global intelligence gathering mission.”

The group — believed to be active since 2012 — targets individuals and organisations in South Korea, Japan, and the United States, focusing on foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions, it added.—INP

Related Posts