Medical and Hospital News  
CYBER WARS
S.Korea websites hit by fresh cyber attack

by Staff Writers
Seoul (AFP) March 5, 2011
The web sites of South Korea's key government agencies and financial institutions came under cyber attack for a second day Saturday, suffering minor damage, communications authorities said.

The Korea and Communications Commission (KCC) said the "distributed denial-of-service (DDoS)" attacks resumed Saturday morning against 29 websites including those of government agencies, Internet portals and banks.

"The homepage of parliament momentarily underwent delays but currently all the websites are operating normally," a KCC official told AFP.

The attacks were fended off as antivirus software was downloaded as a precaution and most "zombie computers" that were inadvertently used to carry out such attacks were turned off on Saturday.

The government and local antivirus firms, however, maintained an alert status for further attacks.

South Korean police have isolated 30 overseas servers that were ordering more than 34,000 zombie computers to carry out DDoS attacks, Yonhap news agency said.

These servers have been traced to 18 countries and territories around the world, including the United States, Russia, Italy, Mexico, Israel and Hong Kong.

Police have contacted overseas law enforcement agencies in attempts to trace the origin of the attacks.

Seoul on Friday issued a cyber security alert as the 29 websites came under DDos attacks.

They included those of the presidential Blue House, the US forces, the military Joint Chiefs of Staff, the ministries of foreign affairs, defence and unification, which handles relations with North Korea, parliament and the tax office.

A DDoS attack often uses viruses planted in "zombie" computers. These seek simultaneous access to selected sites and swamp them with traffic.

In July 2009 a major cyber-attack temporarily shut down 25 sites domestically and in the United States, including those of the State Department, the White House and the Pentagon.

South Korea's spy chief reportedly blamed North Korea's telecommunications ministry for that incident, although US officials reached no conclusion.

In July last year, on the anniversary of the first incident, a number of websites suffered similar DDoS attacks because some contaminated PCs had not been fixed.

earlier related report
South Korea escapes major cyberattack
Seoul (UPI) Mar 4, 2011 - South Korea's government reports little damage or disruption to its computers after a series of cyberattacks.

Nearly 30 institutions and organizations were affected by distributed denial-of-service attacks that overload a site with data causing the site to break down or stop functioning.

The attackers reportedly injected malware into two peer-to-peer file-sharing Web sites, the National Police Agency said.

Government ministries -- including defense and unification -- the National Assembly, a military headquarters, sites for U.S. armed forces in South Korea and major banks were among those hit, an official from the president's office said.

The two biggest Internet portals of Naver and Daum, as well as major commercial banks such as Kookmin, Woori and Shinhan were targeted.

"There was a DDoS attack but no damage was done," the official said.

South Korea's financial regulator the Financial Services Commission and an online stock trading system were shut down but for only a few minutes.

AhnLab, a major security solution provider founded in South Korea in 1995, said it expects more attacks in the next several days. AhnLab said up to 11,000 personal computers were infected by the malware.

"For the PC to not be infected by the malicious code, one must have the latest security patch for the computer operating system and must update the vaccine program, along with checking the system in real time," Kim Hong-sun, chief executive of AhnLab, said.

The attacks are similar to those that targeted South Korean Web sites in July 2009 which were believed to have come from North Korea but never confirmed.

Right after the latest attack, South Korea's state Communications Commission issued an alert for computer users.

"The number of zombie PCs, which are infected by malware and taking part in the attack, currently totals up to 11,000, much smaller than the 115,000 counted during the 2009 cyber attack," a KCC official said. "However, we're aware and making preparation measures since the number is likely to increase."

In April, North Korea, often suspected of being the originating country for cyberattacks, reportedly developed an operating system called Red Star to monitor user activity, even though the use of personal computers by the public isn't as widespread as in South Korea, South Korea's Science and Technology Policy Institute said.

"Due to few applicable programs available, Red Star will not even be easily distributed in North Korea," the STPI said. The Linux-based Red Star operating system uses a popular Korean folk song as its startup music.

In July 2009, the South Korean Defense Ministry announced it would spend more than $20 million to improve security for its computer systems after that month's cyberattacks.

The Cyber Terror Response Center, part of the National Police Agency, set up a team to investigate the cyberattacks. Other departments, including the military, also launched investigations.







Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


CYBER WARS
Computer expert says US behind Stuxnet worm
Long Beach, California (AFP) March 3, 2011
A German computer security expert said Thursday he believes the United States and Israel's Mossad unleashed the malicious Stuxnet worm on Iran's nuclear program. "My opinion is that the Mossad is involved," Ralph Langner said while discussing his in-depth Stuxnet analysis at a prestigious TED conference in the Southern California city of Long Beach. "But, the leading source is not Israel ... read more







CYBER WARS
Haiti carnival turns dark as it returns after quake

Libya's neighbours await new refugee influx

Bleak future for Christchurch as population flees

No bodies in New Zealand quake cathedral

CYBER WARS
Shark Tracking Reveals Impressive Feats Of Navigation

Beijing to trial mobile tracking system: report

ZST Digital Networks Signs Agreement To Develop City-Wide GPS Platform

Retail Mobile Systems Easily Tricked

CYBER WARS
California Islands Give Up Evidence Of Early Seafaring

Investigating The Function Of Junk DNA In Human Genes

Study: Brain is a 'self-building toolkit'

Remains of Ice Age child found in Alaska

CYBER WARS
Research Shows How Bacteria Communicate With Each Other

New Group Of Algae Discovered

UF Pine Island Pollen Study Leads To Revision Of State's Ancient Geography

What Is Good For You Is Bad For Infectious Bacteria

CYBER WARS
Using Artificial, Cell-Like Honey Pots' To Entrap Deadly Viruses

Floating Spores Kill Malaria Mosquito Larvae

Three more swine flu deaths in Hong Kong: officials

Seaweed defense offers clues against malaria

CYBER WARS
China richest man says work key to easing poverty

Graft: a perennial problem for China's leaders

Rights groups slam China Jasmine 'repression'

China to raise minimum income tax threshold

CYBER WARS
South Korea charges alleged Somali pirates

Madagascar navy rescues pirate-seized vessel

US to continue anti-piracy efforts: military chief

Somali pirates heading to Asia: US

CYBER WARS
Reining in prices is China's 'top priority': Wen

China's huge labour pool shows signs of drying up

China wants green growth in next five years

Data fuels China, India inflation worries


The content herein, unless otherwise known to be public domain, are Copyright 1995-2010 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement