Skip to main content

North Korea stealing warship...

North Korea's cyber army appears to be going after real weapons.

Hackers tied to Kim Jong Un's regime stole blueprints and other information about warships and submarines last year when they broke into one of the world's biggest shipbuilders, according to South Korean lawmaker Kyeong Dae-soo.

Blueprints, shipbuilding technology, weapons systems and test data related to submarines and destroyers were among roughly 60 classified military documents taken from Daewoo Shipbuilding last year, according to Kyeong's office. It said it was summarizing information it had received from the South Korean Defense Ministry and several military agencies.

The hackers are believed to have accessed some 40,000 documents in all.

Kyeong, a member of the opposition party, learned of the Daewoo hack at an intelligence briefing last week, according to a spokesman for the lawmaker. The South Korean Defense Ministry declined to comment on the matter, but said it is working to strengthen military security.

Related: North Korea's long history of hacking

Daewoo has built several South Korean warships and submarines, all part of the country's defenses against North Korea.

A Daewoo spokeswoman declined to comment, beyond saying that the company is looking into the matter.

The Daewoo hack is the latest case to come to light suggesting North Korea is using its hacking abilities to try to gain an edge in the tense standoff with the U.S. and its allies over Pyongyang's nuclear weapons program.

Earlier this month, another South Korean lawmaker revealed that North Korean hackers allegedly stole classified military documents from a Defense Ministry database. Among the documents stolen were a South Korea-U.S. wartime operation plan and a document that included procedures to "decapitate" North Korean leadership.

Related: North Korea is trying to amass a bitcoin war chest

North Korean hackers have also been tied to other high profile cyberattacks, including the massive ransomware attack WannaCry earlier this year, a series of attacks on global banks that came to light last year and the hacking of Sony Pictures in 2014.

The North Korean government has repeatedly denied involvement in international cyberattacks.

Cybersecurity experts say the latest alleged heist shows the risks for government contractors.

"State versus state espionage has moved into the digital realm," said Bryce Boland, Asia Pacific chief technology officer with cybersecurity firm FireEye.

Companies "involved in state activities like defense are considered fair game by cyber spies," he said

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...