North Korea Targeting U.S. Military Top Secrets

3.20 Korea Hacking Incident Traced Back to North Korea - raising new concerns over cyber war.
By: nProtect,Inc.
 
SAN JOSE, Calif. - May 28, 2013 - PRLog -- After the South Korea’s hacking incident on March 20, 2013 that caused disruption of service for some of major banks and broadcasting companies, it has been discovered that the attack was more than just crashing some companies’ computers and deleting their data.

On April 10th, the private military joint response team discovered the 3.20 cyber terror to be the work of North Korea’s Government. The team now made another shocking discovery: The attacker was trying to steal U.S. military top secret information.

North Koreans hackers have been using special 8 digit identification code, which have been identified to be used only those from North Korea, to identify infected computers during the attack on 3/20 and these identical codes have been discovered in malicious codes intended to steal U.S military top secret information as well.

It has been identified that the malicious codes that caused the disaster on March 20th and malicious codes intended to steal top secret information have been disseminated during the same period. These malicious codes have been programmed to collect information containing the following words: DoD, DEFCON, USFK (United States Foreces Korea), JCS (Joint Chiefs of Staff), 7AF (7th Air Force), 2ID (2nd Infantry Division), CNFK (Commander, U.S. Naval Forces Korea), TNOSC (Theater Network Operations and Security Center), TPFDD (Time-Phased Force and Deployment Data), and other key words related to the U.S. military.

According to the private military joint response team, these malicious codes have been spreading and infecting PCs since 2010.

The 3.20 hacking incident, malicious codes targeting U.S. military secrets and the on-going attacks on the U.S. government computer system are all signs signaling we are now entering a new age of time where instead of rockets and grenades, soldiers are using keyboards and mouse.  This calls for the military to upgrade its cyber terror response system and culturing an army of intelligent cyber soldiers.

In response to the 3.20 hacking incident, nProtect was the first private company to release proactive response against the attack. Soon after the attack, nProtect released “nProtect MBR Guard”, which blocks the malicious code from interfering with the master boot record, which is required for the computer to boot properly, and allows the computer to properly boot. On 3/20, victims could not take any action because the malicious codes prevented the computer from booting and they could only stare at the blank black screen.

Soon afterwards, the emergency response team from nProtect analyzed the malicious codes and released anti-virus for the malicious code for free through www.nProtect.com.

About nProtect, Inc.

Founded in January 2000, nProtect, also known as INCA Internet, is headquartered in San Jose, California and provides online and mobile banking/payment security to financial institutions. Over 100 million endpoint users from more than 1,000 organizations rely on nProtect’s online security solutions to secure their computer and mobile devices against malware, phishing, and number of other security threats while meeting regulatory compliance requirements such as FFIEC Guidance. Global financial institutions such as Bank of America, Deutsche Bank, ING, and HSBC trust and use nProtect security solution.

nProtect was awarded one of the Fastest Growing Companies by Deloitte.

For more information, contact nProtect Inc.

Tel: 408-477-1742

Email: sales@nProtect.com

www.nProtect.com
End
Source:nProtect,Inc.
Email:***@inca.co.kr Email Verified
Tags:Internet Security, North Korea, Hacking, Malware, Nprotect
Industry:anti-malware
Location:San Jose - California - United States
Subject:Products
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
nProtect News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share