{"id":92001,"date":"2017-12-02T09:41:00","date_gmt":"2017-12-02T09:41:00","guid":{"rendered":""},"modified":"2023-01-06T20:53:48","modified_gmt":"2023-01-06T20:53:48","slug":"the-cyber-mouse-that-roared","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/12\/02\/the-cyber-mouse-that-roared\/","title":{"rendered":"The (Cyber) Mouse that Roared"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>If someone asked you for a quick list of nations capable of mounting a  major cyber attack, it&#8217;s doubtful that North Korea would be included. <\/p>\n<p>After all, the DPRK is one of the least-wired nations on earth.   Aside from a few government agencies and Kim Jong-il&#8217;s various  residences, there is virtually no internet access.  Just a few years  ago, a North Korean government official said the nation&#8217;s &#8220;young men&#8221;  were still &#8220;trying to figure out the net.&#8221; <\/p>\n<p>Apparently, North Korea&#8217;s IT fledgling cadre has made a lot of  progress in recent.  Hackers loyal to the DPRK&#8211;operating from North  Korea or other locations&#8211;are believed responsible for last week&#8217;s cyber  assault that paralyzed government and commercial websites in South  Korea and the U.S.  The attacks began on July 4th, and their effects  were still being felt four days later. <\/p>\n<p>It was, by all accounts, a sophisticated, well-planned strike.  As the U.K. Telegraph reports: <\/p>\n<p><span style=\"font-size: 85%;\">The South Korean intelligence agency  told members of parliament that it believed Pyongyang or its agents  abroad were behind the attacks<\/span>. <\/p>\n<p><span style=\"font-size: 85%;\">\u201cThis is not a simple attack by  individuals,\u201d Seoul\u2019s National Intelligence Service (NIS) said in a  statement. \u201cThe attack appeared to have been elaborately prepared and  staged by a certain organisation or state.\u201d <\/span><br \/><span style=\"font-size: 85%;\"><br \/>The Yonhap news agency quoted an unnamed member of parliament who  said that the NIS had suggested that the attacks were the work of North  Korea or \u201ca pro-North Korean force\u201d. <\/p>\n<p>Experts said that there was no indication of data theft, but because  the websites were still affected four days after the attacks began, an  unusually sophisticated denial of service attack had probably been used. <\/p>\n<p>Thousands of computers were infected by a virus that flooded  websites with traffic, then overloaded their servers and forced them to  shut down. <\/span>  <br \/>In the U.S., the official websites of the <a href=\"http:\/\/www.bloomberg.com\/apps\/news?pid=20601087&amp;sid=aVEB6XhdZTFA\">Treasury, Transportation and State Departments were hit with similar attacks<\/a>.   However, agency spokesmen and members of Congress refused to link the  strikes with those in South Korea.  But media reports suggested the  American websites were hacked by the same groups that targeted South  Korean government sites.  <\/p>\n<p>The weekend attacks offer another reminder of the vulnerability of  our computer networks and related systems.  Even a nation like North  Korea&#8211;or its sympathizers&#8211;can marshal the resources conduct a  large-scale cyber assault on technologically advanced adversaries.   Meanwhile, the DPRK is less vulnerable to a similar counter-attack,  given its limited access to the internet.   <\/p>\n<p>At least one analyst described the assault on U.S. and ROK systems  as a probing attack, designed to test our computer defenses.  The  hackers targeted a variety of business and government sites with a  denial-of-service (DOS) attack.  On the commercial side, targeted sites  included the New York Stock Exchange, NASDAQ and Amazon.com.  <\/p>\n<p>The Obama Administration had previously announced plans to appoint a  &#8220;cyber czar&#8221; to oversee computer security in the public and private  sectors.  Additionally, the Defense Department has created its own cyber  command to oversee the military&#8217;s information operations and computer  network defense functions.  <\/p>\n<p>And not a moment too soon, judging by the impact of last weekend&#8217;s  attacks.  The successful strike reminds us that virtually all future  conflicts will contain a cyber element, and some will be built around  those operations.  As one of the nation&#8217;s most dependent on the  internet, the U.S. is among the most vulnerable.  Creation of the cyber  czar and cyber command are steps in the right direction, but they  represent steps that should have been implemented years ago.  <\/p>\n<p>Oddly enough, three Air Force Captains suggested this type of attack  would be part of a crippling, asymmetric first strike inflicted on the  United States by North Korea and its &#8220;coalition&#8221; partners.  <a href=\"http:\/\/www.au.af.mil\/au\/cadre\/aspj\/airchronicles\/apj\/apj98\/sum98\/kennedy.html\">Their scenario was first published in 199<\/a>8.   Events last weekend remind us that such an attack is not only  possible, it is becoming increasing probable.  Unfortunately, our  preparations for that type of contingency remain weak.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If someone asked you for a quick list of nations capable of mounting a major cyber attack, it&#8217;s doubtful that North Korea would be included. After all, the DPRK is one of the least-wired nations on earth. Aside from a few government agencies and Kim Jong-il&#8217;s various residences, there is virtually no internet access. Just [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/92001"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=92001"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/92001\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=92001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=92001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=92001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}