Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cyber attacks in S. Korea launched from computers in 16 countries+
Kyoto via Breitbart ^ | July 10, 2009 | N/A

Posted on 07/09/2009 8:36:32 PM PDT by Jet Jaguar

South Korea's state intelligence organization said Friday it has discovered that a wave of cyber attacks carried out earlier this week into key government and private websites in South Korea and the United States was launched from computers in 16 countries, Yonhap News Agency reported. The National Intelligence Service made the report to a closed-door meeting with members of a parliamentary intelligence committee, Yonhap quoted committee members as saying.

North Korea was not among the 16 countries, which include South Korea, the United States, Japan, and Guatemala, Yonhap said.

The cyber attacks have been traced to 86 Internet Protocol addresses in the countries, intelligence officials reportedly told the committee.

As for North Korea's involvement in the attacks, the intelligence agency suspects the North, but it is too early to say with certainty because an investigation is still going on, the report said.

Its suspicion that North Korea or its sympathizers may be behind the attacks is based on the fact that the attacks targeted conservative groups, and that the North issued a statement warning of cyber warfare last month, and methods used by certain hackers.

(Excerpt) Read more at breitbart.com ...


TOPICS: Business/Economy; Crime/Corruption; Foreign Affairs
KEYWORDS: cyberattacks; cybersecurity; cyberwar; hackers; nkorea; northkorea; othercountries

1 posted on 07/09/2009 8:36:33 PM PDT by Jet Jaguar
[ Post Reply | Private Reply | View Replies]

To: Jet Jaguar

Very interesting. The next question is: how many college students were involved?


2 posted on 07/09/2009 8:45:55 PM PDT by lilylangtree (Veni, Vidi, Vici)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

If they know those 86 IP addresses, then shut them down and find out who they are and deny them service.


3 posted on 07/09/2009 8:47:05 PM PDT by BipolarBob (It takes a Kenyan village to raise a US president.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

Time for the FBI to do its job.

Any day now........................


4 posted on 07/09/2009 9:13:32 PM PDT by wastedyears (The Tree is thirsty and the hogs are hungry.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wastedyears

And the NSA, CIA, the AF Cyber Command; etc.


5 posted on 07/09/2009 9:19:15 PM PDT by Jet Jaguar
[ Post Reply | Private Reply | To 4 | View Replies]

To: lilylangtree
Since such a huge % of our Com Sci and EE grad students are Chicoms, I would think that there's more than one or two who are Chinese agents. What is the Chinese CIA called, anyways?
6 posted on 07/09/2009 10:01:00 PM PDT by VanShuyten ("Do you call it 'unsound method'?" "No method at all," I murmured.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Jet Jaguar

And how many of the bots involved were running Linux?


7 posted on 07/09/2009 10:03:19 PM PDT by HiTech RedNeck (Think of the D Party as what it really is: a criminal organization masquerading as a political party)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar
It's STILL Pyongyang. I say.
8 posted on 07/09/2009 10:04:01 PM PDT by AmericanInTokyo (May his victims--with the death and burial of Michael Jackson--finally find peace & come to closure)
[ Post Reply | Private Reply | To 5 | View Replies]

To: AmericanInTokyo

Agreed.


9 posted on 07/09/2009 10:04:54 PM PDT by Jet Jaguar
[ Post Reply | Private Reply | To 8 | View Replies]

To: VanShuyten

China, informally, through students could also be involved, yes. My guess is zombie computers set up in various countries, but orignally orchestrated from Pyongyang.


10 posted on 07/09/2009 10:05:42 PM PDT by AmericanInTokyo (May his victims--with the death and burial of Michael Jackson--finally find peace & come to closure)
[ Post Reply | Private Reply | To 6 | View Replies]

To: HiTech RedNeck

“And how many of the bots involved were running Linux?”

Very few if any, I’d say. Linux is a very different environment than Windows. As just one example, there is no Windows Registry to hide things in.


11 posted on 07/10/2009 10:57:34 AM PDT by TexasRepublic (BLOAT - Buy lots of ammo today)
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson