South Korea cyberattacks hold lessons for U.S.
It's not the source of an attack that matters, it's how well you are prepared for it
Computerworld - U.S companies and government agencies can learn from the large-scale disruptions that have simultaneously hit several banks and media outlets in South Korea in the last 24 hours.
Early analyses by security firms suggest that the attacks were carried out using previously known vulnerabilities and exploits.
So while considerable attention is being paid to whether or not North Korea is behind the targeted attacks, the real lesson is that organizations have to address the vulnerabilities that leave them exposed, security analysts said.
"It really doesn't matter if the attacker is a nation-state or a cybercriminal or a hacktivist or a bored teenage kid," said John Pescatore, director of emerging security trends at the SANS Institute in Bethesda, Md. "You have to make sure you are at least at the due-diligence level for the well-known critical security controls. If you close the well-known vulnerabilities, you can stop any attacker using those techniques."
At least three broadcast networks and four major banks in South Korea reported moderate to severe disruptions earlier today.
A report in the New York Times quoted South Korea's Financial Services Commission as saying that two banks, NongHyup and Jeju, were temporarily paralyzed after several computers were infected with a virus that deleted data from their systems.
Services at Shinhan Bank, South Korea's fourth largest financial institution, were also disrupted while a fourth financial services firm said it was hit but suffered no damage.
Meanwhile an official from South Korea's Communication Commission told the Voice of America (VoA) that the disruptions at the media operations appear to have been caused by a virus that was distributed as a software update by a patch management system. The virus basically destroyed the master boot record (MBR) on computer hard drives, causing them to crash, according to the official quoted by the VoA.
In a blog post today, security firm Kaspersky said that its analysis indicated that attackers going by the handle "Whois Team" had used a previously known "Wiper"-style malware program to wipe data on infected computers. The malware is similar to last year's Shamoon malware, which was used to destroy more than 30,000 computers at Saudi oil giant Saudi Aramco.
Meanwhile, security firm Avast Software noted in a blog that its analysis of the attacks show that they originated from a legitimate South Korean website belonging to the Korea Software Property Right Council (SPC). According to the company, the attackers appear to have exploited a previously known Internet Explorer vulnerability (CVE-2012-1889) to infiltrate computers at the affected banks.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Is SQL Server AlwaysOn really as powerful? Tips and Tricks from the field With the introduction of AlwaysOn, Windows Clustering Services is now more critical than ever. All Cybercrime and Hacking White Papers | Webcasts