South Korean Firms Soon be Under Attack by Dark Seoul Hackers
After two years, these hacking groups’ 2013 cyber attacks on South Korea seem to be active again. In 2013 they hacked South Korean commercial and government banking systems, government websites, and news agencies’ server made temporarily down; they were presumably worth damages of thousands of dollars.. now it seems they have activated their group. The same group as Dark Seoul and Operation Troy hacked several European firms’ networks. The Firewall creator stated, “we have found the similarities between the attacks in Europe and now in South Korea and that this the same tactics using, presuming they are Dark Seoul and Operation Troy – we have to make more concern about the technology and tools they are using.” The way of attacks occur in Europe firms are like spear-phishing, in which an email comes from the individual, but the name is shown as the known one to the receiver of the mail; this type of spear-phishing method is usually done by criminal hackers to gain certain information of companies personal data. Also, the email contains autorun-type features with a harmful link have malicious file attachments. Palo Alto has found that hackers are using the video player to cover up with the same malware code revealed in the Europe attack. The wrapped code into the original video player software, which is also connected by companies owned control system with this malware coding without the prior knowledge of the victim, will clean off the entire hard drives and will transfer to the malicious account; it will not show as a destructive component to the users and from the deep coding of malware will endure what for me for. The same sort of wiper malware additionally destroyed many PCs at Sony Pictures Entertainment a year ago after gigabytes of information were stolen from its system. In July 2013, security seller McAfee distributed an investigation of Dark Seoul assaults, which it called Operation Troy. It at first created the impression that two separate gatherings, the Whois Hacking Team and the NewRomanic Cyber Army Team, were behind the assaults. Be that as it may, McAfee finished up. It was likely only one gathering, given an investigation of the assault code. The report additionally depicted a considerably less boisterous parallel operation that seemed, by all accounts, to be gone for taking arranged military information. The U.S. government faulted the assault on North Korea. Palo Alto said the summon and control servers for the latest assault are bargained sites in South Korea and Europe that have all the earmarks of coming up short on date programming.