{"id":9687,"date":"2011-07-19T05:07:51","date_gmt":"2011-07-19T05:07:51","guid":{"rendered":""},"modified":"2011-07-19T05:07:10","modified_gmt":"2011-07-19T05:07:10","slug":"Is-North-Korea-a-Cyberpower-","status":"publish","type":"post","link":"https:\/\/asiancemagazine.com\/?p=9687","title":{"rendered":"Is North Korea a Cyberpower?"},"content":{"rendered":"<p><strong>On July 5, McAfee, a leading internet security company, released a report <a href=\"http:\/\/blogs.mcafee.com\/wp-content\/uploads\/2011\/07\/McAfee-Labs-10-Days-of-Rain-July-2011.pdf\">\u201c10 Days of Rain,\u201d<\/a> analyzing the malware that infected thousands of computers used against South Korean websites in March 2011.<\/strong><\/p>\n<p>McAfee concludes that the diverse cryptographic tools, the sophisticated use of botnets, the \u201csledgehammer\u201d nature of the attack, and the fact that nearly all of its targets were in South Korea suggest that <strong>\u201cthis may have been a test of South Korea\u2019s preparedness to mitigate cyberattacks, possibly by North Korea or their sympathizers.\u201d<\/strong><\/p>\n<p><strong>When looking at this report, it is important to remember that there is little credible information about North Korea\u2019s cyber capabilities<\/strong>, and that many conclusions about the 2011 event (or the earlier 2009 event also ascribed to North Korea) must rely only on forensic evidence from the malware used in the incident itself.  While this evidence is important, it is not at all conclusive about the authorship of the exploit.  North Korea has made some technological advances in recent years, but the 2011 botnet may have been beyond their capabilities.  That said, we know that cyber attack capabilities are becoming a normal part of military arsenals, and that North Korea has been trying to acquire indigenous cyber capabilities for years.<\/p>\n<p><strong>The source of the 2011 exploit remains a mystery, but it is no mystery that South Korea quickly needs to improve its defenses.<\/strong>  The 2011 incident could have been very disruptive, as McAfee points out, if its full capability to erase data and cripple networks had been used.<\/p>\n<p><a href=\"http:\/\/www.thejakartaglobe.com\/globebeyond\/is-north-korea-a-cyberpower-what-we-know-and-dont-know\/453779\">Source<\/a><\/p>\n<p><strong>North Korea is probably more tuned in to the internet and its power than any other country. Kim Jong-Il leads the world to believe that North Korean citizens have no access to the internet but he probably has millions of them in buildings hacking sites and creating computer viruses!!<\/strong><br \/>\n<!--break--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On July 5, McAfee, a leading internet security company, released a report \u201c10 Days of Rain,\u201d analyzing the malware that<\/p>\n","protected":false},"author":1,"featured_media":72448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[1],"tags":[],"class_list":["post-9687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"magazineBlocksPostFeaturedMedia":{"thumbnail":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u-113x150.jpg","medium":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","medium_large":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","large":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","1536x1536":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","2048x2048":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-highlighted-post":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-featured-post-medium":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-featured-post-small":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u-113x90.jpg","colormag-featured-image":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-default-news":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u-113x150.jpg","colormag-featured-image-large":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-elementor-block-extra-large-thumbnail":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-elementor-grid-large-thumbnail":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-elementor-grid-small-thumbnail":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg","colormag-elementor-grid-medium-large-thumbnail":"https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg"},"magazineBlocksPostAuthor":{"name":"Admin","avatar":"https:\/\/secure.gravatar.com\/avatar\/53e6cdc30765aade0129f85e5aeb50124b1d3f5bb9a70373be31e4eb328371e0?s=96&d=mm&r=g"},"magazineBlocksPostCommentsNumber":"0","magazineBlocksPostExcerpt":"On July 5, McAfee, a leading internet security company, released a report \u201c10 Days of Rain,\u201d analyzing the malware that","magazineBlocksPostCategories":["News"],"magazineBlocksPostViewCount":148,"magazineBlocksPostReadTime":2,"magazine_blocks_featured_image_url":{"full":["https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg",113,170,false],"medium":["https:\/\/asiancemagazine.com\/wp-content\/uploads\/u.jpg",113,170,false],"thumbnail":["https:\/\/asiancemagazine.com\/wp-content\/uploads\/u-113x150.jpg",113,150,true]},"magazine_blocks_author":{"display_name":"Admin","author_link":"https:\/\/asiancemagazine.com\/?author=1"},"magazine_blocks_comment":0,"magazine_blocks_author_image":"https:\/\/secure.gravatar.com\/avatar\/53e6cdc30765aade0129f85e5aeb50124b1d3f5bb9a70373be31e4eb328371e0?s=96&d=mm&r=g","magazine_blocks_category":"<a href=\"#\" class=\"category-link category-link-1\">News<\/a>","_links":{"self":[{"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/9687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9687"}],"version-history":[{"count":0,"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/9687\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=\/wp\/v2\/media\/72448"}],"wp:attachment":[{"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/asiancemagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}