North Korea Threatens US with Cyberattacks

49-north-korea-attacks-the-us.jpg

North Korea has responded to a report that it was the target of an unsuccessful Stuxnet-style cyber attack by threatening a cyber attack of its own against the U.S.
In an article published in the country's largest daily newspaper on Tuesday, North Korea said it would wage a cyber war against the U.S. to hasten its ruin. Such bellicose threats are fairly common in North Korean media and aren't always followed by action, but when it comes to cyber attacks, the country has been blamed for several large attacks in the past.
Most have been against South Korea, but the country was also publicly accused by the U.S. government of being behind last year's devastating attack against Sony Pictures.
"The DPRK can react to any forms of wars, operations and battles sought by the U.S. imperialists," the article said, using the acronym for the country's official name, the Democratic People's Republic of Korea.
"It is the firm determination of the DPRK to wage Korean-style cyber war to hasten the final ruin of the U.S. and the forces following it, who attempted to bring down the former with the cyber war," it said.
The article was published on page 6 of the Rodong Sinmun, the newspaper of the ruling Workers Party of Korea and a key propaganda mouthpiece.
In late May, Reuters reported that the U.S. had attempted a cyber attack against North Korea's nuclear weapons program five years ago, similar to the Stuxnet attack that damaged thousands of centrifuges used by Iran's nuclear program at about the same time.
The attack against North Korea was unsuccessful because the virus couldn't gain access to North Korea's nuclear computer network, Reuters said, quoting intelligence sources.
"The U.S. is greatly mistaken if it thinks the DPRK will just overlook with folded arms the provocations in the cyber space," the Rodong Sinmun said.
Computerworld: http://bit.ly/1ShOREQ

« UK Web Snooping Powers Are 'Undemocratic'
Instilling a Culture of Cyber Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Iceberg

Iceberg

Since 2016, Iceberg has redefined how businesses approach hiring in the Cybersecurity and eDiscovery space.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed Vehicle Systems International (AUVSI)

AUVSI is the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics. Focus areas include cyber security for uncrewed systems and robotics.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.

Culminate

Culminate

Adopt AI with confidence in your SOC. Utilize human-AI teaming to conduct your investigations with unmatched accuracy and speed.

Sciber

Sciber

Sciber - data-driven cybersecurity. Strengthen your cyber defence with proactive, science-based and improvement-driven services.