Could the US Use A Cyber Attack To Take Down N. Korea?

The intense clash between Donald Trump and Kim Jong-un continues to heat up and, with no sign of it abating, war looks inevitable.

Both sides have shown off their military and nuclear might, but is it possible to stop this war before it starts with a few clicks of a button? Matt Morris, vice president of strategy and products at cybersecurity company NexDefense, thinks a cyberattack might be the way forward.

He said: ‘This would undoubtedly represent a better option than wide-scale conventional, or nuclear attack. But, is it truly feasible?

‘There were two precision cyber security weapons developed around the same time when the US and Israel felt compelled to intervene into the Iran’s rapidly progressing nuclear program.

‘These two digital weapons, Stuxnet and Stuxnet 2.0, are believed to have been developed around 2009 or early 2010.’

Stuxnet was credited for successfully taking down the centrifuges being used by Iran to enrich uranium, says Matt. Since then, Stuxnet has been widely discussed and debated, celebrated and bemoaned by experts and critics all over the globe.

But Stuxnet’s brother, Stuxnet 2.0, has largely gone undiscovered since that time.

He continued: ‘Stuxnet 2.0 was designed to work with the same type of Siemens industrial control systems used to monitor and control centrifuges. According to reports, it is believed that both the Iranian and North Korean nuclear programs leverage the same general equipment and that Stuxnet 2.0 is simply waiting to activate once it detected Korean-language settings.’

But Matt said it’s now clear that North Korea is in a different phase of development versus where Iran was at the time.

He said: ‘US National security adviser has stated that “all options” are on the table, and it is clear that cyber security remains one of those options.

‘But given that North Korea does not connect most of its infrastructure to the outside world virtually ensures that there will not be a situation where the US can disarm them with a simple mouse click or two.’

However, citing King’s College in London, Matt explained that the US may have already leveraged its cyber capabilities before to seriously impeding North Korea’s mid-range ballistic missiles, leading to an estimated 88 per cent failure rate.

‘The bottom line is that the US is dealing with a different, more technically savvy and sophisticated foe with North Korean,’ he added.

‘But considering some level of success increasing failure rates for arms, it is possible that Stuxnet 2.0 or other similar types of future precision cyberattack may be already be partially achieving their ultimate goal.

‘If the US, though cyber means, is able to introduce uncertainty and doubt about whether or not North Korean’s missiles will even fire properly if and when the time comes, this could be hailed as a major success.’

Metro

You Might Also Read:

N. Korea Will Unleash Cyber Attacks On The US:

US Conducts Computer War Games in Response to North Korea Missile Launch:

 

 

« Was The German Election Hacked?
Ransomware Analysis Suggests A Bleak Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

guardDog.ai

guardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.