Cyber Attacks Against Korean Missile Launches

Former President Barack Obama wasn't impressed by the United States' missile defense systems. They constantly missed incoming blasts in practice attacks, to say nothing of how they might fare in the face of an actual assault. 

Obama was thinking about North Korea and its leader, Kim Jong-un, who's often going on about developing a nuclear warhead that can be fired atop an intercontinental ballistic missile.

If this ever happened, US defenses may well not be able to stop it. So - Obama ramped up American cyber-attacks on North Korean computer networks

About three years ago, North Korean missiles sputtered during launch attempts. Some unraveled just after takeoff. The switch in tactics may have added years before North Korean nuclear weapons will have range enough to reach the US. 

But the report also reminds us that North Korea has recently launched several successful missile tests, and says that though the cyber-attacks seem to have been effective, they are ultimately just a stalling tactic.

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise. 

Obama told Trump that North Korea may pose the single biggest challenge to his administration, and that may have to do with the limited range of defense mechanisms the White House will have at its disposal. 

Trump could try to beef up what Obama has done already, meaning greater and more ferocious cyber assaults. He could launch airstrikes against North Korean nuclear facilities, though it's far from certain that such an assault would destroy all that it needs to in order to erase the country's nuclear capabilities. 

He could try talking with North Korea about maybe not continuing to develop nuclear weapons while saber-rattling in the direction of the US. 

He could perhaps speak with the Chinese government about telling their much smaller neighbors, "hey, stop this, or we will not trade with you." 

But Trump's railed against China since the beginning of his campaign, and he's so far been short (and even bullying) toward foreign government officials from Australia to Mexico. 

North Korea has a habit of leading several news cycles per year in the United States, and 2017 should be no exception, especially since Kim is reportedly at least highly suspicious of US efforts to mess with his country's missile launches. 

He ordered an investigation into the matter toward the end of last year and, coincidentally or not, recently had several security officials executed by anti-aircraft weapons. 

Mashable:

You Might Also Read:

US Has A Secret Cyberwar Going Against North Korea:

Cyberwarfare: Borders Offer No Defense:

Did N. Korea Hack S. Korea’s Key Defense Contractor?:

Was North Korea Behind The IoT  DDoS Attack?:

Stuxnet, Secrecy & The New Era of Cyber War:

 

« FBI’s International Framework On Encrypted Data Access
The Next Big Conflict Will Turn On Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: Learn how SOAR helps you streamline security

ON-DEMAND WEBINAR: Learn how SOAR helps you streamline security

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Paramount

Paramount

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

Startup Capital Ventures

Startup Capital Ventures

Startup Capital Ventures is an early stage venture capital firm with a focus on FinTech, Cloud/SaaS, Security, Healthcare IT, and IoT.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing have a simple mission: to make security awareness training more effective, quantifiable and engaging.