Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency

The United States has reportedly been engaged in offensive cyberattacks against North Korea, but with no destructive results. According to a report by the Washington Post, President Donald Trump signed a directive earlier this year of putting pressure against North Korea that involved several diplomatic and cyber-military actions, including using cyber activities against the country.

The United States Cyber Command, which was elevated to a Unified Combatant Command by the President earlier this year, targeted North Korea’s military spy agency, the Reconnaissance General Bureau. The attack was a distributed denial of service (DDoS) campaign with an aim to flood North Korean spy agency’s servers with traffic, crippling its access to the internet.
“The elevation of United States Cyber Command demonstrates our increased resolve against cyberspace threats and will help reassure our allies and partners and deter our adversaries,” the White House had said when the President had elevated its status to a combatant unit. 
“Through United States Cyber Command, we will tackle our cyberspace challenges in coordination with like-minded allies and partners as we strive to respond rapidly to evolving cyberspace security threats and opportunities globally.”

It is unclear when exactly the DDoS attack was launched and how long it lasted, but  overall campaign, that included a diplomatic campaign to push other countries to sever all ties with Pyongyang, was started in March, this year.

The officials in the US believe that the campaign wasn’t destructive and was merely designed to put pressure on the country. “Nonetheless, some North Korean hackers griped that lack of access to the Internet was interfering with their work,” WaPo reported citing an official. 

While North Korea isn’t going to find any vocal allies, the latest DDoS attack does make a point that the United States is capable of crippling an adversary’s cyberwar capabilities, even if temporarily. 

“In effect, it went live with a stable link between Russia and North Korea shortly after the US Cyber Command action finished,” the report adds. Analysts believe that with the DDoS attacks, the US could have had two goals: send a warning to the country and push it to reveal its other channels of internet access or use those that are potentially being monitored.

Some, however, worry that the operation, while not destructive when looked through the US officials’ eyes, might be taken as an act of war by the North Korean administration that could retaliate against the United States using its critical infrastructure that some believe has already been compromised.

North Korea hasn’t been innocent itself when it comes to cyberattacks. “What I can tell you is that North Korea has itself been guilty of cyberattacks, and we are going to take appropriate measures to defend our networks and systems,” a US official said. But Eric Rosenbach, former assistant secretary of defense, warned that “there’s accompanying risk of an escalation and a North Korean cyber-counterattack.”

WCCFTech

You Might Also Read:

Cyberwar: A Guide:

US Steps Up Its Cyberwar Capability:

Trump Tells US Cyber Command To Get More Aggressive:
 

« China Denies Targeted Cyber Attack
Russia Provides New Internet Connection to N.Korea »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.

Stratsec

Stratsec

Stratsec is a global team of experts on a mission to protect human life, well-being and the environment against cyber-driven threats.

Operant AI

Operant AI

Operant AI is the only Runtime AI Application Defense Platform that actively protects every layer of live cloud and AI applications from infra to APIs.