Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency

The United States has reportedly been engaged in offensive cyberattacks against North Korea, but with no destructive results. According to a report by the Washington Post, President Donald Trump signed a directive earlier this year of putting pressure against North Korea that involved several diplomatic and cyber-military actions, including using cyber activities against the country.

The United States Cyber Command, which was elevated to a Unified Combatant Command by the President earlier this year, targeted North Korea’s military spy agency, the Reconnaissance General Bureau. The attack was a distributed denial of service (DDoS) campaign with an aim to flood North Korean spy agency’s servers with traffic, crippling its access to the internet.
“The elevation of United States Cyber Command demonstrates our increased resolve against cyberspace threats and will help reassure our allies and partners and deter our adversaries,” the White House had said when the President had elevated its status to a combatant unit. 
“Through United States Cyber Command, we will tackle our cyberspace challenges in coordination with like-minded allies and partners as we strive to respond rapidly to evolving cyberspace security threats and opportunities globally.”

It is unclear when exactly the DDoS attack was launched and how long it lasted, but  overall campaign, that included a diplomatic campaign to push other countries to sever all ties with Pyongyang, was started in March, this year.

The officials in the US believe that the campaign wasn’t destructive and was merely designed to put pressure on the country. “Nonetheless, some North Korean hackers griped that lack of access to the Internet was interfering with their work,” WaPo reported citing an official. 

While North Korea isn’t going to find any vocal allies, the latest DDoS attack does make a point that the United States is capable of crippling an adversary’s cyberwar capabilities, even if temporarily. 

“In effect, it went live with a stable link between Russia and North Korea shortly after the US Cyber Command action finished,” the report adds. Analysts believe that with the DDoS attacks, the US could have had two goals: send a warning to the country and push it to reveal its other channels of internet access or use those that are potentially being monitored.

Some, however, worry that the operation, while not destructive when looked through the US officials’ eyes, might be taken as an act of war by the North Korean administration that could retaliate against the United States using its critical infrastructure that some believe has already been compromised.

North Korea hasn’t been innocent itself when it comes to cyberattacks. “What I can tell you is that North Korea has itself been guilty of cyberattacks, and we are going to take appropriate measures to defend our networks and systems,” a US official said. But Eric Rosenbach, former assistant secretary of defense, warned that “there’s accompanying risk of an escalation and a North Korean cyber-counterattack.”

WCCFTech

You Might Also Read:

Cyberwar: A Guide:

US Steps Up Its Cyberwar Capability:

Trump Tells US Cyber Command To Get More Aggressive:
 

« China Denies Targeted Cyber Attack
Russia Provides New Internet Connection to N.Korea »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Blake, Cassels & Graydon (Blakes)

Blake, Cassels & Graydon (Blakes)

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

Decent Cybersecurity

Decent Cybersecurity

Decent Cybersecurity is a forerunner and proven partner in the field of cybersecurity, utilizing AI, post-quantum cryptography and quantum resistant blockchain for data protection enhancement.