Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

McAfee blames North Korea for DDoS attack

Research points to cross border cyber attack

Article comments

The cyber attacks that paralysed a handful of major South Korean websites earlier this year were almost certainly carried out by North Korea or parties allied with the country, computer security company McAfee said Tuesday in a report.

The company's analysis, carried out with the help of the South Korean and US governments, is one of the most thorough yet published on the March attacks, and details how they were carried out, and why they were so difficult to counter.

In investigating the incident, the report draws clear parallels with a similar attack that knocked South Korean and US websites offline in 2009 and comes to an unsettling conclusion: the attacks were likely designed to test South Korea's cyber defense and response, and could be the prelude of a much larger attack in the future.

The attack began on March 4 when thousands of computers started bombarding 14 websites with traffic. The sites included prominent government agencies, South Korean companies and the home page of US Forces Korea. The method, called a DDoS (distributed denial of service) attack, is designed to overwhelm the sites with so many requests that they become overloaded. To genuine users they appear very slow or, in many cases, offline.

The computers that took part in the attack would have been earlier infected with a piece of malicious software that lay dormant waiting for instructions from control servers, which were themselves compromised computers. In the case of the March attack, these servers made up the middle layer of the infrastructure and were controlled by an additional tier of command computers.

Encryption was used throughout the system to make it more difficult to analyse the messages and computer code. In an extra step to make analysis even more difficult, multiple encryption algorithms were employed at different stages of the system.

The attacks lasted up to 10 days after which time the malicious software was programmed to self-destruct. Key files were deleted and overwritten, and then the master boot record of the disk on which they were stored was corrupted. This would leave the disk unusable, even for the legitimate owner of the computer being used.

After analysing the attack and how it was carried out, researchers had one big question: Why would you build so much sophistication into software designed to carry out a pretty primitive attack?

"DDoS can be done with software from your local cyber criminal," said Dmitri Alperovitch, vice president of threat research for McAfee Labs, in a telephone interview. "The level of effort that went into this one far exceeds any DDoS botnets until now."

The attack didn't try to evade detection -- taking down major websites is guaranteed to draw attention -- but it did seek to impede analysis of the attack, said Alperovitch. The investigators concluded that the attack was political in nature and had a predetermined and narrow focus.

"It was to test the response of the South Korean government," he said. "When you look at who might do that, one actor jumps off the page. The North Korean government would want to see if a future conflict could have a cyber impact as well as a real-life impact."

McAfee didn't find any concrete evidence linking the attacks to North Korea, but Alperovitch said the company is convinced the attack was conducted by the government of the reclusive Asian nation or a group closely allied with it.

The same conclusion was reached by a South Korean government investigation into the attacks.

North and South Korea remain technically at war, having never signed a peace agreement at the close of the Korean War in 1953. The border between the two neighbors is one of the most heavily fortified in the world.

The 2011 attacks showed an additional degree of sophistication over the 2009 attacks, said McAfee. The March incident involved 14 target websites, less than a third of the 40 sites hit in 2009, and this time included no websites in the U.S.

"This time they dropped all the US targets," he said. "They know taking down serves no purpose, and taking down doesn't impact the US economy because they're hitting the website, not the trading system."

The narrower range of targets and enhancements to the command and control systems indicate the attackers learned several lessons from their first attempt in 2009, said Alperovitch. The lessons learned this time could further be developed to ensure greater success the next time around.


More from Techworld

More relevant IT news


Dave Kimble said: gt McAfee didnt find any concrete evidence linking the attacks to North Korea but Alperovitch said the company is convinced the attack was conducted by the government of the reclusive Asian nation Why If taking down WhiteHousegov and NYSEcom serves no purpose then this take-down serves no purpose either and so no source can be ascribed to it This sounds like McAfee merely finger-pointing and adding to the pressure for the US to take even more stringent restrictions on internet freedom

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *