North Korea attracts Anonymous threats and leaks

  • Liam Tung (CSO Online)
  • — 03 April, 2013 16:01

Hackers claiming to be part of ‘Anonymous’ say they have stolen 15,000 passwords from Uriminzokkiri.com, a North Korea run website hosted in China.

Details of the claimed leak were posted online on Wednesday via the Twitter account Anonymous_Korea, which has over the past week been rallying support for denial of service attacks on several North Korean websites.

The message calls on the North Korean government to “stop making nukes and nuke threats” as tensions rise between the north and south.

To support the claim they had stolen over 15,000 membership records, the hackers posted six user names, email addresses and dates of birth supposedly from the website.

The hackers also claimed to be “inside” North Korea’s intranet, mail servers and web servers, however the North Korea Tech blog, which first reported the alleged data breach, noted that reaching North Korea’s walled off intranet could be a difficult proposition.

The website that is claimed to have been attacked is hosted in China by Chinese telecoms company China Unicom.

A more prominent cyber threat North Korea cited last month were the “virus attacks” it claimed coincided with US-South Korea military drills.

If attacks were launched on .kr (North Korea) websites and servers, military hackers or protestors would only have a handful to select, according to internet security firm, Netcraft. http://news.netcraft.com/archives/2013/04/02/april-2013-web-server-survey.html

While Anonymous hackers have claimed to have hit some of those .kr websites, North Korea's internet itself was suffering intermittent outages on 13 March, according to network performance and analytics firm Rensys. Days prior to North Korea announcing it was being hit by virus attacks, all four networks that underpin its internet disappeared twice from the global routing table.

Shortly after, .

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags: Anonymous, cyber attacks, north korea

Turkey’s ISPs hijack Google’s DNS service, killing bypass for Twitter, YouTube ban

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

AVG Internet Security 2011 Business Edition

Ultimate protection for your small or medium-sized business

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.