海角大神

Why cyberattacks are the logical North Korean weapon

Suspicion for yesterday's cyberattack quickly fell on North Korea. Cyberwarfare gives North Korea the chance to inflict damages on a militarily superior foe, without having to own the responsibility.

In this photo released by Korean Broadcasting System, KBS employees try to recover a computer server a day after a cyberattack caused computer networks at the company to crash, in Seoul, South Korea, Thursday, March 21, 2013.

Korean Broadcasting System/AP

March 21, 2013

After an apparent cyberattack disrupted operations at a number of South Korean broadcasters and banks yesterday, officials here are trying to figure out whether North Korea is responsible.听If so, it would show that despite the stark contrast in development between the two countries, the North is capable of striking its southern rival in an unconventional, but harmful, manner.听听

For all its bombast, North Korea may actually be听reluctant to enter into a military conflict with the South and its US allies because of the alliance鈥檚 superior military strength. But cyberattacks can be harmful, create a climate of fear, and avoid any direct consequences.听

This type of attack suits North Korea.

The Trump administration faces hundreds of lawsuits. Here鈥檚 where key cases stand.

鈥淐yberwar is right up their street. It鈥檚 cheap and deniable,鈥 says Aidan Foster Carter, a Korea expert at the University of Leeds.听

Cyberattacks on South Korean government agencies and financial institutions in 2009 and 2011 were attributed to North Korea. And the North has issued threats specifically targeting South Korean conservative media outlets (including some of the networks that reported disturbances yesterday), which tend to be harshly critical of Pyongyang.听听

The attacks come amid high tensions on the Korean Peninsula, with the North issuing unusually hostile threats in retaliation for US-South Korea military exercises, as well as increased United Nations sanctions following the North's third nuclear test.

The watchdog Korea Communications Commission announced today that part of the damaging code came from an Internet Protocol (IP) address in China. While this can鈥檛 be traced directly to North Korea, some of whom operate in China, according to defector reports.

China denied any responsibility for the hacking attack, saying such anonymous cross-border incidents were a global problem. "Hackers often use the IP addresses of other countries to carry out their attacks," Foreign Ministry spokesman Hong Lei told reporters in Beijing on Thursday. 听

No country recognizes Somaliland鈥檚 independence. Why the US might.

A high-ranking official in the Blue House, South Korea鈥檚 presidential office, told Yonhap News Agency, 鈥淸The government] is closely analyzing the incident with all possibilities open, while bearing a strong suspicion that North Korea conducted the attack."听听

Since they signed a truce 鈥 effectively ending the Korean War 鈥 in 1953, South and North Korea have gone in very different directions, and the differences between them are vividly illustrated in their technological capabilities.听

According to data released in July 2012 by the Organization for Economic Cooperation and Development, there are more Internet connections than there are people in South Korea. 听Many daily tasks here are performed online, from banking and the purchasing of movie or train tickets to social interactions. As such, South Koreans have a lot to lose from a malicious attack on the country鈥檚 IT infrastructure.听

By stark contrast, in North Korea, which regularly experiences power outages, only a fraction of privileged elite can get online, and even then would just have access to a state-controlled intranet that only permits approved sites.听

Though North Korea is generally undeveloped, it does have a corps of hackers who are trained by the state and apparently able to carry out cyberattacks. 鈥淣orth Korean hackers are obviously quite capable technically,鈥 says Moon Young-woo, president of IT Bank, a company that provides consulting on how to safeguard information and prevent hacking.听

鈥淭heir skills are good. If they were behind this attack, it was probably meant to put pressure on the new [South Korean] government. If it was done by Chinese hackers, it was probably just some people who wanted to show off their skills,鈥 says Mr. Moon.

And even though South Korea is the far more developed country, it is still at least somewhat vulnerable to hacking. After Wednesday鈥檚 disturbance, the banks and broadcasters were able to get most operations running again without too much of a delay, but a more effective malicious code could perhaps one day do more damage.

After the 2011 attack, which targeted government and banking websites, South Korea announced a beefed-up cybersecurity strategy that involved more than a dozen government ministries. The stronger system has apparently been more successful at preventing network intrusions.

鈥淪outh Korea鈥檚 defenses are strong enough to deal with the kinds of attacks we鈥檝e seen in the past. But if a group of hackers were to execute a targeted attack, meaning they develop a virus specifically tailored to one target, it would be very hard to defend because the virus could be new and unfamiliar,鈥 says Hong Min-pyo, president of SEWorks and one of Korea鈥檚 top IT experts. Mr. Hong is what Koreans call a "good" hacker, working to stifle the efforts of malicious hackers and stop the spread of harmful code.听

While online freedoms in North Korea are still exceptionally limited, over the past few months Pyongyang has made some cautious efforts to open up technologically. Starting in late February, foreign visitors to the North were able to use mobile phones and Internet. This service is only available to foreigners, but is noteworthy as it allows access to social media such as Twitter and Instagram. 听