It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

So when will North Korea be hit with malware?Stuxnet,flame,duqu,star?

page: 1
1

log in

join
share:

posted on Apr, 5 2013 @ 11:03 PM
link   
I ask this question because I have not seen where North Korea has admitted to being hit by any malware. Kaspersky Labs in Russia was first to find it and report on Stunet. Then the owners kid was kidnapped by people who tracked him through his cell phone and social networks. Then he was quietly released and Kaspersky never said a word about all the other malware tied to Stuxnet. Duqu,star,flame,gause and the list goes on. Just about every area of the world has it's own tailor made malware for that area. Then the strange story of McAfee being wanted for murdering a ex US soldier in South America and all the BS sex stories and drug stories that seemed like a smear campaign until he returned to the US. Then it all just stops and all is quiet? And the maps from Kaspersky lbas does not show any color on North Korea as if they have no data for them?They were left in grey. So were they ever hit? Or have they been hit and just don't know it yet because there program has been off line for so long? When will the US ran Anonymous/hacking contractors working for Homeland Security use it? Or did they not have a way to smuggle it in like they did with Koch Industries and Halliburton selling equipment to Iran with pre installed malware that spread to infect the whole place when the equipment was installed?





posted on Apr, 5 2013 @ 11:10 PM
link   
reply to post by JBA2848
 


A stuxnet virus can only attack a country that has advanced enough computers run the
virus.

Considering that 99% of their hardware is old soviet hardware that does not have processing power in the first place, let alone the ability to run such software. And all there manufacturing and production equipment is manual, or mechanically controlled. There is no place for such a virus to even exist.



posted on Apr, 5 2013 @ 11:18 PM
link   
They seem to be using some computer systems in North Korea.








Heres Iran's.




I do find the windows error funny.





edit on 5-4-2013 by JBA2848 because: (no reason given)



posted on Apr, 5 2013 @ 11:22 PM
link   
Found another one a Compaq computer monitor.




But there not all that old and dated.



edit on 5-4-2013 by JBA2848 because: (no reason given)



posted on Apr, 5 2013 @ 11:26 PM
link   
reply to post by JBA2848
 


Have you ever chatted with anyone fron N korea. I doubt many can get on the interweb.



posted on Apr, 5 2013 @ 11:29 PM
link   
Umm... I'd never seen that picture of Kim watching their recent satellite launch. For a Satellite that is supposedly rogue and out of control? He sure doesn't look that perturbed and he's got absolute control. No one takes a candid shot like that as a 'Gotcha!' if he doesn't approve. So why release it?

Anyone happen to look recently at where that damn thing is going to BE as the month progresses?

It better not be more than it appears or we're blind. First figuratively, then literally on electronics, anyway.

Source - Real Time Satellite Tracking

I feel like I'm going to be sick. If this were a movie, I'd call the ending too obvious.



posted on Apr, 5 2013 @ 11:32 PM
link   
Those computers are in audio video production, and data display for the leader’s enjoyment, and general recording.

No mater what you do to those computers, it won’t affect the operation of one piece of critical equipment.

If you look at video of NK nuclear reactors, you will see that they are using manual non computerized control consoles. Along with basic closed circuit TV.






They did not take the modernization rout on critical infrastructure that Iran did.



posted on Apr, 5 2013 @ 11:38 PM
link   
reply to post by rockymcgilicutty
 


www.dailymail.co.uk...




As executive chairman of Google, Eric Schmidt clearly likes computers - in fact, he likes them so much that he even takes photos of them, as was evident on a recent trip to North Korea. The businessman felt compelled to photograph the machines while visiting a university library in the region. During the tour of Kim Il Sung University in Pyongyang, Schmidt watched students browsing the internet - even using his company's own search engine. Read more: www.dailymail.co.uk... Follow us: @MailOnline on Twitter | DailyMail on Facebook





They must be on the web.



posted on Apr, 5 2013 @ 11:43 PM
link   
reply to post by Mr Tranny
 


That would be the nuclear plant what about the missile launch systems they seem to be ran by computers. A complete network shut down from a attack and missile launch would be light the fuse and wonder where it is going to go afterwards?



posted on Apr, 5 2013 @ 11:46 PM
link   
reply to post by JBA2848
 


Who else do you think would be launching those cyber attacks on the US and SK?

There is going to be a sub group of trusted individuals that will be given unrestricted access to allow them to become proficient in the use of the technology so they can wage war on the opponent’s own systems.


They also run around posting propaganda, and trying to subvert the resolve of the opposing population. But those systems are in no way connected to critical infrastructure.



posted on Apr, 5 2013 @ 11:49 PM
link   
reply to post by JBA2848
 


The computers are used to monitor the data streams being transmitted by the missile, but there is no evidence that the computers have any ability to control what they are monitoring. They are strictly being used as data recording and display devices.



posted on Apr, 6 2013 @ 12:05 AM
link   

Originally posted by Mr Tranny
reply to post by JBA2848
 


A stuxnet virus can only attack a country that has advanced enough computers run the
virus.

Considering that 99% of their hardware is old soviet hardware that does not have processing power in the first place, let alone the ability to run such software. And all there manufacturing and production equipment is manual, or mechanically controlled. There is no place for such a virus to even exist.




Awesome security. If your computer can't activate / run the virus you're safe. Ironic.



posted on Apr, 6 2013 @ 12:07 AM
link   
reply to post by Mr Tranny
 


They traced the ip to China but still wanted to blame North Korea.

www.guardian.co.uk...

And then this article even says the US and South Korea then attacked North Korea's internet.


It is all propaganda and you can't get a straight answer. North Korea threatens to launch a missile and that means they must be behind a cyber attack that was traced to China?Sounds like they just want to blame everything on North Korea. China does host North Korea's official websites though. Japan and Australia get second hand and anything we get in the US has already passed through a few countries and has a few layers of BS attached.



posted on Apr, 6 2013 @ 12:10 AM
link   
reply to post by billy565
 


The big difference might be the US built the Iranian nuclear facility. Yes we built it and Russia is just rebuilding what the US built and Israel blew up.



posted on Apr, 6 2013 @ 12:23 AM
link   

Originally posted by JBA2848
reply to post by Mr Tranny
 


They traced the ip to China but still wanted to blame North Korea.


I explained it in the other thread on the issue.

First thing, it’s obvious that an attacker never directly attacks an asset with his own system. That is beyond stupid.

You use computers out in the wild that you have compromised to launch the attack. You control those attack computers via compromised servers and other computers so you have multiple levels of protection from discovery.

And the reason the attacking computers were Chinese is obvious. It’s been a running problem in china for years. A good portion of the OS software in china is pirated, and not updated. So there is a large user base of easily harvested computers to use in your attack. And they happen to be relatively geographically close to the target network. And the network connections between china and SK is relatively large which will support a significant attack.

The Chinese computer base has been used in all types of distributed attacks for countless years now. So why should it change now? No mater who is actually attacking SK, it is obvious that they are going to use compromised Chinese computers to do it.



posted on Apr, 6 2013 @ 12:45 AM
link   
reply to post by Mr Tranny
 


"A good portion of the OS software in china is pirated, and not updated"

Did you actually say this? So... pirated software is not updatable? Even from the original and legit update servers...?

Are you sure...?



posted on Apr, 6 2013 @ 12:55 AM
link   
reply to post by FraternitasSaturni
 


You can get critical patches through various methods, but most people don’t. The state most of them will be left is the state the last service pack that was installed left it in.

That makes a large group of computers vulnerable to fresh exploits that have came out since the last major service pack.



posted on Apr, 6 2013 @ 01:03 AM
link   
I find it strange that North Korea only has around a thousand IP addresses for the whole country. But South Korea blames them for running a large cyber attack on all the banks in South Korea.

bgp.he.net...



posted on Apr, 6 2013 @ 01:29 AM
link   
Let´s hope they don't got a anti virus installed..

There is no need to hit north korea with anything.. its a very poor country with a small military force with outdated equipment, but all the people of north korea are brainwashed to believe the leader of north korea is a powerful immortal god



posted on Apr, 6 2013 @ 01:43 AM
link   
China has recently made a deal and Ubuntu is creating an "official state operating system" for China.

Stux attacked only a very specific type of Seimens computer used in uranium enrichment facilities. It was deadly to that one particular system, but not of any use to anything else.

It is probable that Cybercommand would strike quite heavily if we are planning any sort of invasion of bombing of NoKo - but before that US attacks would likely be exploratory and with as small a footprint as possible - part of the trailblazing for that larger, cover attack. Such an attack would focus upon blocking internal NoKo communications and disabling military targets, such as radar sites, bunkers, and missile silos.

Malware might be used - especially if a custom trojan has been crafted to target specific infrastructure in NoKo. The smart money, however, would be more upon a massive DDoS attack in unison with brute force attacks meant to get root on key systems.







 
1

log in

join