The two agencies called the North Korean government cyber attackers “Hidden Cobra”, which targeted cyberattacks against the media, aviation, the financial industry, and important infrastructure in the United States and around the world.
The latest details released by the US government’s suspicious action against North Korea’s cyber attack coincided with the growing tension between the two countries as several of the latter’s missile tests. The statement warned that North Korea will continue to rely on network action in the future to advance its military and strategic objectives. In this regard, North Korea denied the attitude. However, this warning statement does not specify the “hidden Cobra” victims of the specific identity, but the victims of the attack or data theft or damage. According to the disclosure, the organization’s attack methods include DoS attacks, keyboard monitoring, remote network connectivity tools and a variety of malicious software.
Firewell’s network intelligence analyst John Hultquist points out that their company is concerned about the growing persecution of cyber attacks from North Korea. Hultquist said that the attacker appeared to have been in the formal launch of the network before the attack on the South Korean financial, energy, transportation companies conducted a reconnaissance work, and the consequences will be very destructive.
In addition, the statement pointed out that “hidden Cobra” usually attack the object is no longer from the official Microsoft patch operating system or the use of Adobe Systems Inc’s Flash software vulnerabilities to attack. In this regard, the report urges organizations to upgrade Adobe Flash and Microsoft Sliverlight to the latest version or to uninstall these applications. On the same day, North Korea released Otto Warmbier, a US college student who had been detained in Pyongyang for 17 months. It was learned that Warmbier was in a coma and needed medical attention.
The post The statement condemns North Korean cyber attacks and warns that the next may be more appeared first on Penetration Testing.