Friday, January 31, 2025
HomevpnVPN Flaw Let North Korea To Hack South's Nuclear Research Institute

VPN Flaw Let North Korea To Hack South’s Nuclear Research Institute

Published on

SIEM as a Service

Follow Us on Google News

The Yonhap News Agency and Ha Tae-keung the politician of South Korea have reported that Korea’s biggest nuclear research institute KAERI got hacked by some hacking group of North Korea.

However, the security breach of the Korea Atomic Energy Research Institute has damaged nearly 13 web pages, that took place on May 14. 

After knowing about this attack Ha Tae-keung a member of the Parliament’s Intelligence Committee had made some investigation. Later the Deputy came to know that Kimsuky is behind this attack, it is a North Korean APT group that performed this attack.

The Deputy responded that there is much further detail that is not yet cleared about this breach, that’s why the organization is still investigating the attack and trying its best to find out all the key details that have been breached by the hackers.

VPN Flaw Exploited to Hack

However, this breach has taken place over an anonymous virtual private network (VPN) vendor that has involved a total of 13 IP addresses, one of which — “27.102.114[.]89”, and as per the report this IP address has been linked with the threat actors of Kimsuky.

The researchers pronounced that they are still not clear regarding what VPN vulnerability was exploited to attack the institution. 

But during the investigation, the security researchers claimed that there are some unpatched VPN systems that have been attacked recently by many threat actors, and they are from:-

  • Pulse Secure
  • SonicWall
  • Fortinet FortiOS
  • Citrix

The experts asserted that these kinds of attacks are quite risky, as if any sensitive information gets leaked to North Korea then it could pose serious security hazards.

KAERI is one of the biggest think tanks of South Korea that is studying nuclear technology along with the different reactors and fuel rods.

At first, everyone has denied and made a false report, that declared that there was no hacking event, initially after investigating the whole matter the Assemblyman Ha Tae-Kyung announced that every one of the institutes has confessed to the attack.

However, the KAERI is a national research institute that has played a very significant role in constructing South Korea’s own nuclear power plant, not only this but it also transfers nuclear technologies direct to the local industries for practical applications.

This is not the first time, South Korea has accused North Korea of initiating a large number of ​cyberattacks. All these attacks also include the breach that took place in 2011 against several banks in the country.

Moreover, the cyberattacks also targeted a state-owned nuclear reactor operator that took place in 2015, not only this but the hackers have also targeted the Defense Ministry in 2016. 

The deputy confirmed that they will try their best to find all the possible clues regarding this attack, as it’s one of the most crucial attacks that might cause many serious damges to the country.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Authorities Seized 39 Websites that Selling Hacking Tools to Launch Cyber Attacks

Authorities have seized 39 websites allegedly used to sell hacking tools and fraud-enabling software.The...

Yeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

A critical security flaw has been identified in the popular Yeti Forensic Intelligence platform,...

Cisco Webex Chat Vulnerabilities Expose Organization Chat Histories to Attackers

A major cybersecurity vulnerability in Cisco Webex Chat (previously known as IMI Chat) has...

VMware Aria Operations Vulnerabilities Allow Attackers to Perform Admin-Level Actions

VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

North Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased...

Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data

Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in...