Saturday, December 28, 2024
HomevpnVPN Flaw Let North Korea To Hack South's Nuclear Research Institute

VPN Flaw Let North Korea To Hack South’s Nuclear Research Institute

Published on

SIEM as a Service

The Yonhap News Agency and Ha Tae-keung the politician of South Korea have reported that Korea’s biggest nuclear research institute KAERI got hacked by some hacking group of North Korea.

However, the security breach of the Korea Atomic Energy Research Institute has damaged nearly 13 web pages, that took place on May 14. 

After knowing about this attack Ha Tae-keung a member of the Parliament’s Intelligence Committee had made some investigation. Later the Deputy came to know that Kimsuky is behind this attack, it is a North Korean APT group that performed this attack.

- Advertisement - SIEM as a Service

The Deputy responded that there is much further detail that is not yet cleared about this breach, that’s why the organization is still investigating the attack and trying its best to find out all the key details that have been breached by the hackers.

VPN Flaw Exploited to Hack

However, this breach has taken place over an anonymous virtual private network (VPN) vendor that has involved a total of 13 IP addresses, one of which — “27.102.114[.]89”, and as per the report this IP address has been linked with the threat actors of Kimsuky.

The researchers pronounced that they are still not clear regarding what VPN vulnerability was exploited to attack the institution. 

But during the investigation, the security researchers claimed that there are some unpatched VPN systems that have been attacked recently by many threat actors, and they are from:-

  • Pulse Secure
  • SonicWall
  • Fortinet FortiOS
  • Citrix

The experts asserted that these kinds of attacks are quite risky, as if any sensitive information gets leaked to North Korea then it could pose serious security hazards.

KAERI is one of the biggest think tanks of South Korea that is studying nuclear technology along with the different reactors and fuel rods.

At first, everyone has denied and made a false report, that declared that there was no hacking event, initially after investigating the whole matter the Assemblyman Ha Tae-Kyung announced that every one of the institutes has confessed to the attack.

However, the KAERI is a national research institute that has played a very significant role in constructing South Korea’s own nuclear power plant, not only this but it also transfers nuclear technologies direct to the local industries for practical applications.

This is not the first time, South Korea has accused North Korea of initiating a large number of ​cyberattacks. All these attacks also include the breach that took place in 2011 against several banks in the country.

Moreover, the cyberattacks also targeted a state-owned nuclear reactor operator that took place in 2015, not only this but the hackers have also targeted the Defense Ministry in 2016. 

The deputy confirmed that they will try their best to find all the possible clues regarding this attack, as it’s one of the most crucial attacks that might cause many serious damges to the country.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

North Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased...

Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data

Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in...

Free Android VPNs Suffering Encryption Failures, New Report

VPN apps for Android increase privacy and security over the internet since connection data...