Saturday, June 14, 2025
HomevpnVPN Flaw Let North Korea To Hack South's Nuclear Research Institute

VPN Flaw Let North Korea To Hack South’s Nuclear Research Institute

Published on

SIEM as a Service

Follow Us on Google News

The Yonhap News Agency and Ha Tae-keung the politician of South Korea have reported that Korea’s biggest nuclear research institute KAERI got hacked by some hacking group of North Korea.

However, the security breach of the Korea Atomic Energy Research Institute has damaged nearly 13 web pages, that took place on May 14. 

After knowing about this attack Ha Tae-keung a member of the Parliament’s Intelligence Committee had made some investigation. Later the Deputy came to know that Kimsuky is behind this attack, it is a North Korean APT group that performed this attack.

- Advertisement - Google News

The Deputy responded that there is much further detail that is not yet cleared about this breach, that’s why the organization is still investigating the attack and trying its best to find out all the key details that have been breached by the hackers.

VPN Flaw Exploited to Hack

However, this breach has taken place over an anonymous virtual private network (VPN) vendor that has involved a total of 13 IP addresses, one of which — “27.102.114[.]89”, and as per the report this IP address has been linked with the threat actors of Kimsuky.

The researchers pronounced that they are still not clear regarding what VPN vulnerability was exploited to attack the institution. 

But during the investigation, the security researchers claimed that there are some unpatched VPN systems that have been attacked recently by many threat actors, and they are from:-

  • Pulse Secure
  • SonicWall
  • Fortinet FortiOS
  • Citrix

The experts asserted that these kinds of attacks are quite risky, as if any sensitive information gets leaked to North Korea then it could pose serious security hazards.

KAERI is one of the biggest think tanks of South Korea that is studying nuclear technology along with the different reactors and fuel rods.

At first, everyone has denied and made a false report, that declared that there was no hacking event, initially after investigating the whole matter the Assemblyman Ha Tae-Kyung announced that every one of the institutes has confessed to the attack.

However, the KAERI is a national research institute that has played a very significant role in constructing South Korea’s own nuclear power plant, not only this but it also transfers nuclear technologies direct to the local industries for practical applications.

This is not the first time, South Korea has accused North Korea of initiating a large number of ​cyberattacks. All these attacks also include the breach that took place in 2011 against several banks in the country.

Moreover, the cyberattacks also targeted a state-owned nuclear reactor operator that took place in 2015, not only this but the hackers have also targeted the Defense Ministry in 2016. 

The deputy confirmed that they will try their best to find all the possible clues regarding this attack, as it’s one of the most crucial attacks that might cause many serious damges to the country.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

New Report: Governments Struggle to Regain Backdoor Access to Secure Communications

A crucial point has been reached in the conflict between personal privacy and governmental...

Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users

A group dubbed "Dark Partners" by cybersecurity researchers has launched a sophisticated malware campaign...

Hackers Exploit Cloudflare Tunnels to Launch Stealthy Cyberattacks

The cybersecurity landscape, malicious actors, including notorious ransomware groups like BlackSuit, Royal, Akira, Scattered...