Sunday, January 26, 2025
HomevpnVPN Flaw Let North Korea To Hack South's Nuclear Research Institute

VPN Flaw Let North Korea To Hack South’s Nuclear Research Institute

Published on

SIEM as a Service

Follow Us on Google News

The Yonhap News Agency and Ha Tae-keung the politician of South Korea have reported that Korea’s biggest nuclear research institute KAERI got hacked by some hacking group of North Korea.

However, the security breach of the Korea Atomic Energy Research Institute has damaged nearly 13 web pages, that took place on May 14. 

After knowing about this attack Ha Tae-keung a member of the Parliament’s Intelligence Committee had made some investigation. Later the Deputy came to know that Kimsuky is behind this attack, it is a North Korean APT group that performed this attack.

The Deputy responded that there is much further detail that is not yet cleared about this breach, that’s why the organization is still investigating the attack and trying its best to find out all the key details that have been breached by the hackers.

VPN Flaw Exploited to Hack

However, this breach has taken place over an anonymous virtual private network (VPN) vendor that has involved a total of 13 IP addresses, one of which — “27.102.114[.]89”, and as per the report this IP address has been linked with the threat actors of Kimsuky.

The researchers pronounced that they are still not clear regarding what VPN vulnerability was exploited to attack the institution. 

But during the investigation, the security researchers claimed that there are some unpatched VPN systems that have been attacked recently by many threat actors, and they are from:-

  • Pulse Secure
  • SonicWall
  • Fortinet FortiOS
  • Citrix

The experts asserted that these kinds of attacks are quite risky, as if any sensitive information gets leaked to North Korea then it could pose serious security hazards.

KAERI is one of the biggest think tanks of South Korea that is studying nuclear technology along with the different reactors and fuel rods.

At first, everyone has denied and made a false report, that declared that there was no hacking event, initially after investigating the whole matter the Assemblyman Ha Tae-Kyung announced that every one of the institutes has confessed to the attack.

However, the KAERI is a national research institute that has played a very significant role in constructing South Korea’s own nuclear power plant, not only this but it also transfers nuclear technologies direct to the local industries for practical applications.

This is not the first time, South Korea has accused North Korea of initiating a large number of ​cyberattacks. All these attacks also include the breach that took place in 2011 against several banks in the country.

Moreover, the cyberattacks also targeted a state-owned nuclear reactor operator that took place in 2015, not only this but the hackers have also targeted the Defense Ministry in 2016. 

The deputy confirmed that they will try their best to find all the possible clues regarding this attack, as it’s one of the most crucial attacks that might cause many serious damges to the country.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

North Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased...

Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data

Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in...

Free Android VPNs Suffering Encryption Failures, New Report

VPN apps for Android increase privacy and security over the internet since connection data...