General discussion


Korean cyber attacks traced back to UK

By The 'G-Man.' ·
A malware attack against South Korean and US government websites earlier this month may have come from a server in the UK, researchers claim.

Previously, experts suspected the attacks may have been based in North Korea, but fresh evidence has come to light.

Yesterday, Nguyen Minh Duc, the security director of Bach Khoa Internetwork Security (Bkis) wrote in a blog post that his firm helped analyse the 4 July weekend denial of service attacks following a request from the Korean Computer Emergency Response Team.

His team found the botnet sending out the malware. It was controlled by eight Command and Control (C&C) servers - two of which Bkis took over. Using those, they found the master server, which was controlling the eight C&C servers - and realised it was based in the UK.

"We found a master server located in UK which controls all of the eight C&C servers to make a series of cyber-attacks last week," he writes, explaining the IP address of the server was from the UK. "So the source of the attacks has been identified to be in UK."

Bkis has forwarded the IP address to US and Korean authorities, who are investigating the attack, and also contacted the British Government.

"Having located the attacking source in UK, we believed that it is completely possible to find out the hacker," he says, noting success in tracking the attackers depends on the US and Korean governments.

The Bkis claim was backed by the Korean Communications Commission, according to Korean media reports, but one official noted the attack may not have come from the UK, but merely been delivered through a hacked IP address.

Zombie army

Bkis also suggests the scale of the attack was larger than first estimated. Symantec said 50,000 zombie computers were involved, while the government of South Korea estimated 20,000.

"But, by taking control of two C&C servers and analysing logs on these servers, we count the exact number of zombies that have been querying C&C servers to receive commands," he says.

"Accordingly, there have been 166,908 zombies from 74 countries around the world that have been used for the attacks."

My comment: Yeah, as we all know IP adresses are never spoffed are they?


This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

167K zombies? Legal responsibility

by CharlieSpencer In reply to Korean cyber attacks trac ...

There are laws regulating the operation of motor vehicles on public roads, possession of firearms in public areas, control of hazardous substances on public land and waters.

We need a law requiring responsible operation of a computer on public networks. Allowing your system to become a zombie on the Internet should be treated just like dumping waste in a waterway. No physical or fiscal penalty is required. You get one warning and then the detecting authority is authorized to wipe your system, just like your runaway rabid dog.

Sure, ISPs can disconnect you under TOS agreements. As long as your paying your bill and they aren't directly affected, they're not going to do anything. We've tried letting the market place control this but it clearly isn't working.

Or maybe users should have to post a deposit before they can connect, similar to the deposit on an apartment or rental home. Allow your system to go zombie and your deposit is forfeit and you can't connect until you cough up a new one. Maybe the thought of those sacrificed deposits would get the ISPs' off the stick.

Related Discussions

Related Forums