Default

North Korean Hackers Target U.S.-South Korea Military Drills, Police Say

[ad_1]

SEOUL (Reuters) – Suspected North Korean hackers have focused a joint U.S.-South Korea navy train being held this week although labeled data has not been compromised, South Korean police mentioned on Sunday.

South Korean and U.S. forces will on Monday start 11-day Ulchi Freedom Guardian summer time workout routines to enhance their means to reply to North Korea’s evolving nuclear and missile threats.

North Korea objects to such workout routines saying they’re preparations by the U.S. and its South Korean ally for an invasion of it.

The hackers have been believed to be linked to a North Korean group that researchers name Kimsuky, they usually carried out their hack through emails to South Korean contractors working on the South Korea-U.S. mixed train conflict simulation centre, the Gyeonggi Nambu Provincial Police Company mentioned in a press release.

Political Cartoons on World Leaders

“It was confirmed that military-related data was not stolen,” police mentioned in a press release on Sunday.

North Korea has beforehand denied any function in cyberattacks.

The Kimsuky hackers has lengthy used “spear-phishing” emails that trick targets into giving up passwords or clicking attachments or hyperlinks that load malware, in keeping with researchers.

South Korean police and the U.S. navy carried out a joint investigation and located the IP deal with used within the hacking try matched one recognized in a 2014 hack in opposition to South Korea’s nuclear reactor operator, police mentioned.

At the moment, South Korea accused North Korea of being behind that cyberattack.

(Reporting by Ju-min Park; Modifying by Josh Smith, Robert Birsel)

Copyright 2023 Thomson Reuters.

[ad_2]

Source link