Home Business IT Security South Korea's "Dark Seoul" exposed as a military cyber-attack
South Korea's "Dark Seoul" exposed as a military cyber-attack Featured

McAfee's investigations into the March 20th "Dark Seoul" attack strongly suggest it had a military focus.

On March 20th 2013, South Korea came under a strong, wide-ranging cyber-attack. Financial services and media were presumed to have been the primary targets. ATM networks were disabled and tens of thousands of computers had their hard disks effectively wiped.

Extensive research by McAfee has uncovered a significant amount of information to suggest that this incident was merely a smokescreen to obscure and bring to a close a long-running attack on military targets throughout the country.

Detailed code analysis has shown that the attack, now called Operation Troy (for the frequent references to the ancient Roman military throughout the code-base) was the product of a group known as New Romanic Cyber Army Team, and that the attack had its origins in 2010.

Image: McAfee Labs

Throughout the evolution of the malware, little changed. "In fact," as McAfee's threat researcher Ryan Sherstobitoff noted, "The main differences between NSTAR, Chang/Eagle, and HTTP Troy had more to do with programming technique than functionality."

One of the main components of the malware was constructed to search infected computers for a broad range of decidedly militaristic terms (for instance, "Defense" "Weapon" "Key Resolve Drill" or "Artillery" to name just four out of a list of 35 on page 22 of the report). Once found, the computer would be ranked for its likely importance based on the words and their frequency in files stored. A later function would package the files into a zip image and exfiltrate them to the attackers' servers. Of course the more 'interesting' computers were uploaded first.

The analysis by Sherstobitoff and fellow McAfee researchers very quickly showed that in order to achieve the outcome, the attack could not have performed in a short period of time. Reports at the time suggested a mass phishing or similar attack to have rapidly affected many thousands of computers. Sherstobitoff et al believe this to not be the case. Instead they suggest perhaps a single successful spear-phishing attack gave an entry point to a trusted computer from where the attack stealthily spread widely.

It was only as the final act of 'defiance' that the affected computers were instructed to self-destruct, probably in the hope that the real cause would never be discovered.

The McAfee report offers no thoughts on the identity of the instigator of the attack, but in iTWire's opinion, the list of likely candidates is a very short one, numbering significantly less than five.


As one of the world’s largest social networking services, Facebook handles a lot of user information, and requires input from an astounding range of stakeholders 24 hours a day, 7 days a week — from both inside and outside the business.

Discover how Facebook was helped to connect remote employees, vendors, consultants, and partners to applications and web services quickly and reliably - without risking sensitive data.



Explore your Network Treasure Trove to get the IT Budget you want

With Australian businesses projected to spend over $78.7 Billion why does it feel like you can never get the budget you need?.

In most cases your budget will get approved because the proposals are not only technically correct, but also provide good, credible evidence on how the spend aligns with key business objectives.

Did you know that your Network Monitoring tool can help you build a comprehensive business case without an MBA?



David Heath

joomla statistics

David Heath has over 25 years experience in the IT industry, specializing particularly in customer support, security and computer networking. Heath has worked previously as head of IT for The Television Shopping Network, as the network and desktop manager for Armstrong Jones (a major funds management organization) and has consulted into various Australian federal government agencies (including the Department of Immigration and the Australian Bureau of Criminal Intelligence). He has also served on various state, national and international committees for Novell Users International; he was also the organising chairman for the 1994 Novell Users' Conference in Brisbane. Heath is currently employed as an Instructional Designer, building technical training courses for industrial process control systems.






Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities