Home / News

New Analysis Suggests Recent Cyberattacks Against US and South Korea Originated from UK Not N. Korea

Nguyen Minh Duc, senior security director at Bach Khoa Internetwork Security (Bkis), says that the source of recent cyberattack against US and South Korean government websites was not North Korea — as widely reported — but UK. Based on Bkis analysis, a report today by Nguyen Minh Duc says that a master server located in UK was found to control the 8 Command and Control servers responsible for the series of cyberattacks last week.

According to the Koran Times, the Korea Communications Commission (KCC), the country's broadcasting and telecommunications regulator, has backed Bkis report and that "law enforcement authorities are currently seeking cooperation with the British government to investigate the attack source."

Related Links:
Korea and US DDoS attacks: The attacking source located in United Kingdom Bkis Security Blog, Jul.14.2009
Source of Cyber Attacks Originated From Britain The Korean Times, Jul.14.2009
UK, not North Korea, source of DDOS attacks, researcher says PC World, Jul.14.2009

Related topics: Cyberattack, DDoS, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

Cut the sensationalism The Famous Brett Watson  –  Jul 14, 2009 1:59 PM PST

Nobody knows where these attacks originated yet. The UK link is merely another compromised host in the long chain of intermediate systems behind which the real miscreant is hiding. Wired Threat Level is already reporting that the UK host was in turn controlled (via VPN link) by a host in Miami, Florida. You can be quite sure that Miami isn't the origin, either.

Cut the Political Grandstanding also Glenn Harris  –  Jul 22, 2009 6:16 AM PST

Here we go again with knee jerk reactions from at least one member of Congress http://www.wired.com/threatlevel/2009/07/show-of-force/

To post comments, please login or create an account.

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

Q3 2014 DDoS Trends: Attacks Exceeding 10 Gbps on the Rise

3 Questions to Ask Your DNS Host About DDoS

Afilias Partners With Internet Society to Sponsor Deploy360 ION Conference Series Through 2016

Neustar to Build Multiple Tbps DDoS Mitigation Platform

The Latest Internet Plague: Random Subdomain Attacks

Digging Deep Into DNS Data Discloses Damaging Domains

New gTLDs and Best Practices for Domain Management Policies (Video)

Nominum Announces Future Ready DNS

New from Verisign Labs - Measuring Privacy Disclosures in URL Query Strings

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Continuing to Work in the Public Interest

Verisign Named to the OTA's 2014 Online Trust Honor Roll

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

Dyn Acquires Internet Intelligence Company, Renesys

Tips to Address New FFIEC DDoS Requirements

Smokescreening: Data Theft Makes DDoS More Dangerous

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Sponsored Topics

Minds + Machines

Top-Level Domains

Sponsored by
Minds + Machines
Verisign

Security

Sponsored by
Verisign
Afilias

DNSSEC

Sponsored by
Afilias
dotMobi

Mobile

Sponsored by
dotMobi