Skip to main content

North Korea probably stole South Korean warship blueprints, lawmaker says

[ad_1]


The plant of South Korea's Daewoo Shipbuilding is seen in Koeje island of South Kyongsang province, about 470 km southeast of Seoul May 15, 2001.

Lee Jae Won | Reuters


The plant of South Korea's Daewoo Shipbuilding is seen in Koeje island of South Kyongsang province, about 470 km southeast of Seoul May 15, 2001.



North Korea probably stole South Korean warship blueprints after hacking into Daewoo Shipbuilding & Marine Engineering Co Ltd's database in April last year, a South Korean opposition lawmaker said on Tuesday.



North Korea has often been implicated in cyber attacks in South Korea and elsewhere but Pyongyang has either ignored or denied accusations of hacking.



"We are almost 100 percent certain that North Korean hackers were behind the hacking and stole the company's sensitive documents," Kyung Dae-soo of the main opposition Liberty Korea Party told Reuters by telephone.




Daewoo Shipbuilding has built several South Korean warships, including an Aegis-class vessel and submarines. It was most likely North Korea had obtained blueprints for these, he said.



The hacking was discovered by a division under South Korea's Ministry of Defence in charge of investigating cases of cybercrime, said Kyung, who received a briefing on the investigation.



How sensitive and classified the seized documents were was not known as that was not disclosed by the investigative team, he added.



A spokeswoman for Daewoo Shipbuilding said she was unaware of the issue until early Tuesday and the company was in the process of confirming the details of Kyung's remarks.



The investigative team came to the conclusion North Korea had hacked Daewoo Shipbuilding because the hacking method was very similar to other attacks that North Korea was thought to be behind, Kyung said.



Hackers in North Korea are believed to have been responsible for a recent cyber heist in Taiwan - the latest in a string of hacks targeting the global SWIFT messaging system.



Earlier this month, another South Korean lawmaker had said North Korean hackers had stolen a large number of classified military documents, including South Korea-U.S. wartime operational plans.



And British authorities said last week they believed North Korea was behind the "WannaCry" ransomware attack in May that disrupted businesses and government services worldwide, including the National Health Service in England.





[ad_2]

Share & Written By CNBC

Comments

Popular posts from this blog

Ice technicians are the secret stars of the Winter Olympics

[ad_1] The emphasis of this year's two-week-long Winter Olympic Games has been placed squarely on the Olympians themselves. After all, the stated purpose of the international competition is to bring together the world’s greatest athletes in a nail-biting competition across fifteen different winter sports. But before the curlers, skiers, and skaters even arrived in Pyeongchang, South Korea, the Olympians of the ice technician world were already a few weeks deep in a competition of their own. Mark Callan of the World Curling Federation and Markus Aschauer of the International Bobsleigh and Skeleton Federation both say they’re hoping to make the best ice the Winter Olympics have ever seen. To transform the barren concrete jungle of existing tracks and arenas into an ice- and snow-covered wonderland is an enormous undertaking. And it takes a keen understanding of the physics and chemistry that keeps frozen precipitation pristine. Curling Callan has been making and maintaining ic...

With Operation Popeye, the U.S. government made weather an instrument of war

[ad_1] It was a seasonably chilly afternoon in 1974 when Senators Claiborne Pell, a Democrat from Rhode Island, and Clifford Case, a Republican from New Jersey, strode into the chambers of the Senate Committee on Foreign Relations for a classified briefing. While the meeting was labeled “top secret,” the topic at hand was rather mundane: They were there to discuss the weather. More specifically, Pell, the chairman of the now-defunct subcommittee for Oceans and International Environment, and his colleague were about to learn the true extent of a secret five-year-old cloud seeding operation meant to lengthen the monsoon season in Vietnam, destabilize the enemy, and allow the United States to win the war. Though it cycled through several names in its history, "Operation Popeye" stuck. Its stated objectives—to ensure Americans won the Vietnam War—were never realized, the revelation that the U.S. government played God with weather-altering warfare changed history. The...

How to avoid the mid-movie bathroom break

[ad_1] Long movies and the urge to pee have been linked since the early days of cinema. Sixty-three years before Avengers: Endgame and its three-hour runtime, moviegoers settled in for nearly four hours of The Ten Commandments . “There will be an intermission,” director Cecil B. DeMille announced during the movie’s introduction. And audiences’ bladders were relieved. On average, movies aren’t getting longer, but they also don’t come with a predetermined bathroom break. That means when nature calls, you’ve got to either sit in growing discomfort or gamble on the best time to run to the restroom. But it doesn’t have to be this way, and for most people, setting your body to “do not disturb” is fairly simple. Go before the show The first piece of advice is also the easiest: pee before the movie starts. Generally, healthy adults urinate every 3-4 hours, so the longer a movie runs, the more urgent it becomes to reset your internal p...