New clues emerge after four-year hacking spree in South Korea

Cyber attacks on South Korea date back four years to a single hacking group, the 'Dark Seoul Gang,' says US security software maker Symantec Corp.

Ann Hermes/The Christian Science Monitor
A hacking group dubbed the "Dark Seoul Gang" has been hacking South Korean computers for the past four years, says US security software maker Symantec Corp

Researchers with US security software maker Symantec Corp say they have uncovered digital evidence that links cyber attacks on South Korea dating back four years to a single hacking group dubbed the "Dark Seoul Gang."

Eric Chien, technical director with Symantec Security Response, said late on Wednesday that his firm made the connection while reviewing malicious software code used to launch attacks that disrupted some South Korean government websites earlier in the week.

He said that the evidence did not uncover the identity of the gang members.

North Korea has been blamed for previous cyber attacks on South Korean banks and government networks, although Pyongyang denies responsibility and has said it has also been a victim.

Symantec researchers found chunks of code that were identical to code in malicious programs used in four previous significant attacks, the first of which happened on July 4, 2009, according to Chien.

"We know that they are one gang," he said. "It is extremely well coordinated."

He estimates that the group has between 10 and 50 members, based on the sophistication of the code and the complexity of their attacks.

The July 4, 2009, attack wiped data on PCs and also launched distributed denial of service attacks that disrupted websites in South Korea as well as the United States.

In March of this year, the gang knocked tens of thousands of PCs off line at South Korean companies by destroying data on their hard drives, Chien said. It was one of the most destructive cyber attacks on private computer networks to date.

Symantec published its report on the gang on its website.

A hacking attack on Tuesday, the anniversary of the start of the Korean War in 1950, brought down the main websites of South Korea's presidential office and some local newspapers, prompting cybersecurity officials to raise the alert. 

(Reporting by Jim Finkle; Editing by Eric Beech)

You've read  of  free articles. Subscribe to continue.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to