Emails of IT Service Employees and Simple Passwords Are Also Targets of Attacks

The National Intelligence Service recently announced on the 4th that North Korean hacking groups are stealing confidential and core data from major national institutions and advanced companies through software (S/W) supply chain attacks, urging related industries to be cautious.


S/W supply chain security refers to the cybersecurity system that occurs throughout the entire lifecycle of S/W development, supply, and use. According to the National Intelligence Service, North Korean hacking groups are focusing on data theft by utilizing three types of attacks: indirect infiltration of institutions and companies through hacking IT service providers of major national institutions and advanced companies, infiltration exploiting vulnerabilities in IT solutions and S/W, and hacking targeting security management weaknesses.

North Korean Hacking Group Targets IT Service Firms to Steal Confidential Information from Institutions and Companies... Caution Advised View original image

In fact, last October, a North Korean hacking group hacked the email of an employee at company A, a local government network maintenance company, stole server access accounts stored in the email, then accessed the local government network remote management server without authorization and attempted to steal administrative data. The National Intelligence Service explained, "To prevent damage, it is necessary to raise the security level by providing security education to IT service provider employees, blocking external access routes, and strengthening authentication methods."


A single attack targeting IT solutions used for integrated management and distribution of internal data can lead to massive internal information leaks. This month, North Korean hacking groups exploited security vulnerabilities in the electronic approval and communication groupware of defense cooperation company D, installed malware, and attempted to steal internal data such as employee emails and network configurations. To prevent such attempts in advance, measures such as S/W security patches, prohibiting administrator account access via the internet, and regular vulnerability inspections are necessary.


There have also been hacking cases targeting security management weaknesses of institutions and companies, such as overly simple passwords. In February this year, North Korean hacking groups took advantage of the fact that the administrator page of mobile identity verification company E was easily accessible via the internet, meticulously analyzed the vulnerability using security search engines, and accessed it without authorization with administrator privileges. The National Intelligence Service stated, "To strengthen internal security management, problems should be improved by creating a checklist of basic security rules and cross-checking them, and raising employees' security awareness through security education."



Yoon Oh-jun, the 3rd Deputy Director of the National Intelligence Service, said, “S/W supply chain attacks can lead to widespread damage, so both IT suppliers and users must remain vigilant,” adding, “At the government level, through the ‘Government Joint Supply Chain Security T/F’ launched in September last year, efforts will be made to advance supply chain security, including institutionalizing the ‘S/W Supply Chain Security System’ by 2027.”


This content was produced with the assistance of AI translation services.

© The Asia Business Daily(www.asiae.co.kr). All rights reserved.

Today’s Briefing