Missile Defense of South Korea Hacked by China
On the grounds of the latest findings by the cyber security firm FireEye claimed that South Korean entities had been compromised online. These entities, as the investigation suggests, have been targeted by a group of hackers backed by Chinese state. The events comes in the lights of the Chinese government constantly raising concerns against the deployment of the Terminal High-Altitude Air Defense (THAAD) system in South Korea stating that the latter’s sensitive radar sensors could be used for espionage.The arrival of first components of the system has also been an integral issue in the current presidential campaign since it took place last month.
These assaults comprised DoS, a denial of service attack towards the web site of South Korea’s Ministry of Overseas Affairs, which the South Korean authorities say originated from China.While the FireEye and other cyber security experts say that the Chinese hackers have long targeted the South Korea, the attacks just seem to be growing in variety.The Chinese language hackers have reworked objection to motion of the Air defense deployment by concentrating on South Korean army, protection business networks and authorities.
In March, South Korea’s Ministry of Foreign Affairs said that a DDoS attack that originated from China crippled its website. A spokesman for the Ministry said that “prompt defensive measures” were taken to ensure that the attacks weren’t effective, adding that it was maintaining an “emergency service system” to repel Chinese hackers.
Though the south Korean administration stated that they would be raising its cyber-attack alert level. However, The South Korean conglomerate, Lotte Group which sold land to enable the deployment of the THAAD battery had its website compromised earlier this year as well.While South Korea and the U.S. claim that the THAAD is purely defensive, China on the hand goes quite opposite stating that the radar system can provide deep reach into their territory and compromise their security.
Tonto Team, which is one of the hacker groups responsible for the attack, is tied to China’s military and is based out of northeastern Chinese city of the Shenyang, where the North Korean hackers are known to be active. The other group being known as Stone Panda or the APT10, which is the same group held responsible for the recent spying efforts against US companies lobbying the US President Trump administration on global trade.These groups have also been joined in attacks by two “patriotic hacking” groups not directly tied to the Chinese government.