Research pinpoints UK, not North Korea as DDoS attack source

The U.K. was the likely source of a series of attacks last week that took down popular Web sites in the U.S. and South Korea, according to an analysis performed by a Vietnamese computer security analyst.

The results contradict assertions made by some in the U.S. and South Korean governments that North Korea was behind the attack. Security analysts had been skeptical of the claims, which were reportedly made in off-the-record briefings and for which proof was never delivered.

The week-long distributed denial of service attack involved sending multiple requests to a handful of Web sites from tens of thousands of computers so the sites became overloaded. Among the sites taken offline at some time during the week were those of the U.S. Departments of Transportation and Treasury, the U.S. Federal Trade Commission, the South Korea’s president’s home page, the South Korean national assembly and U.S. Forces Korea. It was later reported that the virus is programmed to destroy all data on the infected PCs.

The computers used to send the flood of requests had been infected with a virus that allowed attackers to use them anonymously.

Every three minutes the infected computers randomly selected one of eight servers to connect to and receive orders, said Nguyen Minh Duc, senior security director at Bach Khoa Internetwork Security (Bkis), in a blog posting on the company’s Web site. Bkis says it gained control of two of the eight servers and through this has been able to discover the master server.

That server has an IP address in the 195.90.118.x range, Nguyen said.

The address is registered to Global Digital Broadcast in the U.K. The company could not immediately be contacted.

“Having located the attacking source in UK, we believed that it is completely possible to find out the hacker,” Nguyen wrote.

Through analyzing the log files of the two servers it controls, Bkis said the attacks utilized 166,908 PCs in 74 countries that had been infected. That figure is significantly higher than the “several tens of thousands” that other security companies had estimated were involved.

The largest number of infected PCs was in South Korea followed by the U.S., China, Japan, Canada, Australia, the Philippines, New Zealand, the U.K. and Vietnam.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now