The DSME shipyard on Geoje Island in Okpo,South koreaPhoto: Panwasin seemala / Shutterstock.com
By Haejin Choi SEOUL, Oct 31 (Reuters) – North Korea probably stole South Korean warship blueprints after hacking into Daewoo Shipbuilding & Marine Engineering Co Ltd’s database in April last year, a South Korean opposition lawmaker said on Tuesday.
North Korea has often been implicated in cyber attacks in South Korea and elsewhere but Pyongyang has either ignored or denied accusations of hacking.
“We are almost 100 percent certain that North Korean hackers were behind the hacking and stole the company’s sensitive documents,” Kyung Dae-soo of the main opposition Liberty Korea Party told Reuters by telephone.
Daewoo Shipbuilding has built several South Korean warships, including an Aegis-class vessel and submarines. It was most likely North Korea had obtained blueprints for these, he said.
The hacking was discovered by a division under South Korea’s Ministry of Defence in charge of investigating cases of cybercrime, said Kyung, who received a briefing on the investigation.
How sensitive and classified the seized documents were was not known as that was not disclosed by the investigative team, he added.
A spokeswoman for Daewoo Shipbuilding said she was unaware of the issue until early Tuesday and the company was in the process of confirming the details of Kyung’s remarks.
The investigative team came to the conclusion North Korea had hacked Daewoo Shipbuilding because the hacking method was very similar to other attacks that North Korea was thought to be behind, Kyung said.
Hackers in North Korea are believed to have been responsible for a recent cyber heist in Taiwan – the latest in a string of hacks targeting the global SWIFT messaging system.
Earlier this month, another South Korean lawmaker had said North Korean hackers had stolen a large number of classified military documents, including South Korea-U.S. wartime operational plans.
And British authorities said last week they believed North Korea was behind the “WannaCry” ransomware attack in May that disrupted businesses and government services worldwide, including the National Health Service in England. (Reporting by Haejin Choi; Writing by Christine Kim; Editing by)
CAIRO, March 2 (Reuters) – The Houthi Transport Ministry in Yemen said on Saturday there had been a “glitch” in undersea communication cables in the Red Sea as a result of actions...
by Captain John Konrad (gCaptain) In the current American labor landscape, the stark contrast between the assertive strides of transportation unions and the maritime sector’s unique labor challenges is striking....
By Mikhail Flores MANILA, Dec 2 (Reuters) – Evacuations were under way in the Philippines after a quake of at least magnitude 7.5 struck the southern region of Mindanao on Saturday night,...
December 2, 2023
Total Views: 2164
Why Join the gCaptain Club?
Access exclusive insights, engage in vibrant discussions, and gain perspectives from our CEO.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.