[nsp-sec] Korea botnet actually deleting files?
Bill Woodcock
woody at pch.net
Sat Jul 11 17:41:26 EDT 2009
Anybody have any reliable information that this actually happened,
yesterday?
-Bill
>
> Korea DDOS virus mission shifts to destroying, erasing data
>
> PC users in South Korea may soon find their computer files gone
>
> By Martyn Williams
>
> http://www.computerworld.com/s/article/9135369/Korea_DDOS_virus_mission_shifts_to_destroying_erasing_data?taxonomyId=17
>
> (IDG News Service)—They say what goes around comes around
> and on Friday owners of bot-infested PCs in South Korea will
> discover that's true.
>
> The owners of tens of thousands of bot-infested PCs in the
> county – who've resisted calls all week to update or install anti-
> virus software – will likely switch on their PCs on Friday to find
> their data gone, said computer security specialist AhnLab.
>
> From midnight local time (3 p.m. GMT Thursday) the virus,
> which has been attacking prominent U.S. and South Korean government
> and commercial Web sites all week, has been programmed to encrypt
> user data or reformat the hard drive of the PC.
>
> There are still ways to save an infected PC, although if the
> owners have ignored security requests so far they might be unlikely
> to follow AhnLab's recommendations. These involve starting Windows
> in safe-mode by using the boot menu accessed through the F8 key at
> start-up, setting the clock to before July 10 and then rebooting the
> PC normally and updating anti-virus software or performing a free
> scan to erase the virus.
>
> The attacks have been headline news all week in South Korea,
> where casualties have included the top-ranked news Web site, one of
> the leading online auction sites, electronic banking portals of
> several major banks and the home pages of the Ministry of National
> Defense, the president's Web site, the National Assembly and the
> U.S. Forces Korea.
>
> Computer security companies have been urging people to
> update their anti-virus software or download an application to
> perform a free scan but many have, apparently, ignored those requests.
>
> A third wave of attacks on Thursday night overloaded some of
> South Korea's most popular Web sites and showed that the bot-
> infested PC army was still alive and kicking.
>
> But Thursday night's attacks might be the last. This shift
> from attack to destroy may indicate the end of this particular round
> of attacks, which started on July 4 against U.S. sites and hit South
> Korean sites for three days in a row this week.
>
> Little is known about the person or persons controlling the
> virus although computer security experts say the attack itself is
> not particularly sophisticated. That leaves the possible range of
> culprits wide, from individuals with a relatively low level of
> hacking skills to organized groups or governments who might have
> employed a low-tech approach to confuse experts.
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 194 bytes
Desc: This is a digitally signed message part
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20090711/5ce4ad96/attachment-0001.sig>
More information about the nsp-security
mailing list