In order to demolish North Korean nuclear facilities, South Korea has decided to develop its own cyber attack tools. 

south-korea-cyber-weapon-against-north-korean-

Stuxnet kind of weapons have been proposed by the country’s defence ministry, the same Stuxnet software which was designed to target and destroy Iranian nuclear plants. 

Yonhap news agency reported that:

  • The South Korean military will carry out missions using the software. The defence ministry prsented its plan to the government on 19th February.”

In 2006, North Korea said it had successfully tested a nuclear weapon, spreading alarm through the region. Intensive diplomatic efforts to try to rein in North Korea’s nuclear ambitions continue.

The development of weapons capable of physically damaging North Korean nuclear plants and missile facilities is the second phase of a strategy that began in 2010, Yonhap said.

The first part of South Korea’s plan, which is continuing, is to conduct online propaganda operations by posting to North Korean social networking and social media services.

  • Once the second phase plan is established, the cybercommand will carry out comprehensive cyberwarfare missions,” a senior ministry official said.

The South Korean cyberwarfare command, which will use the weapons, has been dogged by accusations of using its psychological warfare capabilities on its own population to try to influence voters in the run-up to the 2012 presidential elections.

Attempting to use cyberweapons to physically damage critical infrastructure could drastically backfire, Prof Alan Woodward, a computer security expert at the University of Surrey, told the BBC.

  • I think it’s very dangerous,” he said. “[The weapon] could end up damaging all sorts of things you never intended it to.”

Once Stuxnet was released, its spread was impossible to predict or control, Prof Woodward said.

The code was designed to target Iranian nuclear enrichment facilities and disrupt a suspected nuclear weapons development programme.

However, the code attacked Siemens control systems used not only in the facilities but also in electrical generation plants, factories and water treatment works.

  • You might be targeting one thing, but it could spread,” Prof Woodward said. “All those other forms of infrastructure become vulnerable.”

Malicious code such as Stuxnet does not respect national boundaries. Cyber-attack code developed by South Korea could rebound and end up damaging South Korean infrastructure that uses the same technologies, he said. The code could spread internationally.

In addition, once the attack code is released, malicious hackers or military personnel anywhere in the world would be able to study a sample and use the weapons against another target, Prof Woodward added.

Via BBC.


Waqas

Waqas Amir is a Milan-based cybersecurity journalist with a passion for covering latest happenings in cyber security and tech world. In addition to being the founder of this website, Waqas is also into gaming, reading and investigative journalism.