“Our office is available 24 hours, 7 Days a week. Post Coronavirus, we mainly operate remotely and we are available in our office by appointment. We have several representatives available to take care of your needs however we understand the need to sometimes come into our place of business in order for you to meet with one of our Protection Specialists and discuss your concerns. We highly value the person to person relationship and are readily available to meet with you in person”.
888-995-6019 Office No Ext. 813-995-6013 x 101 Direct.
Email: info@centurioninsuranceafs.com

North Korea Broke Into South Korean Chip Equipment Firms: Seoul’s Spy Agency *Centurion Insurance AFS*

Mar 04, 2024 (0) comment , , , , , , , , , , , , ,

[ad_1]

North Korea’s hacking groups have broken into at least two South Korean manufacturers of chipmaking equipment, as the country looks to evade sanctions and turn out its own semiconductors for weapons programs, South Korea’s spy agency said on Monday.

The news comes after South Korean President Yoon Suk Yeol warned North Korea could stage provocations, such as cyber attacks or spreading fake news, to interfere in April’s parliamentary elections.

The National Intelligence Service (NIS) said the South Korean firms had been a key target of North Korean hackers since late last year and called for tougher security.

North Korea penetrated the servers of two companies in December and February, stealing product design drawings and photographs of their facilities, the NIS said.

“We believe that North Korea might possibly be preparing to produce its own semiconductors in the face of difficulties in procuring them due to sanctions,” it said in a statement.

Also driving the North’s efforts could be higher demand from its satellite, missile and other weapons programs, it added.

Pyongyang has always denied involvement in cybercrimes, although North Korea has been blamed for cyberattacks netting millions of dollars.

The hackers employed a technique called “living off the land,” which minimizes malicious codes and uses existing, legitimate tools installed within the servers, making it difficult to detect with security software, the NIS said.

(Reporting by Hyonhee Shin; editing by Clarence Fernandez)

Topics
Auto

Was this article valuable?


Here are more articles you may enjoy.

Interested in Auto?

Get automatic alerts for this topic.

[ad_2]

Source link

Comment (0)

Leave a Comments