Preps and Solutions
(Sponsored Ads)
Silver
Strategic Relocation
Recently Posted Articles and Videos
The Daily Sheeple
Ready Nutrition - Homesteading and Preparedness
The Prepper Website
SGT Report
SGT Report
top Prepper Web Sites
Featured Destinations
The Liberty Mill
Web Destinations
  • * End Times Headlines
  • * Infowars *
  • * Jeff Rense *
  • * Prepper Website *
  • * Ready Nutrition *
  • * SGT Report *
  • * Silver.com *
  • * Stan Deyo *
  • * Steve Quayle *
  • * Survival Blog *
  • * The Daily Sheeple *
  • * The Organic Prepper *
  • * Wide Awake News *
  • 321Gold
  • Activist Post
  • All American Gold
  • Alt Market
  • American Preppers Network
  • American Preppers Online
  • Amerisafe Neighbor Network
  • Ammo For Sale
  • Apartment Prepper
  • Armageddon Online
  • Arms Bearing Citizen
  • Backdoor Survival
  • Bearish News
  • Berkey Guy Blog
  • Beyond Collapse
  • Bio Prepper
  • Black Listed News
  • Blue Collar Prepper
  • Calculated Risk
  • Canada Free Press
  • Chris Martenson
  • Code Green Prep
  • Collapse Medicine
  • Collapse Net
  • Countdown to Collapse
  • Daily Collapse Report
  • Daily Crux
  • Disaster Survival Network
  • Doc Medina – Soapbox
  • Don't Tread on Me
  • Doom & Bloom Survival Medicine
  • Doomsday Prepping
  • Education After the Collapse
  • Enemies Foreign & Domestic
  • Eric Peters Politics
  • Family Survival Plan
  • FloJak
  • Fraudonomics
  • From the Blind
  • From the Trenches
  • Full Spectrum Dominance
  • GoldBroker.com
  • Government Is a Joke
  • Homestead Revival
  • International Forecaster
  • iState TV
  • Jack Blood
  • Jeff Rense
  • Joe For America
  • King World News
  • Lew Rockwell
  • Liberty Blitzkrieg
  • Liberty Mill
  • Market Ticker
  • Max Velocity Tactical
  • Mish – Economic Trends
  • Modern Survival Online
  • Net Ranger
  • Occupy Corporatism
  • Off Grid Survival
  • Off The Grid News
  • OilPrice.com
  • On Three Points Forums
  • Oracle Broadcasting
  • Outdoors Native
  • Patriot Net Daily
  • Peak Prosperity
  • Pioneer Living
  • Preparedness Review
  • Prepography
  • Prepper Central
  • Prepper Dashboard
  • Prepper For The Worst
  • Prepper Singles
  • Prepper Trader
  • Prepping Blogs
  • Prepping for Hard Times
  • Prepping to Survive
  • Project Chesapeake
  • Rawles' Survival Blog
  • Sherrie Questions All
  • SHTF America
  • SHTF School
  • SHTF Wiki
  • Skeptical Survivalist
  • Sound Money Campaign
  • Sovereign Man
  • Sticker Armory
  • Story Leak
  • Supreme Patriot
  • Survival and Prosperity
  • Survival Blogs
  • Survival Life
  • Survival Logic
  • Survival Magazine
  • Survival Prepper Joe
  • Survival Pulse
  • Survival Spot
  • Survival Week
  • Survivalist Boards
  • Survivopedia
  • Tactical Intelligence
  • Texas Preparedness Group
  • The Burning Platform
  • The Poog
  • The Prepared Ninja
  • The Prepper Journal
  • The Prepper Project
  • The Silver Bear Cafe
  • The Survival Mom
  • TheSurvivalistBlog.net
  • Tioga Freedomist
  • Trail and Trade
  • Truth Is Treason
  • Underground Medic
  • Urban Survival Site
  • Value Investing Pro
  • What Really Happened?
  • Wolf Street
  • Wood Pile Report
  • Yoga Sacramento
  • Zero Hedge

  • Clarocet for Kids
    Silver

    Is It Time To Take North Korea’s Cyber Weaponry Seriously?

    Mac Slavo
    October 11th, 2017
    SHTFplan.com
    Comments (13)
    Read by 1,463 people

    northkoreacyberattack

    Analysts say cyber capabilities have become a key asset in North Korea’s war chest. Pyongyang’s increasingly bold attacks in the virtual space have come in tandem with the hermit nation’s rapidly progressing ballistic missile and nuclear programs and some say that it’s time this is taken very seriously.

    The rogue regime has used cyber attacks for a wide range of purposes including hacking adversaries like South Korea and pilfering money. North Korea’s hackers have been accused of carrying out some of the most audacious cyber attacks of the past few years, from siphoning millions of dollars to stealing state secrets.

    “North Korea’s cyber weapons are as destructive as its conventional weapons,” Lim Jong-in, a cybersecurity professor at Korea University, told CNN. “Tomahawk missiles can paralyze a major country’s power grid and financial system. So do North Korea’s cyber weapons.” Lim continued, saying: “Cyber experts say North Korea should be ranked among the top 5 in the world. I believe North Korea can steal anything they want through cyber espionage. No country is safe from its cyber espionage.”

    In the latest revelation, a member of the South Korean ruling party said Tuesday that North Korea stole classified military documents from a South Korean Defense Ministry database in September 2016. They included a document that included plans to “decapitate” the North Korean leadership.-CNN

    But that isn’t all. Cybersecurity firm FireEye said Tuesday that it detected and stopped an attack on US electric companies by people with links to the North Korean government. The skill of these hackers is actually impressive considering they live in a country where the internet is heavily regulated by the government. The citizens living under Kim Jong-Un’s dictatorship only have access to a government-run, heavily censored intranet rather than the full depths of the world wide web. Yet those restrictions have not stopped the hackers from improving their abilities.

    “North Korea almost certainly has the capability to conduct disruptive and potentially destructive attacks, as well as more traditional cyber espionage operations,” Bryce Boland, the chief technology officer for Asia-Pacific at FireEye, told CNN. “North Korea has little connectivity and relatively limited reliance on technology, making it less vulnerable to attacks,” he said.

    In February 2016, $101 million was fraudulently transferred out of the Bangladesh central bank’s account at the New York Federal Reserve and eventually made its way to the Philippines. Researchers found that the hackers responsible for the theft carefully routed their signal through France, South Korea, and Taiwan to set up their attack server, but made a critical mistake that established a connection to North Korea. Nonetheless, most of the funds have not been recovered.

    Analysts also say that North Korea has been preparing similar operations targeting cryptocurrencies like Bitcoin, as international sanctions make it harder for North Korea to use the dollar.

    North Korea’s advancements in their weapons is concerning enough, but add in the actual real threat of a cyber attack, and we could experience a major disruption to our way of life.

    Click here to subscribe: Join over one million monthly readers and receive breaking news, strategies, ideas and commentary.
    Gas Masks, Filters, Body Suits, Anti Radiation Pills
    Please Spread The Word And Share This Post

    Author: Mac Slavo
    Views: Read by 1,463 people
    Date: October 11th, 2017
    Website: www.SHTFplan.com

    Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats.

    13 Comments...

    Vote: Click here to vote for SHTF Plan as a Top Prepper Web Site
    1. TEST says:

      And to think they are doing all this using their state-of-the-art Commiedore64s and Windows ME as the OS! Impressive!

    2. BOHICA says:

      questions:
      1. is NK really capable of hacking us with inferior technology?
      2. could it be another country with a more advanced capability posing as NK (Russia, China, etc)?
      3. is one of NK’s allies helping them? (see number 2)
      4. is US lying about these hacks to provide more reason to eventually attack NK?

    3. Come-On-People says:

      The FAT, gay clown of North Korea is really cruising for a bruising so to speak. The time has come to take care of this sack of shit once and for all!

    4. Kay123 says:

      My guess would be, the CIA would love to blame NK for hitting
      our grid. They are trying to dispose of all records and financial
      records.
      An EMP would wipe out financial records, “Oh darn, must be NK.
      So solly……so, so solly.”
      Kim is a little fat bully who talks big. Constitution says we don’t
      attack others unless we are attacked first. (CIA is first suspect)
      Kim surely knows he will be blown into the next world if he does.

      Our Pres. needs to defund, and imprison the CIA…..the “Criminal
      Intel Agency”.

    5. Archivist says:

      That was a pretty old computer in the first photo.

      “The Compaq brand remained in use by HP for lower-end systems until 2013 when it was discontinued.”

      Of course, what matters is the skill of the hacker. It doesn’t matter how the computer is, as long as it can get online. Because of eastern European programmers, you can get DOS software that will do almost anything you can do with Windows. They have DOS browser and more.

    6. Heartless says:

      We can mock the NK’s; but, consider that his, the magnificent fat one’s, current IT/hackers must do their tasks or face being blown to smithereens by anti-aircraft guns, torn to shreds by dogs or worse. And…. not just them; but, generations of their families. Hell, I don’t care if they’re using old 386 processors and Windows 3.1 – they’re going to do what they can and we need to go with care and not fall under a spell of complacency.

    7. Comanche says:

      If we ask him nicely, he will put down his weapons and join our “happy go lucky” global community ….

    8. Richard Steven Hack says:

      It’s likely that NK computers, despite being old, run a home-grown version of Linux. You can get Linux to run on almost anything. A version of it runs your Android-based phones and stripped-down versions run your Internet home router.

      They wouldn’t use DOS as that is completely obsolete, although Windows command line is still based on DOS. But that is irrelevant as the Windows OS is way past DOS. A lot of malware today is based on Windows PowerShell which replaces the basic command line shell with something more akin to the UNIX/Linux BASH shell.

      Most computer security software runs on Linux via the BSAH shell command line. So NK’s computers can probably run computer penetration software just fine.

      They would, however, need some up-to-date Windows machines in order to develop malware on them that would run on modern machines. That wouldn’t be hard to acquire.

      Nonetheless, NK’s hacking abilities shouldn’t be overrated, if for no other reason than they have fewer hackers than China, Russia or most other nation states. OTOH, you don’t need many. A few thousand would be more than enough. But that doesn’t compare to the estimated 300,000 private Chinese hackers.

    9. Asshat says:

      I’ve seen mountains of those same machines at the electronics recycling place. All the best hackers are using 80s technology.

    10. Serg says:

      NK is a complete bogus diversion story. Whoever believes it delivered to you by MSM has a mental capacity of the 3rd grader. Ignorant masses continuesly presented with a buggy man which keeps them in fear and abidient. Classic case of 1984. Think about it!

    11. Frank Thoughts says:

      The North Koreans get plenty of help from their trade partners in China, Canada and Europe and also receive significant technology, knowledge and money transfers from the United Nations (the UN does this via Macau). This has gone on for the last two decades. They have state of the art computer knowledge and also connections to hackers.

      North Korea can easily jack into the global financial system and fund itself that way. North Korea is not an African country: they are smart, focused and strategic.

    Leave a Reply

    XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

    Commenting Policy:

    Some comments on this web site are automatically moderated through our Spam protection systems. Please be patient if your comment isn't immediately available. We're not trying to censor you, the system just wants to make sure you're not a robot posting random spam.

    This web site thrives because of its community. While we support lively debates and understand that people get excited, frustrated or angry at times, we ask that the conversation remain civil. Racism, to include any religious affiliation, will not be tolerated on this site, including the disparagement of people in the comments section.

     

    Web Design and Content Copyright 2007 - 2015 SHTF Plan - When It Hits The Fan, Don't Say We Didn't Warn You - All Rights Reserved

    Our Supercharged Intel Xeon E5-2620 v4 Octo-Core Dual Servers are Powered By Liquid Web

    Dedicated IP Address: 69.167.174.108

    The content on this site is provided as general information only. The ideas expressed on this site are solely the opinions of the author(s) and do not necessarily represent the opinions of sponsors or firms affiliated with the author(s). The author may or may not have a financial interest in any company or advertiser referenced. Any action taken as a result of information, analysis, or advertisement on this site is ultimately the responsibility of the reader.

    SHTFplan is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.