Not our servers, says antivirus vendor AhnLab The attackers who unleashed devastating hard-drive wiping malware on South Korean TV stations and banks earlier this week executed at least part of the attack by hijacking the firms’ patch management admin accounts, the software vendor involved has said.According to South Korean antivirus company AhnLab, the 20 March attacks used stolen IDs and passwords for its Patch Manager software to distribute the malware to an unknown number of the 32,000 PCs affected inside the victim firms, including the Munhwa, YTN, Korea Broadcasting System (KBS) TV stations, and the Shinhan, Jeju and Nonghyup banks.These systems were under the control of the organisations involved and not AhnLab itself, the company emphasised.“Contrary to early reports, no security hole in any AhnLab server or product was used by the attackers to deliver the malicious code,” AhnLab said in a statement. The fact that several of the firms were using the company’s software was coincidence; as a local ISV, AhnLab enjoyed a high market share in the country for its security products, the company said.Exactly how the attackers were able to get hold of the credentials and co-ordinate the attack remains a mystery but indicated that it had been planned for some time, AhnLab director of marketing and business development Brian Laing said. Some have suggested that the attackers had gained control of at least some of the target PCs using an undetected botnet system, but this remains speculation.Laing agreed that the attack had attempted to shut down AhnLab’s antivirus client as well as that of a second popular South Korean vendor, Hauri.Claimed by the mysterious ‘Whois’ team, the attack attempted – and succeeded – in causing maximum disruption by overwriting the Master Boot Record (MBR) on affected PCs after a reboot.This is remarkably similar to the ‘Shamoon’ attack last year on Saudi Arabia’s oil industry, which also affected about 30,000 systems after executing its disk-wiping routine at a pre-defined moment.One unusual element of the South Korean malware, dubbed ‘Jokra’ by Symantec, is that despite being Windows-oriented it contains a script that could be used to wipe Linux systems.“The included module checks Windows 7 and Windows XP computers for an application called mRemote, an open source, multi-protocol remote connections manager,” a Symantec analysis reported. Suspicions have fallen on North Korea or another state as the culprit simply because of the resources necessary to pull of such a targeted and highly-crafted attack.The fact that victims were solely South Korean has also reinforced this view. As with so many cyberattacks, evidence is and will probably remain, thin on the ground. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe