MEDIA ALERT: Hackers Set Time Bomb Set to Damage Targeted Banks and Broadcasters in South Korea; AhnLab's Malware Detection

MEDIA ALERT: Hackers Set Time Bomb Set to Damage Targeted Banks and 
Broadcasters in South Korea; AhnLab's Malware Detection System (MDS)
Could Have Prevented Damage 
SAN FRANCISCO, CA -- (Marketwire) -- 03/22/13 --  The AhnLab Security
Emergency Response Center (ASEC) and US headquarters of South
Korea-based AhnLab (www.ahnlab.com) today commented on a large series
of cyberattacks that targeted banks and broadcasters in South Korea.
AhnLab confirmed that attackers used stolen user IDs and passwords to
launch some of the attacks. The credentials were used to gain access
to individual patch management systems located on the affected
networks. Once the attackers had access to the patch management
system they used it to distribute the malware much like the system
distributes new software and software updates. Contrary to early
reports, no security hole in any AhnLab server or product was used by
the attackers to deliver the malicious code. 
Analyzed by ASEC, the malware used in this latest attack can be
detected in real-time and deleted with the multi-dimensional
protection technology used in AhnLab's Malware Detection System (MDS)
appliance. According to Brian Laing, vice president of marketing and
business development, organizations with AhnLab MDS deployed were
automatically protected against this latest discovery. "This attack
highlights the rapidly evolving threat landscape that changes by the
minute with attacks becoming more targeted, sophisticated and capable
of evading traditional security solutions," said Laing.  
More than 32,000 servers managed by broadcasters and banks in South
Korea were attacked yesterday in what experts are calling one of the
largest multiple-targeted cyberattacks in South Korea history. The
shutdowns affected Shinhan Bank, Nonghyup Bank, Munhwa Broadcasting
Corp., YTN and Korea Broadcasting System. The malware code for the
attack was likely developed by Chinese sources and used by hackers
from North Korea, according to Ryou Jae Cheol, a professor of
computer engineering and securities at Chungnam National University
in a statement to BusinessWeek Magazine. The malware code targeted
organizations' servers and destroyed the systems' ability to boot.  
For a detailed technical explanation of the attack and how ASEC and
AhnLab MDS detected and deleted the threat, see this webpage:
http://asec.ahnlab.com/926 (details in Korean). 
AhnLab's MDS
 AhnLab's network security product, the AhnLab Malware
Defense System (MDS) appliance, offers comprehensive threat
protection, rapid malware recognition and remediation, and stops
malicious network traffic and dynamic disruption of active security
breaches in an instant. AhnLab MDS secures endpoints, servers,
networks, and cloud resources with a single architecture and an
integrated management platform. 
About AhnLab 
AhnLab (KOSDAQ: 053800) creates agile, integrated Internet security
solutions for consumers and businesses, ranging in size from SMBs to
enterprise organizations. Founded in 1995, AhnLab is a global leader
in security research and product development delivers comprehensive
protection for networks, transactions, and essential services. By
combining cloud analysis with endpoint and server resources, AhnLab
generates best-of-breed breach detection and threat prevention that
scales easily for high-speed networks. This multi-dimensional
approach combines with exceptional service to create truly global
protection against attacks that evade traditional security defenses.
That's why more than 25,000 organizations rely on AhnLab's
award-winning products and services to make the Internet safe and
reliable for their business operations. 
Learn more today by contacting your AhnLab partner or local AhnLab
sales representative, or by visiting: http://www.ahnlab.com. 
Note to Editors: AhnLab experts are available for comment on this attack by 
contacting
Madison Alexander PR
949-231-2965
949-677-6527
619-822-2239 
 
 
Press spacebar to pause and continue. Press esc to stop.