North Korea Hackers Steal War Plans, Kim Jong-Un Assassination Details

Tyler Durden's picture

While tensions with North Korea have receded in recent weeks, and especially following the latest uneventful weekend, when markets were on edge that Kim could try another missile test launch to celebrate the country's national holiday, this could reverse following news from the BBC that North Korea hackers have reportedly stolen a large cache of military documents from South Korea, including a plan to assassinate North Korea's leader Kim Jong-un.

According to South Korean lawmaker Rhee Cheol-hee - a member of South Korea's ruling party who sits on its parliament's defence committee - the compromised documents, which were stolen from the country's defense ministry, include wartime contingency plans created by the US and South Korea, and also include reports to the allies' senior commanders. Plans for the South's special forces are also said to have been accessed, along with information on significant power plants and military facilities in the South.

Rhee also said some 235 gigabytes of military documents had been stolen from the Defence Integrated Data Centre, and that 80% of them have yet to be identified.

Just like in the case of Equifax, the breach itself took place long ago, with South Korea waiting over a year to disclose the full details of the the hack which took place in September last year. In May, South Korea said a large amount of data had been stolen and that North Korea may have instigated the cyber attack - but gave no details of what was taken. The South Korean defence ministry has so far refused to comment about the allegation, while North Korea denied the claim.

According to South Korea's Yonhap news agency reports that Seoul has been subject to a barrage of cyber attacks by its communist neighbour in recent years, with many targeting government websites and facilities. According to long-running media reports, which have yet to be confirmed with hard evidence however, the isolated, backward state is believed to have specially-trained hackers based overseas, including in China.

One thing that's certain, is that tews that Pyongyang is "likely to have accessed the Seoul-Washington plans for all-out war" in the Koreas will do nothing to soothe tensions between the US and North Korea. The two nations have been at verbal loggerheads over the North's nuclear activities, with the US pressing for a halt to missile tests and Pyongyang vowing to continue them.

Meanwhile, away from cyber war, Pyongyang has been far more aggressive in the realm of unconventional warfare, and the North recently claimed to have successfully tested a miniaturised hydrogen bomb, which could be loaded onto a long-range missile. In a speech at the UN in September, US President Donald Trump threatened to destroy North Korea if it menaced the US or its allies, and said its leader "is on a suicide mission".

Kim responded with a rare televized statement, vowing to "tame the mentally deranged US dotard with fire". Trump's latest comment took the form of a cryptic tweet at the weekend, where he warned that "only one thing will work" in dealing with North Korea, after years of talks had proved fruitless. He did not elaborate further.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
LawsofPhysics's picture

LOL! Boy, people really will believe anything...

NugginFuts's picture

False flag? Norks still think floppy drives are great technology. 

SILVERGEDDON's picture

Kim should shoot his hair stylist - that is a bigger problem than war or asassination.

Cynicles II's picture

Hair stylist? Thats a Lego© hairpiece.

covfefe MICdotard's picture

all u'd need to do would be to re-program a DAISYCUTTER drone to fly about 5 inches lower & with a sharper blade & he'd end up like Paul Krendler (Ray Liotta), in HANNIBAL...

 

FFS ~ you could feed him his own brains (flash fried in a garlic/butter/parsley sauce), with a nice Chianti

 

Either that or just get Gogo Yubari on the blower.

mtl4's picture

Assasination plans probably said something like, "open hatch, drop nuke"

YUNOSELL's picture

not hacked by North Koreans but intentionally leaked by Americans

Slack Jack's picture

Engdahl says Kim Jong Un is false opposition.

Engdahl says that Kim Jong Un lived in Switzerland from 1991 until 2000. He attended the Liebefeld Steinhölzli school in Köniz near Bern. The strongest hint that Kim Jong Un is a "Pentagon" puppet and not a communist (Chinese) puppet is that he had China's best friend in Pyongyang, Jang Sung-taek, executed. He also ordered the systematic execution of all other members of Jang's family including children and grandchildren (and others that were considered too close to China).

Other hints are that he is usefully (to the US) provocative and doesn't seem to listen to China.

Engdahl also thinks North Korea is an Pentagon Vassal State, but it seems more likely that Kim Jong Un is indeed a "Pentagon" man but that North Korea is (i.e., will be treated as) an enemy state.

https://journal-neo.org/2016/11/01/north-korea-is-an-pentagon-vassal-state/

Remember: The first rule for fighting a (real) war is to place your own puppet as the leader of the enemy.

Also, one should not forget that Trump, Obama, Bush and Clinton are all Jews.

http://www.preearth.net/phpBB3/viewtopic.php?f=20&t=630

http://mileswmathis.com/trump.pdf

And as an example of how real wars are fought,....

Proof that Adolf Hitler was a double agent.

http://www.preearth.net/phpBB3/viewtopic.php?f=22&t=1174

It seems pretty weird when you first read it, but its clearly true.

beemasters's picture

When Nk could hack Sony, they could hack anything. Oh, wait...

lew1024's picture

I upvoted you for the first half of the comment. Engdahl is reality-based, except for thinking the Tianamen Square massacre didn't happen. I had a Chinese gf for a while who was a physician in a nearby hospital.  She wouldn't say how many, but said the hospital was filled with bodies. Otherwise, Engdahl's is a reasonable argument, and the CIA would not have passed up the opportunity to influence Kim at some point in his life.

If nothing else, depend on it, NK's exports of crystal meth pass through the CIA, an obvious benefit and excusable as a means of influencing Kim. Also, NK doesn't have the economy or number of people needed to develop a couple of generations of ICBMs, fission and fusion bombs in several versions, maintain a 2million person army with half of the population in some military formation, submarines and ... simultaneously. Who is helping NK? One strongly suspects Israel is one of those suppliers as they have been for every other country in the world, thus another input to keep the MIC well-supplied with a bellicose midget enemy.

Would have downvoted for the 2nd, had I read it first. Not reality based.

Lost My Shorts's picture

The assasination plan was probably to send herds of stealth robot spiders to infiltrate his palace, and crawl up his legs or drop on him while he was sleeping, and bite him and inject tiny amounts of slow poison.

IH8OBAMA's picture

Maybe it was meant to be leaked to show Fatso Kim how much trouble he is going to be in.

 

researchfix's picture

I think he has a right to have his own hairstyle. And I am quite disappointed that it is such a big theme here. Not quite a proof of a forum of people of intellect. But maybe proof of a big group of users here, who are afraid of the Eurasian development (= yankees out of Asia) which will bring their lifestyle down to reality for lack of plastic and paper credit. And now downvotes pls, I want to know if I hit the button.

Cynicles II's picture

Perhaps some find humer is appropriate at times instead of all doom and gloom all the time.

loosen your collar a bit, relax

Implied Violins's picture

LEARN HOW TO SPELL 'HUMOR' RIGHT YOU F*&##@! SOB.

HRClinton's picture

Correct. Just look at the "hairstyle" that Americans voted into office.

Pot, meet kettle. 

This place is full of low brow hicktards, who barely made it out of Boot Camp.

Salsa Verde's picture

That and stop killing his personal fitness trainers.

HRClinton's picture

They have far worse hair styles in US inner cities. 

Yo, dats not raciss, coz Kim be yello.

Cynicles II's picture

nah, it's real: Equifax is running the US Gov cyber security..

IH8OBAMA's picture

Not to worry.  Their Music Major security chief has the situation under control. /Sarc  LOL

PT's picture

North Korean Hackers???  How do we know it wasn't Russian Hackers?  Is it still too early for Syrian Hackers and Iranian Hackers?  Damn!  I must have skipped ahead a couple of pages in the play book.

Alternative Headline:  "US IT Security 'Experts' Are A Bunch Of Dumbasses."
Alternative Alternative Headline:  "We Can't Be Bothered Hiring A Decent Script Writer For Our Theatre (or perhaps all the good ones have scruples)."

PT's picture

So if the US IT Security "Experts" can't stop hackers, does that mean that Public Key Encryption does not work?
How safe is all the electronic money in the world?

Or are they just trying to create some "plausible deniability" (I use that phrase VERY loosely) for all the crimes they are about to commit?

lew1024's picture

No, there are 3 classes of weaknesses.

First is configuration, allowing packets through firewalls and ports open on computers. That allows attacking more of the total software 'surface', and things normally hidden aren't as well tested.

Second is software bugs.  It isn't possible to eliminate them, and there are methods to exploit some of the many classes of bugs, e.g. buffer overflows.

Third is passwords.  Most of the security protocols and password access mechanisms use standard hashes and one of the half-dozen ciphers. All of the ciphers are small enough to be unrolled in pipelined hardware so that many passwords can be tested against an ecrypted file. It is often possible to tell which cipher is used from encrypted files.

This explains the math of testing passwords, sounds hopeless, right?  But it is the big weakness, the one that NSA exploits. Snowden told Poitras to assume that NSA can test 1T passwords / second against her encrypted files.

https://thinkpatriot.wordpress.com/2015/08/12/nsas-dilemma-and-mistake/

First, the crypto.  Current codes are unbreakable, which is why NSA wants you to use a small subset of them.  If you do, they can attack the password : people aren’t good at passwords, and NSA can apply 1 trillion passwords a second to your document via their high performance decryption hardware.  Do you have the slightest idea how pitiful your imagination is compared to 1 trillion?  1 trillion is 10,000 variations of each item in all dictionary words and all the place names and all scientific and technical terms and jargon and all the scraps of poetry people remember and use in their passwords for each of ~25 languages.  It might take 10 seconds to cover the world’s 250 major languages.  Clever passwords likely aren’t.

QED : NSA cannot read traffic or encrypted storage contents if sender and receiver manage their network and cryptographic security well.  Doing that is discipline and detail, much of which can be automated.

This for good passwords, but the fact is, nearly nobody uses good passwords, meaning NSA reads any files it wants from civilians. Serious systems don't generate the key from passwords, so it is unlikely they get much of that traffic.

https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-c...

OTOH, they have specialized computers to work back up the logic tree, what every bit in the encrypted file must mean about the key, given the probability of a particular bit at that location in files from that source. Academic researchers often find weaknesses in ciphers already known to professionals, so I would not use any standard cipher, if I were being serious about crypto.

shizzledizzle's picture

Depends, I was watching a program a while back about how NORAD decided not to upgrade the missile bases because the technology is obsolite. Old 12" floppy disks and basicly VIC20 level processors... The upside is no one is going to plug a USB drive in and infect the system and it doesn't really have any external connections (I.E. internet). Obsolite becomes a security feature. So long as it still functions why open the door to hackers?

youngman's picture

If all you had was Netscape today..noone would be able to use your computer

King of Ruperts Land's picture

They were 8" floppies. Don't think they ever had 12". Typical mini computer was: PDP8 computer. This was before home computers. The original UNIX operation system started back then.

I wish I had not thrown my comadore 64 in the garbage. It was kinda cool. I threw out my 8" floppies and 1/2 inch tape spools also.

John Kerry-Heinz's picture

Is there NO honor amongst thieves anymore?

FreeShitter's picture

This make believe shit is getting more comical by the day....yeah ameridumbs will believe it, that's the scary/worst part.

Rapunzal's picture

Just another dog and pony show, I'm really curious about the people who create those stories. Are they really thinking people are that stupid ? Already the North Korean hack at Sony was a complete joke.

Oldwood's picture

You leave so little doubt.

Implied Violins's picture

I think they are setting up another patsy for another MAJOR terror incident...and a false patsy, at that. And, if true, they are being extremely obvious about it.

...setting up the CIA/FBI aka US government for a fall?

(I contemplate, after emptying a whole can of oven cleaner into my bathtub.)

Badsamm's picture

Dude, everybody knows the BBC has a spy in the North Korean government. This Intel is fresh

SilverDoctors's picture

this will certainly end well....

thebigunit's picture

LOL! There really are people who will believe nothing!

LOL! Boy, people really will believe anything...

Who's dumber?

spastic_colon's picture

apparently the NFL stories are losing viewers

undercover brother's picture

Well now, isn't this a timely "hack".  And isn't it curious that the only info available from this hack is an assassination plan.  Truly fascinating.   

/sarc

GeezerGeek's picture

Look what Georgie (43) did when he discovered Saddam had tried to have Daddy rubbed out.

 

rejected's picture

Yes,,, Saddam tried to challenge chicken hawk baby Bush to a dual to settle things in a manly way. LOL. Of course baby Bush being the pussy he is declined and sent in the military. And somehow Americans were proud and held their heads high that the American military was able to defeat a 4th rate power. 

Now with North Korea there's a lot of bravado bark from the US and it's South Korean and Japanese colonies,,, but no bite as yet.

Yes, Absolutely no doubt the exceptional demockracy can win, if that's what you want to call it,  a Nuke exchange with North Korea but there's pretty good odds that a heavy price will have to be payed. Millions may likely die. Never know,,, Kim might even get lucky and bag a US city.

CRM114's picture

One's security is only as good as one's lowest paid, most p!ssed employee.

That's why oligarchies always collapse in the end.

Snaffew's picture

so the US DOD is destined to fail?

CRM114's picture

'tis if it keeps hiring contractors instead of full time staff on full benefits. The UK MoD is already lacking a clue and a paddle.

You see, the thing about the meek, spouse, two kids and a dog middle class is that they do their job properly and go home, and they are a bit more expensive than  zero hours contract labor/illegal immigrant slaves - until you get betrayed, let down, f#cked over or otherwise ruined by the latter. 

In the long run, good middle-class workers are cheaper.

Edward Morbius's picture

You can consider anything that is available on the Internet or connected to it somehow to be compromised. Just pull the fucking plug out of the wall and bada bing bada boom, the problem goes away.

GeezerGeek's picture

The probability that the Norks have infiltrated and compromised the S. Korean military is quite high, I'd guess.

Cautiously Pessimistic's picture

Equifax could not be reached for comment.

E.F. Mutton's picture

I told them not to install Bonzi Buddy...

Dead Indiana Sky's picture

Is he attempting a high top fade?  Kid N Play would be so proud.

Cautiously Pessimistic's picture

Those glasses make him look fat too.