Drive-by Attack Site Illustrated
An article review.
North Korea Uses Popular Attack Vector
One would think that you’d be safe from malicious content when visiting an official government website, but the government of North Korea is apparently not above serving up some malware with their official content.
It’s true. The website for the Korean Central News Agency, “North Korea’s official news service,” is actively delivering malware. This appears to be an example of the “watering hole attack vector” or a drive-by attack site. This is where websites likely to be visited by a targeted group are hacked or, as in this case, blatantly setup to serve malware. The North Korean Government looks to be attacking those who want to see what they’re doing.
For those of us in the non-communist world, one of the last ways to bypass strong defenses is to utilize drive-by attack sites. This article about the situation in North Korea helps illustrate this point.
Click Here To Read the Full Article
The above is what we call an “Article Review.” It is part of our attempt to help our readers find excellent reading materials to back up important technology risk management concepts. We try not to include articles that are merely news or additional news about mainstream issues. Instead, we try to highlight articles that our “typical clients” should be sure to read, or that are about concepts “outside the mainstream media.” infotex does not intend to endorse views represented by the writers of the articles we review, nor do we try to keep our Clients aware of EVERYTHING. For example, if a particular story concept is being reported upon in many different media sources, infotex usually chooses to ignore the story concept altogether, unless we can find a “unique take” on the story concept.
Original article by Sean Gallagher of Ars Technica.