Contact Us
01952 608908

To help reduce spam, please enter VUABF into the box below:

close »
ADISA Certification Blancco NHS Information Governance Toolkit ISO 27001 ISO 14001 ISO 9001 BS EN 15713 CESG Contractors Health & Safety Assessment Scheme

Is North Korea Preparing for a Massive Cyber-Attack on South Korea?

It has been reported that North Korea have been staging a range of cyber attacks on South Korea, in what is believed to be ‘practice’ in preparation for a much bigger cyber attack.

So far, North Korea have reportedly hacked into in excess of 140,000 computers within some 160 different South Korean firms and government agencies, raising concerns for a much more long-term plan, as they seem to be laying out the groundwork for a massive cyber attack against its rival.

Understandably, South Korea are now on heightened alert against the threat of cyber attacks from North Korea, after Pyongyang reportedly conducted a nuclear test in January as well as  long-range rocket launch in February that led to new U.N. sanctions.

These hacks first took place in February of 2014, when North Korea successfully managed to steal information from two conglomerates, which included defense-related material.

South Korea’s police cyber investigation unit commented on the issue that "there is a high possibility that the North aimed to cause confusion on a national scale by launching a simultaneous attack after securing many targets of cyber terror, or intended to continuously steal industrial and military secrets."

The not-so illusive hackers opted to take no action once they had gained control over the servers and computers, instead deciding to wait as they continued to hack into more and more targets in what police believe to be an effort towards building up a much-larger scale attack.

The most recent case took place just this March, as documents containing the blueprints for the wings of a f-15 fighter jet were stolen. Additionally, of the 42,000 materials that have so far been stolen, more than 40,000 were defense related.

Furthermore, the IP address of the hackers could be directly traced back to North Korea, and was identical to one used previously in 2013 in a cyber attack of South Korean banks and broadcasters that managed to freeze computer systems for over a week.

This is obviously a cause for concern, with cyber-attacks becoming the new weapon of the 21st century.

If you are looking for a safe, secure and trustworthy data-destruction service, head to our hompage to find out more about why you should choose XPO IT Services Ltd:

For more information on this story, read the full article at:

Is North Korea Preparing for a Massive Cyber-Attack on South Korea?

We have used the data destruction services of XPO IT on a number of occasions and have been exceptionally pleased with their levels of service, efficiency and customer care

IT Manager, Nottingham Solicitors

We have used XPO IT Services on numerous occasions, each time we have been very pleased with the service that they provide. Their collection/recycling scheme is the best we have used (and we have used a few!). Great service and great value for money!

Senior IT Technician, Staffordshire Hospice

XPO IT offer an efficient and flexible collection service for the District Council IT disposals. They provide a Duty of Care Waste Transfer Note and Certificate of Disposal for every collection. Collection staff are always courteous and friendly and go about their work without causing any disruption to my working day

E-Business Admin Assistant, District Council

Glad we found out about this company. Now I can be assured that our redundant IT equipment is being correctly handled and we can get rid of our smaller WEEE waste streams in parallel

Purchasing Manager, Automotive Equipment Supplier

XPO have always provided a high quality service.  Reliable, efficient and easy to use.  Always on time and professional with the disposal of equipment

Property Consultant, Birmingham Property Consultancy

Get in touch

Leave your details below and we will be in touch

Please enter BUWHY into the following box: