Stolen logins used to distribute malware in South Korea attacks
Security vendor AhnLab claims credentials were used to access patch management systems and distribute malware.

Security vendor AhnLab has confirmed that stolen login details were used to carry out cyber attacks against South Korean banks and broadcasters last week.
As reported by IT Pro last week, hackers brought down several broadcasters and major banks in South Korea, in a series of attacks that have been linked to North Korea and China.
It is thought the attacks affected 32,000 servers managed by the banks and broadcasters.
A malware analysis by security vendor AlienVault said the attack had been caused by a piece of code that overwrites the master boot record and stops computers restarting after a reboot.
But, at the time of last week's report, the firm was unable to shed any light on how the malware gained access to the systems.
However, South Korea-based security vendor AhnLab has now claimed the hackers obtained user IDs and passwords to deliver the malware during some of the attacks.
"The credentials were used to gain access to individual patch management systems located on the affected networks," said the company in a statement.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Once the attackers had access to the patch management system they used it to distribute the malware much like the system distributes new software and updates."
Speaking to IT Pro, Simon Edwards, regional manager for the UK at AhnLab, confirmed the attackers were able to use the logins to infiltrate his firm's patch management tools.
"There was no compromise of our own systems at any point, but they managed to get our user names and passwords from somewhere," he added.
The company also claims the malware can be detected in real-time and deleted using its multi-dimensional protection technology.
-
How is the role of the CISO evolving?
Supported Content This role now stands as a pivotal figure in organizational strategy and security posture
-
How AI agents are being deployed in the real world
Supported Content These intelligent systems, capable of independent decision-making and learning, are transforming how organisations detect, respond to, and manage security incidents