North Korea Hacked Him. So He Took Down Its Internet

Disappointed with the lack of US response to the Hermit Kingdom's attacks against US security researchers, one hacker took matters into his own hands.
North Korea on a map glitches with a 404 error code.
"I want them to understand that if you come at us, it means some of your infrastructure is going down for a while."Illustration: Elena Lacey; Getty Images
 
 

For the past two weeks, observers of North Korea's strange and tightly restricted corner of the internet began to notice that the country seemed to be dealing with some serious connectivity problems. On several different days, practically all of its websites—the notoriously isolated nation only has a few dozen—intermittently dropped offline en masse, from the booking site for its Air Koryo airline to Naenara, a page that serves as the official portal for dictator Kim Jong-un's government. At least one of the central routers that allow access to the country's networks appeared at one point to be paralyzed, crippling the Hermit Kingdom's digital connections to the outside world. 

Some North Korea watchers pointed out that the country had just carried out a series of missile tests, implying that a foreign government's hackers might have launched a cyberattack against the rogue state to tell it to stop saber-rattling. 

But responsibility for North Korea's ongoing internet outages doesn't lie with US Cyber Command or any other state-sponsored hacking agency. In fact, it was the work of one American man in a T-shirt, pajama pants, and slippers, sitting in his living room night after night, watching Alien movies and eating spicy corn snacks—and periodically walking over to his home office to check on the progress of the programs he was running to disrupt the internet of an entire country.

 

Just over a year ago, an independent hacker who goes by the handle P4x was himself hacked by North Korean spies. P4x was just one victim of a hacking campaign that targeted Western security researchers with the apparent aim of stealing their hacking tools and details about software vulnerabilities. He says he managed to prevent those hackers from swiping anything of value from him. But he nonetheless felt deeply unnerved by state-sponsored hackers targeting him personally—and by the lack of any visible response from the US government.

So after a year of letting his resentment simmer, P4x has taken matters into his own hands. “It felt like the right thing to do here. If they don’t see we have teeth, it’s just going to keep coming,” says the hacker. (P4x spoke to WIRED and shared screen recordings to verify his responsibility for the attacks but declined to use his real name for fear of prosecution or retaliation.) “I want them to understand that if you come at us, it means some of your infrastructure is going down for a while.”

 

P4x says he's found numerous known but unpatched vulnerabilities in North Korean systems that have allowed him to singlehandedly launch “denial-of-service” attacks on the servers and routers the country's few internet-connected networks depend on. For the most part, he declined to publicly reveal those vulnerabilities, which he argues would help the North Korean government defend against his attacks. But he named, as an example, a known bug in the web server software NginX that mishandles certain HTTP headers, allowing the servers that run the software to be overwhelmed and knocked offline. He also alluded to finding “ancient” versions of the web server software Apache, and says he's started to examine North Korea's own national homebrew operating system, known as Red Star OS, which he described as an old and likely vulnerable version of Linux.

Advertisement

P4x says he has largely automated his attacks on the North Korean systems, periodically running scripts that enumerate which systems remain online and then launching exploits to take them down. “For me, this is like the size of a small-to-medium pentest,” P4x says, using the abbreviation for a “penetration test,” the sort of whitehat hacking he's carried out in the past to reveal vulnerabilities in a client's network. “It's pretty interesting how easy it was to actually have some effect in there.”

“If they don’t see we have teeth, it’s just going to keep coming.”

P4x, Hacker

Those relatively simple hacking methods have had immediate effects. Records from the uptime-measuring service Pingdom show that at several points during P4x's hacking, almost every North Korean website was down. (Some of those that stayed up, like the news site Uriminzokkiri.com, are based outside the country.) Junade Ali, a cybersecurity researcher who monitors the North Korean internet, says he began to observe what appeared to be mysterious, mass-scale attacks on the country's internet starting two weeks ago and has since closely tracked the attacks without having any idea who was carrying them out.

 

Ali says he saw key routers for the country go down at times, taking with them not only access to the country's websites but also to its email and any other internet-based services. “As their routers fail, it would literally then be impossible for data to be routed into North Korea,” Ali says, describing the result as “effectively a total internet outage affecting the country.” (P4x notes that while his attacks at times disrupted all websites hosted in the country and access from abroad to any other internet services hosted there, they didn’t cut off North Koreans’ outbound access to the rest of the internet.)

Advertisement

As rare as it may be for a single pseudonymous hacker to cause an internet blackout on that scale, it's far from clear what real effects the attacks have had on the North Korean government. Only a tiny fraction of North Koreans have access to internet-connected systems to begin with, says Martyn Williams, a researcher for the Stimson Center think tank's North Korea-focused 38 North Project. The vast majority of residents are confined to the country's disconnected intranet. Williams says the dozens of sites P4x has repeatedly taken down are largely used for propaganda and other functions aimed at an international audience.

While knocking out those sites no doubt presents a nuisance to some regime officials, Williams points out that the hackers who targeted P4x last year—like almost all the country's hackers—are almost certainly based in other countries, such as China. “I would say, if he's going after those people, he's probably directing his attentions to the wrong place,” says Williams. “But if he just wants to annoy North Korea, then he is probably being annoying.”

For his part, P4x says he would count annoying the regime as a success, and that the vast majority of the country's population that lacks internet access was never his target. “I definitely wanted to affect the people as little as possible and the government as much as possible,” P4x says.

He acknowledges that his attacks amount to no more than “tearing down government banners or defacing buildings,” as he puts it. But he also says that his hacking has so far focused on testing and probing to find vulnerabilities. He now intends to try actually hacking into North Korean systems, he says, to steal information and share it with experts. At the same time, he's hoping to recruit more hacktivists to his cause with a dark website he launched Monday called the FUNK Project—i.e. “FU North Korea”—in the hopes of generating more collective firepower. 

Advertisement

“This is a project to keep North Korea honest,” the FUNK Project site reads. “You can make a difference as one person. The goal is to perform proportional attacks and information-gathering in order to keep NK from hacking the western world completely unchecked.”

P4x says his hacktivist efforts are meant to send a message not only to the North Korean government, but also his own. His cyberattacks on North Korean networks are, he says, in part an attempt to draw attention to what he sees as a lack of government response to North Korean targeting of US individuals. “If no one ’s going to help me, I’m going to help myself,” he says.

SUBSCRIBE
Print_wired_black_on_white_003.jpg

P4x knows the exact moment last year when he was hit by North Korea's spies. In late January of 2021, he opened a file sent to him by a fellow hacker, who had described it as an exploitation tool. Just 24 hours later, he spotted a blog post from Google Threat Analysis Group warning that North Korean hackers were targeting security researchers. Sure enough, when P4x scrutinized the hacking tool he'd received from a stranger, he saw that it contained a backdoor designed to provide a remote foothold on his computer. P4x had opened the file in a virtual machine, digitally quarantining it from the rest of his system. But he was nonetheless shocked and appalled by the realization that he'd been personally targeted by North Korea. 

 

P4x says he was later contacted by the FBI but was never offered any real help to assess the damage from North Korea's hacking or to protect himself in the future. Nor did he ever hear of any consequences for the hackers who targeted him, an open investigation into them, or even a formal recognition from a US agency that North Korea was responsible. It began to feel, as he put it, like “there’s really nobody on our side.” 

When WIRED asked the FBI about its response to the North Korean targeting of US security researchers, it responded in a statement: “As the lead agency responsible for threat response we rely on the public and private sector to report suspicious activity and intrusions, and work together to ensure we understand what’s happening, prevent it from happening to others, and hold those responsible accountable,” the FBI statement reads. “The FBI is committed to pursuing the malicious actors and countries behind cyberattacks, and will not tolerate intellectual property theft or intimidation.”

After his experience as a target of state-sponsored cyberespionage, P4x spent much of the next year on other projects. But after a year had passed, still without public or private statements from the federal government about the targeting of security researchers and no offer of support from any US agency, P4x says he decided it was time to make his own statement to both the North Korean and American governments. 

Other hackers targeted by North Korea don't all agree that P4x's hacking spree is the right way to make that statement. Dave Aitel, a former NSA hacker and the founder of security firm Immunity, was similarly targeted in the same espionage campaign. But he questions whether P4x has taken a productive approach to getting even, given that he may actually be getting in the way of stealthier intelligence efforts targeting the same North Korean computers. 

You need to be a member of Ashtar Command - Spiritual Community to add comments!

Join Ashtar Command - Spiritual Community

Email me when people reply –

Sananda, One Who Serves and Shoshanna - THE GREAT AWAKENING IS NOW COMING TO A CONCLUSION via James McConnell

ANCIENT AWAKENINGS Sunday Call 3/27/2022 (Sananda, OWS, & Shoshanna)James & JoAnna McConnell THE GREAT AWAKENING IS NOW COMING TO A CONCLUSION Sananda and One Who Serves channeled by James McConnellShoshanna – Joanna’s Higher Self These messages…

Read more…
0 Replies
Views: 1538

Ashtar, One Who Serves and Shoshanna - YOU ARE CREATING YOUR NEW REALITY via James McConnell

ANCIENT AWAKENINGS  Sunday Call 3/20/2022 (Ashtar, OWS, & Shoshanna)James & JoAnna McConnell YOU ARE CREATING YOUR NEW REALITY Ashtar and One Who Serves channeled by James McConnellShoshanna – Joanna’s Higher Self These messages were given during…

Read more…
0 Replies
Views: 738

Copyright Policy: Always Include 30-50% of the source material and a link to the original article. You may not post, modify, distribute, or reproduce in any way any copyrighted material, trademarks, or other proprietary information belonging to others without obtaining the prior written consent of the owner of such proprietary rights. If you believe that someone's work has been copied and posted on Ashtar Command in a way that constitutes copyright infringement, please Contact Us and include the links to these pages and relevant info. 

Latest Activity

Love & Joy posted a discussion
   What Is The Core Of Your Life On Earth? By Steven Hutchinson Wesak, on May 23, is where we think of and celebrate the birth and life of Buddha....Remember Buddha turned away from family riches to find his own inner peace and…
31 minutes ago
Drekx Omega left a comment on Music for your soul.
"😎"Why Must You," by Souldoubt....A nice groovy number from 2006-04-01...Composer: Alex Dean

https://www.youtube.com/watch?v=-B67tdwLONM"
4 hours ago
rev.joshua skirvin posted a blog post
The pedo-blackmailed and bribed acting troupe that pretends to be the US government just bought itself a little more than a week’s survival time by means of outright crime. The Rothschild/Rockefeller owners of the US Corporation did this by fooling…
4 hours ago
Drekx Omega replied to Justin89636's discussion All About Billy Meier and the Plejaren
"Ah yes, that link is the source material for the video, which I provided to my friends at "Family of Light" to post, on my behalf, on YouTube, back in 2015...If you look on the cover image, it has both my logo, as well as that of FOL......Those guys…"
7 hours ago
Justin89636 replied to Justin89636's discussion Anything Ufo Or Et Related
"Gulf Breeze sighting back in 1992. Communication between those on the ground and the crafts was made here. https://www.youtube.com/watch?v=rp0BaS21r68"
7 hours ago
Justin89636 left a comment on Comment Wall
"Gulf Breeze sighting back in 1992. Communication between those on the ground and the crafts was made here. https://youtu.be/rp0BaS21r68?si=VbczGAkXB_mQgYa-"
7 hours ago
Drekx Omega replied to AlternateEarth's discussion The Dark Origins of the Davos’ Great Reset
"The one thing that this mostly factual collation of data, has not mentioned, is the why...WHY...?? Creating the new paradigm...?? Why...?

Basically, the dark cabal commenced the process, in serious momentum, during the early 1970s....Indeed, the…"
7 hours ago
Justin89636 replied to Justin89636's discussion All About Billy Meier and the Plejaren
"Thanks for that Drekx. Great info provided here. I also found this one not too long ago that was made by you as well that is almost the same as what you posted, but does not have a video. Ill post it right here for all to check out. Definitely a…"
7 hours ago
More…