HomeMalware & ThreatsCEOs arrested due to satellite receivers equipped with DDoS Attack feature

CEOs arrested due to satellite receivers equipped with DDoS Attack feature

Published on

spot_img

In a recent and shocking turn of events, two South Korean companies have come under fire for their involvement in equipping satellite receivers with Distributed Denial of Service (DDoS) attack capabilities. The companies, whose CEOs remain unnamed due to legal reasons, have been issued arrest warrants by the South Korean government following an extensive investigation.

The case, which has now been made public, dates back to 2017 when the two companies received an order to supply a staggering 240,000 satellite receivers. What sets this order apart is the inclusion of a controversial feature – these devices were pre-configured to launch DDoS attacks. The collaboration between the companies led to the manufacturing and delivery of the receivers by the end of the year, with over 98,560 units already equipped with DDoS functionality. The remaining devices were updated through over-the-air (OTA) updates in 2018, thereby enabling them to join in the cyberattack capabilities.

What makes this situation even more alarming is the fact that most buyers were completely unaware of the devices’ ability to carry out malicious cyber activities. Essentially designed to act as botnets, these satellite receivers could disrupt satellite operations at the whim of those in control.

The revelation of this scandal came to light in July of this year when Interpol received a tip-off regarding the DDoS capabilities of these receivers. An in-depth investigation uncovered the distribution of some of these compromised devices to broadcasting companies in developed countries such as the United States, the United Kingdom, Canada, Australia, and the UAE.

Reacting swiftly to the potential threat posed by these devices, South Korean authorities decided to take action against the executives involved in the scheme. So far, six arrests have been made in connection to the case, with the investigation still ongoing. Additionally, the funds generated from the sale of these compromised devices will be seized and redirected to the government’s treasury to prevent any further misuse of resources.

The implications of this incident are far-reaching, highlighting the need for stringent cybersecurity measures and oversight in the manufacturing and distribution of technology products. As the investigation continues, authorities are working towards ensuring that such breaches of security do not occur unchecked. The incident serves as a stark reminder of the vulnerabilities that exist in the digital landscape and the importance of vigilance in safeguarding against potential threats.

It remains to be seen how this case will unfold and the measures that will be put in place to prevent similar incidents in the future. The repercussions of this breach of trust between manufacturers and consumers serve as a cautionary tale for industries worldwide, emphasizing the critical need for transparency and accountability in the technology sector.

Source link

Latest articles

Financial institutions face increasing cyberattacks that are more destructive

Financial institutions are facing a growing threat from cybercriminals and threat actors, with Contrast...

Common Weakness Enumeration (CWE) and the Explanation of the CWE Top 25 – Source: www.hackerone.com

The Common Weakness Enumeration (CWE) system is designed to categorize security flaws in software...

AMD and Google reveal vulnerability in Zen processor microcode

A high-severity microcode signature verification vulnerability in AMD's Zen CPUs was recently disclosed following...

Episode 154: Hijacked Line – The Cyber Post

Conor Freeman, a notorious online thief, has recently been the subject of much controversy...

More like this

Financial institutions face increasing cyberattacks that are more destructive

Financial institutions are facing a growing threat from cybercriminals and threat actors, with Contrast...

Common Weakness Enumeration (CWE) and the Explanation of the CWE Top 25 – Source: www.hackerone.com

The Common Weakness Enumeration (CWE) system is designed to categorize security flaws in software...

AMD and Google reveal vulnerability in Zen processor microcode

A high-severity microcode signature verification vulnerability in AMD's Zen CPUs was recently disclosed following...