Truth about Story of North’s Hacking at “Nuclear Power Plant” in S. Korea Laid Bare
The Park Geun Hye group of south Korea let “the government joint investigation team” release results of temporary interim investigation in which it claimed that the hacking at the nuclear power plant was conducted by the north.
The Central Internet Institute of the DPRK made public an open statement laying bare truth about the case on March 26.
The statement clarified the background against which the “cyber attack” occurred and the above-said story was cooked up.
It was reported that from December 9 last year cyber attack was mounted six times on computer networks at the head office of the hydraulic and atomic energy company of south Korea and nuclear power plants under it and computers of thousands of core elements working there.
Finding it hard to accurately investigate the existence of the hacking group, the puppet group claimed that the IP addresses chased so far are concentrated on Shenyang, China, there were traces of access to IP address of the DPRK and phrases used for attacks were “north Korean-style expressions.” After producing this fictitious evidence, the group cooked up the above-said results and opened them to public.
The open statement brought to light the absurdity of the malignant code “Kimsuki”, IP address and “north Korean-style expression” presented by the puppet group as evidence to prove that the attack was made by the north.
As far as the malignant code “Kimsuki” is concerned, it was opened to public by the Russian security business Kaspersky two years ago which analyzed various malignant codes infiltrating into the network of south Korea and the codes that accessed the computers of its regime and companies.
The south Korean puppet group claimed that the e-mail address was revealed to have been registered as “Kimsuki” when the malignant code was transmitting data concerning its operating status and infected systems.
It was disclosed that “Kimsuki” was “Kimsukhyang” by origin but its pronunciation changed and was confirmed as malicious code “Kimsuki”.
When spelling the name “Kim Suk Hyang”, the word “Hyang” is not written as “Kyang” in the DPRK.
The main reason why the puppet group concluded the case as a “north’s deed” is that the IP address of the malignant code was similar to the IP address in Shenyang, China.
Most of Koreans living in Shenyang are south Koreans and there are more IP addresses used by south Koreans and foreigners than those used by citizens of the DPRK.
The puppet “government joint investigation team” reportedly requested the Chinese judicial authorities to help confirm the origin of the one who used the IP address in Shenyang but failed to receive their reply.
The open statement disclosed the criminal nature of the puppet group’s assertion that the hacking was done by the north.
Lurking behind it is a dirty design of the puppet group to tide over its ruling crisis and prolong its remaining days.
Running high among south Korean people is their indignation at the unpopular rule of the Park Geun Hye group which turned the whole of south Korea into the theatre of rowdyism under the Yushin dictatorship, a human rights tundra and a veritable hell.
The Park group calculated that it could calm down the public anger and tide over its ruling crisis by branding the case as a “north’s deed.”
By spreading the above-said story, the puppet group sought to shift the blame for the worsened north-south ties inching close to a war instead of dialogue on to the DPRK.
It is also revelation of a sinister design to create “security uneasiness” in south Korea and step up war moves against the DPRK.
There is also an ulterior design sought by the puppet group of pro-US sycophants to stifle the DPRK by taking advantage of the US hostile policy toward the DPRK.
However, the Park group only left a blot in the history of the north-south relations as a plot-breeding group which cooked up the story about “north’s cyber attack.”
The Park group should bear in mind that all Koreans are keeping tabs on all its evil doings.