회사소개

제품

안내

고객지원

Company

Product

Information

Support

Thông tin về công ty

Sản phẩm

Thông tin

Hỗ trợ chung

Notice

Title Date
NPCore Joined Vietnam·Malaysia Cyber Security Partnership Meeting

NPCore Joined Vietnam·Malaysia Cyber Security Partnership Meeting

베트남 로드쇼2
 
NPCore met with Vietnamese and Malaysian companies in the information security business meeting held in Ho Chi Minh City, Vietnam and Kuala Lumpur, Malaysia from 19th to 23rd.
In recent years, Vietnam and Malaysia have been attracting a great deal of attention to information security issues both politically and socially.
In June, Vietnam established Law on cybersecurity which is the first domestic law in the cybersecurity field and is expected to be implemented from January 1, 2019. Malaysia is also experiencing a major social upheaval recently with the Ransomware accident of the media group. Media Prima, who was attacked in Ransomware in mid-November, was reportedly asked by an attacker for a bit coin of US $ 6.2 million. 
 
Meanwhile, NPCore said that it was able to receive a good response from local companies because it already has a proven records of providing its solution "Zombie ZERO" to Malaysian and Vietnamese government agencies. 
 
Zombie ZERO is an APT(Advanced Persistent Threat) and Ransomware solution that can proactively respond to new and variant malware that cannot be prevented by Anti-virus. By combining artificial intelligence(AI) technology, it determines threat level and responds to cyber threats based on 4 steps analysis - signature analysis, static analysis, dynamic analysis, reputation analysis. It also automates the process of detection and blocking by learning whitelist and blacklist pattern.
 
CEO Seung-Chul Han, "We have participated in the Southeast Asia Information Security Business Conference hosted by KISIA and KISA every year, and I feel that the interest in APT and Ransomware solution is getting higher as the awareness level of Southeast Asia information security is improved. We will link our partnership with local companies to export results in the first half of next year." 
2018.12.04

i-Web was infected by Ransomware damaging thousands of web sites

Author
admin
Date
2018-09-27 14:57
Views
185
The following is an English version of the " 아이웹 랜섬웨어 감염 사태로 수천여개 웹사이트 피해 (i-Web was infected by Ransomware damaging thousands of web sites)" written by Boaanews reporter Kyoung-Ae Kim.

*Original article link: https://www.boannews.com/media/view.asp?idx=73260&kind=0

[Boannews Reporter Kyoung-Ae Kim] i-Web, a website maker that provides a free website builder, was attacked by Ransomware during the Chuseok holiday. The i-Web builder database (DB) server was encrypted and more than a thousand websites have been damaged by Ransomware.


▲i-Web customer service board [image=-boannews]

According to boannews, it is known that the damage caused by Ransomware attack is 2,000 ~ 3,000 websites using the i-Web, and many of the Internet shopping malls including summer beach event site are occupied.

Until now, the server has been restored and operated normally, but the important data revealed on the i-Web has not been restored to the database so far. Also, in the explanation that the DB area revealed on the i-Web side is encrypted with the latest technology, the result of the report is confirmed that the encryption method is not the latest technology.

Ransomware attackers were reportedly threatening to pay 100 million won worth of coins for their money on the i-Web. It is believed that the purpose of the attacker was to crack the money by inducing the conflict with the i-Web side by attacking most of the small business people by encrypting the small web site, DB etc. stored in the server with the target of the i-Web Builder server. It is likely to be a strategy to lead negotiations by drawing customer protest, such as the case of the Internet hosting service provider Nayana.

It is reported that Cyber Security Bureau of the National Police Agency and the Korea Internet Development Agency (KISA) are currently under investigation for details such as whether Ransomware has been infected.