Wednesday, December 30, 2015

Red Star: how sophisticated North Korean spy operating system works – Teletrece

The first in-depth analysis of the operating system used by computers in North Korea reveals spy tools capable of monitoring even the documents executed when the device is offline.

The Red Star operating system was designed to superficially resemble Apple OS X, but has hidden features that allow you to mark files and link them to a specific individual.

Hidden tools were discovered by Florian Schiess Grunow and Niklaus, Two German researchers who conducted the analysis last month.

Schiess Grunow and presented their findings Sunday at the “Chaos Communication Congress”, a conference held in Hamburg with security experts , cryptography, privacy and freedom of expression.

The researchers reviewed in detail the code of Red Star 3.0, which appeared online a year ago operating system.

According to the BBC said Grunow, system developers “did a very good job” to copy the look of basic design and functionality of the Apple computers.

Red Star: c & # XF3; how does the sophisticated operating system esp & # XED; to North Korea

The above OS North Korea was more like Windows.

Peo they put a special added: any file uploaded to the system using a USB or other storage device can be marked disk, which allows the State to follow its path from one machine to another

Red Star can also identify and delete unwanted files without authorization.

A very sophisticated system

Grunow explains that the function to marking and tracing files were designed in response to the proliferation of films and foreign music being shared offline.

“That allows you to have a record of when a document was opened for the first time at the Red Star operating system and by whom. It basically allows the state to track the file “he says.

The system will mark the files with individual serial numbers but not know how easy it is for the State to link those numbers serially to a particular user.

An item that still has puzzled researchers is the discovery of an extended version of the software that allows mark the files and that they have failed to fully understand, but Grunow think you can help identify users individually.

“What we have seen is the basic system mark the files, but found no evidence of the existence of a widespread mechanism that is much more sophisticated and has a different cryptography, “he says

."

Experts do not know precisely how computers North Korea has installed its new operating system.

“It could be that the file corresponds to your individual brand and they link it in their registration with you, allowing them to track specific individuals”.

Red Star is set to make nearly impossible for users to modify the system. Attempts to disable your antivirus software or firewall Internet make the system restarts.



A mark to free speech

The idea of ​​creating a internal operating system was initially conceived as Grunow, Kim Jong-il, who led the country between 1994 and 2011.

“He said North Korea should create its own operating system and that’s what they’ve done, “Grunow said.

” If you look at North Korea you see that Red Star is similar to the way the state functions. It is very controlled, they closely focus on system integrity and have mechanisms to track users, “he said.

As with many other things in the most isolated country in the world is unknown how used in the Red Star system in North Korea.

Grunow considered likely to be installed in libraries and other public buildings, where computer use is decided by the state.

Red Star: c & # XF3; how does the sophisticated operating system esp & # XED; to North Korea Red Star was built using Linux, a free and open source platform that can be freely modified by users and it was designed that way to make it as accessible as possible.

Therefore, to Grunow is an irony in the use that has given North Korea.

“They are using a system that was built to promote freedom expression and improperly used for marking and tracing freedom of expression, “he says.

More ironic is still the name of the file used by Red Star to pursue suspicious files on the machine.

“The file you are and that is used by the antivirus system is called Angae. That means mist or fog, something dark and it is not transparent. No ? We have no idea why they chose that name, but it is appropriate, right, “adds

.

LikeTweet

No comments:

Post a Comment