<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Andariel &#8211; @Forensicxs</title>
	<atom:link href="https://www.forensicxs.com/tag/andariel/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Wed, 23 Dec 2020 15:07:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>North Korea and the Web</title>
		<link>https://www.forensicxs.com/north-korea-and-the-web/</link>
					<comments>https://www.forensicxs.com/north-korea-and-the-web/#respond</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 15:07:28 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Andariel]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Bluenoroff]]></category>
		<category><![CDATA[Bureau 121]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Kwangmyong]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[Naenara]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[RedStar OS]]></category>
		<category><![CDATA[TransTeleCom]]></category>
		<category><![CDATA[Unicom]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=1122</guid>

					<description><![CDATA[North Korea (&#8220;NK&#8221;), or DPRK &#8211; Democratic People&#8217;s Republic of Korea &#8211; is seen as a dictatorship, and a very isolated country, for some good reasons. On one hand, they have almost totally isolated their country from the Internet. On the other hand, we know that NK hackers are very active. This contradiction made me &#8230; <p class="link-more"><a href="https://www.forensicxs.com/north-korea-and-the-web/" class="more-link">Continue reading<span class="screen-reader-text"> "North Korea and the Web"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p><strong><span class="has-inline-color has-vivid-red-color">North Korea (&#8220;NK&#8221;)</span></strong>, or DPRK &#8211; Democratic People&#8217;s Republic of Korea &#8211; is seen as a dictatorship, and a very isolated country, for some good reasons. On one hand, they have almost totally isolated their country from the Internet. On the other hand, we know that NK hackers are very active. This contradiction made me think that it would be interesting to dig in, and write an article about North Korea and the Web&#8230;so let&#8217;s go !</p>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image.png" alt="" class="wp-image-1124" width="451" height="301" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image.png 733w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-300x201.png 300w" sizes="(max-width: 451px) 100vw, 451px" /></figure>



<p>As an introduction, I would like to start providing a few hints about the physical isolation of NK. In fact, there is an extreme correlation between the physical isolation of NK and it&#8217;s degree of isolation on the web&#8230;bridging the two is helpfull to understand the overall situation</p>



<hr class="wp-block-separator"/>



<p><span class="has-inline-color has-vivid-cyan-blue-color"><strong>Isolation of N</strong></span><strong><span class="has-inline-color has-vivid-cyan-blue-color">orth Korea</span></strong></p>



<p>NK is a relatively small country of about 25 Million people, located in sandwich between China and South Korea. It has a small border also with Russia in the North East (near the city of Vladivostok)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="552" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2020-12-11-215652-1-1024x552.png" alt="" class="wp-image-1146" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2020-12-11-215652-1-1024x552.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2020-12-11-215652-1-300x162.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2020-12-11-215652-1-768x414.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2020-12-11-215652-1.png 1318w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>NK is a stalinist &#8211; communist driven country. Here is a short reminder of it&#8217;s recent history :</p>



<p>In 1910, Korea &#8211; at that time, a unified territory &#8211; was annexed by the Japanese Empire. At the end of the second world war, in 1945, Japan capitulated and the Korean peninsula was separated in two parts, following the offensive of two superpowers, Soviet Union in the north and USA in the South. Negociations for a reunification being stalled between Soviet Union and USA, distinct governments are formed in the north and in the south. In 1948, the north intends to attack the south, leading to the Korean war between 1950 and 1953. The armistice between the two opponents will be a cease fire, but no peace treaty will ever be signed. </p>



<p>After the dislocation of the Soviet Union, NK will face a catastrophic famine. The Kim dinasty, at the head of the country, will lead a policy of &#8220;military first&#8221;, to strengthen the country and it&#8217;s government. At the same time, NK will take an ever increasing path towards a dictatorship, building concentration camps, deporting people, killing thousands of political opponents. As a &#8220;rogue nation&#8221;, more and more isolated, constrained by embargoes, NK will grow an illicit trade with some complicit countries. In this respect, because of the former Sino-Soviet relationships, and also some common business interests, NK will have specific ties with China and Russia, in many areas</p>



<p>Having said that, let&#8217;s have a deeper look at NK physical flows with its neighbors</p>



<p><strong><span class="has-inline-color has-vivid-red-color">Closed borders</span></strong></p>



<p><em>In the South</em>, since the cease fire with SK, it has a so called DMZ &#8211; demilitarized zone &#8211; border with SK. This border is a very strong barrier as can be seen below. There is a single point of entry called the Joint Security Area</p>



<figure class="wp-block-gallery columns-2 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img decoding="async" width="1024" height="616" src="https://www.forensicxs.com/wp-content/uploads/2020/12/separant-Coree-Sud-Coree-Nord-12-fevrier-2017-Paju_4_1399_842-1024x616.jpg" alt="" data-id="1148" data-link="https://www.forensicxs.com/?attachment_id=1148" class="wp-image-1148" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/separant-Coree-Sud-Coree-Nord-12-fevrier-2017-Paju_4_1399_842-1024x616.jpg 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/separant-Coree-Sud-Coree-Nord-12-fevrier-2017-Paju_4_1399_842-300x181.jpg 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/separant-Coree-Sud-Coree-Nord-12-fevrier-2017-Paju_4_1399_842-768x462.jpg 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/separant-Coree-Sud-Coree-Nord-12-fevrier-2017-Paju_4_1399_842.jpg 1399w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li><li class="blocks-gallery-item"><figure><img decoding="async" width="1024" height="606" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ-1024x606.png" alt="" data-id="1149" data-full-url="https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ.png" data-link="https://www.forensicxs.com/?attachment_id=1149" class="wp-image-1149" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ-1024x606.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ-300x178.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ-768x455.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ-1536x910.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/12/Panmunjeom_DMZ.png 1920w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li></ul></figure>



<p><em>In the North East</em>, it has a natural border with Russia, in a quite desertic and isolated area, with the Tumen River. There is only one bridge linking the two countries, the so called Friendship bridge. The overall area is poor and rather hostile</p>



<figure class="wp-block-gallery columns-2 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img decoding="async" width="1024" height="642" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1024x642.png" alt="" data-id="1150" data-link="https://www.forensicxs.com/?attachment_id=1150" class="wp-image-1150" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1024x642.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-300x188.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-768x481.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture.png 1198w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li><li class="blocks-gallery-item"><figure><img decoding="async" width="795" height="500" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture2.png" alt="" data-id="1151" data-full-url="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture2.png" data-link="https://www.forensicxs.com/?attachment_id=1151" class="wp-image-1151" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture2.png 795w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture2-300x189.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture2-768x483.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li></ul></figure>



<p><em>In the North</em>, it has a natural border with mainland China, with the very long Yalu River. There are a few bridges across the river, the main one being the Sino-Korean Friendship Bridge, located in the Chinese city of Dandong (top left corner of the below photo). There&#8217;s a good article here if you want to know more about Dandong : <a href="https://bit.ly/3npFqZC" target="_blank" rel="noreferrer noopener">https://bit.ly/3npFqZC</a></p>



<figure class="wp-block-gallery columns-2 is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img decoding="async" width="1024" height="447" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1-1024x447.png" alt="" data-id="1152" data-link="https://www.forensicxs.com/?attachment_id=1152" class="wp-image-1152" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1-1024x447.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1-300x131.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1-768x335.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-1.png 1396w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li><li class="blocks-gallery-item"><figure><img decoding="async" width="800" height="550" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Dandong_Liaoning_Province.jpg" alt="" data-id="1153" data-full-url="https://www.forensicxs.com/wp-content/uploads/2020/12/Dandong_Liaoning_Province.jpg" data-link="https://www.forensicxs.com/?attachment_id=1153" class="wp-image-1153" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Dandong_Liaoning_Province.jpg 800w, https://www.forensicxs.com/wp-content/uploads/2020/12/Dandong_Liaoning_Province-300x206.jpg 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Dandong_Liaoning_Province-768x528.jpg 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li></ul></figure>



<p>The <em>sea traffic</em> is very low as per global live traffic maps (in addition to the embargo, at the time of writing this article, NK had taken measures to limit sea traffic because of the COVID pandemic)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="681" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-2-1024x681.png" alt="" class="wp-image-1157" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-2-1024x681.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-2-300x199.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-2-768x511.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-2.png 1158w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The air traffic is almost null, see below the captures of the today&#8217;s live traffic, and also the scheduled flights in the next 7 days&#8230;just one flight to Beijing in China !</p>



<figure class="wp-block-gallery columns-2 is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img decoding="async" width="1024" height="511" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-2-1024x511.png" alt="" data-id="1158" data-link="https://www.forensicxs.com/?attachment_id=1158" class="wp-image-1158" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-2-1024x511.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-2-300x150.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-2-768x383.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-2.png 1342w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li><li class="blocks-gallery-item"><figure><img decoding="async" width="1010" height="636" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2.png" alt="" data-id="1159" data-full-url="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2.png" data-link="https://www.forensicxs.com/?attachment_id=1159" class="wp-image-1159" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2.png 1010w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2-300x189.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-decran-2-768x484.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure></li></ul></figure>



<p>For a much detailed navigator of NK topography, go to the excellent 38North web site : <a href="http://38northdigitalatlas.org/" target="_blank" rel="noreferrer noopener">http://38northdigitalatlas.org/</a></p>



<p>Enough with geography data&#8230;I think you got it ! It sets the tone for what will see next</p>



<p><span class="has-inline-color has-vivid-red-color"><strong>Internet cable routes</strong></span></p>



<p>First of all, we can have a look at the submarine internet cables in the area of North Korea : <a href="https://www.submarinecablemap.com/" target="_blank" rel="noreferrer noopener">https://www.submarinecablemap.com/</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="837" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-3-1024x837.png" alt="" class="wp-image-1177" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-3-1024x837.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-3-300x245.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-3-768x628.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-3.png 1155w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>There are no submarine cables going to NK. Not surprising !</p>



<p><strong><span class="has-inline-color has-vivid-red-color">China Unicom</span></strong> has a notorious terrestrial cable going to NK, through Dandong</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="549" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-4-1024x549.png" alt="" class="wp-image-1180" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-4-1024x549.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-4-300x161.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-4-768x412.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-4-1536x823.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-4.png 1817w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>This cable goes along the Sino-Korean Friendship Bridge, seen above</p>



<p>There is also a cable running from Russia into North Korea, through the Tumen River Friendship bridge (again, seen above). It is operated by the <strong><span class="has-inline-color has-vivid-red-color">Russian TTK &#8211; TransTeleCom</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="444" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-17-1024x444.png" alt="" class="wp-image-1182" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-17-1024x444.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-17-300x130.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-17-768x333.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-17.png 1473w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Before the opening of this second cable, NK was only relying on one cable, the Chinese cable. Therefore NK was not quite secure from an Internet access point of view. This cable was a &#8220;single point of failure&#8221;</p>



<p>The USA triggered a reaction from NK, when they decided to DDoS their internet line, following a spate of hacks from NK : <a href="https://www.38north.org/2017/10/mwilliams100117/" target="_blank" rel="noreferrer noopener">https://www.38north.org/2017/10/mwilliams100117/</a></p>



<p>The Russian cable was put in service shortly after !</p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">TLD &#8211; Top Level Domain of North Korea</span></strong></p>



<p>I will start by providing an interesting number&#8230;how many internet users in North Korea ?</p>



<p>To answer this question, let&#8217;s go here : <a href="https://resources.potaroo.net/iso3166/v4cc.html" target="_blank" rel="noreferrer noopener">https://resources.potaroo.net/iso3166/v4cc.html</a></p>



<p>This link provides a full updated table of internet usage per country in the world : number of IP adresses, number of internet users,&#8230;</p>



<p>North Korea lies in the 240th position&#8230;with <strong><span class="has-inline-color has-vivid-red-color">a number of internet users as low as 51 557</span></strong> users. That means an internet access as low as Eritrea, but this African country only has 3.5 million people, while North Korea has about 25.7 million people&#8230;</p>



<p>Who are these users ? This article, based upon good data, explains that the Elite has access to the global Internet : <a href="https://www.recordedfuture.com/north-korea-internet-activity/" target="_blank" rel="noreferrer noopener">https://www.recordedfuture.com/north-korea-internet-activity/</a></p>



<p>Let&#8217;s continue and have a look at the top level domain information from NK. For this, let&#8217;s go to the IANA website : <a href="https://www.iana.org/about" target="_blank" rel="noreferrer noopener">https://www.iana.org/about</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-3.png" alt="" class="wp-image-1162" width="586" height="337" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-3.png 986w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-3-300x173.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-3-768x443.png 768w" sizes="(max-width: 586px) 100vw, 586px" /><figcaption>IANA mission statement</figcaption></figure>



<p>Let&#8217;s search into the Root Zone Database : <a href="https://www.iana.org/domains/root/db" target="_blank" rel="noreferrer noopener">https://www.iana.org/domains/root/db</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-4.png" alt="" class="wp-image-1163" width="227" height="197" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-4.png 360w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-4-300x260.png 300w" sizes="(max-width: 227px) 100vw, 227px" /></figure>



<p>The TLD &#8211; Top Level Domain for North Korea is <strong><span class="has-inline-color has-vivid-red-color">.kp</span></strong>. Searching in the database brings us to those details </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-5.png" alt="" class="wp-image-1164" width="572" height="255" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-5.png 980w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-5-300x134.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-5-768x343.png 768w" sizes="(max-width: 572px) 100vw, 572px" /></figure>



<p>Who is <strong><span class="has-inline-color has-vivid-red-color">Star Joint Venture Company</span></strong> ? It&#8217;s a joint venture between the Korean Post and Telecommunications Corporation, a NK governmental enterprise, and Loxley Pacific Company Limited, located in Thailand </p>



<p><strong><span class="has-inline-color has-vivid-red-color">Loxley is a Thai Conglomerate</span></strong> operating since many years, highly diversified in many business sectors : <a href="https://www.loxley.co.th/profile.html" target="_blank" rel="noreferrer noopener">https://www.loxley.co.th/profile.html</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="280" height="373" src="https://www.forensicxs.com/wp-content/uploads/2020/12/142702272.jpg" alt="" class="wp-image-1167" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/142702272.jpg 280w, https://www.forensicxs.com/wp-content/uploads/2020/12/142702272-225x300.jpg 225w" sizes="(max-width: 280px) 100vw, 280px" /></figure>



<p>One of their business units is specialized in Networking technology</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-6.png" alt="" class="wp-image-1165" width="622" height="104" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-6.png 882w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-6-300x51.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-6-768x130.png 768w" sizes="(max-width: 622px) 100vw, 622px" /></figure>



<p>You well get a good background in this article, about the ties between Thailand and North Korea : <a href="https://philipiglauer.wordpress.com/tag/thai-north-korea-ties/" target="_blank" rel="noreferrer noopener">https://philipiglauer.wordpress.com/tag/thai-north-korea-ties/</a></p>



<p>Let&#8217;s check these IP adresses and see what we can learn from it. I use some basic search tools, such as <a href="https://network-tools.com/" target="_blank" rel="noreferrer noopener">https://network-tools.com/</a> and <a href="https://www.whois.com/" target="_blank" rel="noreferrer noopener">https://www.whois.com/</a>. I&#8217;m doing a traceroute (to find out the network path from my location, to the destination IP in North Korea), and step by step, a whois search to find more informations about individual IPs found in the traceroute</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-7.png" alt="" class="wp-image-1166" width="559" height="303" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-7.png 776w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-7-300x163.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-7-768x418.png 768w" sizes="(max-width: 559px) 100vw, 559px" /></figure>



<p>The route is the following : USA -&gt; Germany -&gt; USA -&gt; China. The last node (103.35.255.254) before reaching North Korea, is CENBONGT-HK located in China, Hong-Kong province. Just before, we had the node 219.158.33.86, which is CHINA UNICOM</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-8.png" alt="" class="wp-image-1169" width="431" height="251" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-8.png 690w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-8-300x175.png 300w" sizes="(max-width: 431px) 100vw, 431px" /></figure>



<p>Let&#8217;s look for CENBONGT in this tool : <a href="https://whois.ipinsight.io/" target="_blank" rel="noreferrer noopener">https://whois.ipinsight.io/</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="186" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-10-1024x186.png" alt="" class="wp-image-1171" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-10-1024x186.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-10-300x55.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-10-768x140.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-10.png 1359w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>We find the AS number wich is AS134544. The AS number stands for Autonomous System Number (<em>AS number</em>&nbsp;or just&nbsp;<em>ASN</em>), and it is a special number assigned by IANA, used primarilly with Border Gateway Protocol, which uniquely identifies a network under a single technical administration that has a unique routing policy, or is multi-homed to the public internet</p>



<p>This autonomous system number is required, if you are to run BGP and peer with your internet service provider, and between internet service providers at peering points and Internet Exchanges (IX).&nbsp; The ASN must be globally unique so that&nbsp;IP adress blocks appear to come from a unique location that BGP can find, and route to this location</p>



<p>BGP uses Prefixes and Autonomous System Paths (AS Paths) to determine the shortest path to a destination where a prefix is located</p>



<p>Let&#8217;s click on AS134544, we find that this AS is linked to the <strong><span class="has-inline-color has-vivid-red-color">CHINA UNICOM</span></strong> backbone, which is consistent with the previous node we found in the traceroute</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="197" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-11-1024x197.png" alt="" class="wp-image-1173" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-11-1024x197.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-11-300x58.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-11-768x148.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-11.png 1327w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Then, let&#8217;s go &#8220;downstreams&#8221;. Here we find that the <strong><span class="has-inline-color has-vivid-red-color">CENBONGT</span></strong> is connected to the STAR JOINT VENTURE CO, located in Nort Korea</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="196" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-12-1024x196.png" alt="" class="wp-image-1174" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-12-1024x196.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-12-300x57.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-12-768x147.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-12.png 1271w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Now, let&#8217;s click on AS131279, and we get more informations about the <strong><span class="has-inline-color has-vivid-red-color">STAR-KP</span></strong></p>



<p>We find that there are other AS connected to STAR-KP</p>



<figure class="wp-block-image size-large"><img decoding="async" width="896" height="262" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-19.png" alt="" class="wp-image-1186" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-19.png 896w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-19-300x88.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-19-768x225.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>We find the AS20485 <strong><span class="has-inline-color has-vivid-red-color">TRANSTELECOM</span></strong>, the Russian network company. There is one IP located in North Korea</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="685" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-20-1024x685.png" alt="" class="wp-image-1187" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-20-1024x685.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-20-300x201.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-20-768x514.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-20.png 1183w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Here is the <strong><span class="has-inline-color has-vivid-red-color">route propagation</span></strong> of the Star Joint Venture Co : <a href="https://bgp.he.net/AS131279#_graph4" target="_blank" rel="noreferrer noopener">https://bgp.he.net/AS131279#_graph4</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="935" height="634" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-21.png" alt="" class="wp-image-1188" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-21.png 935w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-21-300x203.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-21-768x521.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Exploration of North Korea Domains</span></strong></p>



<p>Let&#8217;s look for some domains with the .kp extension. Let&#8217;s do a Google search. After some scrolling I found this one : <a href="http://www.dprkportal.kp/" target="_blank" rel="noreferrer noopener">http://www.dprkportal.kp/</a></p>



<p>As the name says, this is a portal to several NK websites, so this is going to be an interesting &#8220;collection point&#8221;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-23-1024x786.png" alt="" class="wp-image-1193" width="555" height="426" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-23-1024x786.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-23-300x230.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-23-768x589.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-23.png 1256w" sizes="(max-width: 555px) 100vw, 555px" /></figure>



<p>Let&#8217;s look into this URL, using the excellent <a href="https://urlscan.io/" target="_blank" rel="noreferrer noopener">https://urlscan.io/</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="954" height="910" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-22.png" alt="" class="wp-image-1192" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-22.png 954w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-22-300x286.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-22-768x733.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>From their on, I have compiled a table with this list of domains, technology used by these domains. To catch a bit more informations, I have used Kali Linux, Nmap (<a href="https://hackertarget.com/7-nmap-nse-scripts-recon/" target="_blank" rel="noreferrer noopener">https://hackertarget.com/7-nmap-nse-scripts-recon/</a>)</p>



<figure class="wp-block-table is-style-regular"><table class="has-fixed-layout"><thead><tr><th>Domain</th><th class="has-text-align-center" data-align="center">Topic</th><th class="has-text-align-center" data-align="center">IP</th><th class="has-text-align-center" data-align="center">Technology</th></tr></thead><tbody><tr><td><a href="http://dprkportal.kp/" target="_blank" rel="noreferrer noopener">http://dprkportal.kp/</a></td><td class="has-text-align-center" data-align="center">Main portal      </td><td class="has-text-align-center" data-align="center">175.45.176.80</td><td class="has-text-align-center" data-align="center">Apache<br>Javascript</td></tr><tr><td><a href="http://www.rodong.rep.kp" target="_blank" rel="noreferrer noopener">http://www.rodong.rep.kp</a></td><td class="has-text-align-center" data-align="center">Official newspaper of the Central Committee of the Workers&#8217; Party</td><td class="has-text-align-center" data-align="center">175.45.176.68</td><td class="has-text-align-center" data-align="center">Apache<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated v1.10.2</span></strong>)</td></tr><tr><td><a href="http://www.kcna.kp" target="_blank" rel="noreferrer noopener">http://www.kcna.kp</a></td><td class="has-text-align-center" data-align="center">Central news Agency</td><td class="has-text-align-center" data-align="center">175.45.176.71</td><td class="has-text-align-center" data-align="center">Apache<br>Squid/4.10<br>Javascript<br>jQuery <br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated v1.7.1</span></strong>)</td></tr><tr><td><a href="http://www.vok.rep.kp" target="_blank" rel="noreferrer noopener">http://www.vok.rep.kp</a></td><td class="has-text-align-center" data-align="center">Voice of Korea</td><td class="has-text-align-center" data-align="center">175.45.176.75</td><td class="has-text-align-center" data-align="center"> Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>) <strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar4.0 OS</span></strong><br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap<br>Ajax</td></tr><tr><td><a href="http://www.gnu.rep.kp" target="_blank" rel="noreferrer noopener">http://www.gnu.rep.kp</a></td><td class="has-text-align-center" data-align="center">Pyongyang &#8220;national unity&#8221; editorial</td><td class="has-text-align-center" data-align="center">175.45.176.73</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>) <strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar4.0 OS</span></strong><br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.mediaryugyong.com.kp" target="_blank" rel="noreferrer noopener">http://www.mediaryugyong.com.kp</a></td><td class="has-text-align-center" data-align="center">Media informations</td><td class="has-text-align-center" data-align="center">175.45.176.80</td><td class="has-text-align-center" data-align="center">Apache<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.naenara.com.kp" target="_blank" rel="noreferrer noopener">http://www.naenara.com.kp</a></td><td class="has-text-align-center" data-align="center">Media informations</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>) <strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar4.0 OS</span></strong><br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 3.3.1</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.pyongyangtimes.com.kp" target="_blank" rel="noreferrer noopener">http://www.pyongyangtimes.com.kp</a></td><td class="has-text-align-center" data-align="center">Newspaper</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br><strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar4.0 OS</span></strong><br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.10.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.korean-books.com.kp" target="_blank" rel="noreferrer noopener">http://www.korean-books.com.kp</a></td><td class="has-text-align-center" data-align="center">Book store</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br><strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar4.0 OS</span></strong><br>Squid/4.10</td></tr><tr><td><a href="http://www.mfa.gov.kp" target="_blank" rel="noreferrer noopener">http://www.mfa.gov.kp</a></td><td class="has-text-align-center" data-align="center">Ministry of Foreign Affairs</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br><strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar4.0 OS</span></strong><br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)</td></tr><tr><td><a href="http://www.ryongnamsan.edu.kp" target="_blank" rel="noreferrer noopener">http://www.ryongnamsan.edu.kp</a></td><td class="has-text-align-center" data-align="center">Kim Il Sung University</td><td class="has-text-align-center" data-align="center">175.45.176.79</td><td class="has-text-align-center" data-align="center">Apache<br>PHP <br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 5.3.5</span></strong>)<br><strong><span class="has-inline-color has-vivid-cyan-blue-color">Gmail</span></strong><br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.10.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.kftrade.com.kp" target="_blank" rel="noreferrer noopener">http://www.kftrade.com.kp</a></td><td class="has-text-align-center" data-align="center">Foreign Trade</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.1.0</span></strong>)<br>Angular<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.4.5</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.friend.com.kp" target="_blank" rel="noreferrer noopener">http://www.friend.com.kp</a></td><td class="has-text-align-center" data-align="center">Children of Korea</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap<br></td></tr><tr><td><a href="http://www.kut.edu.kp" target="_blank" rel="noreferrer noopener">http://www.kut.edu.kp</a></td><td class="has-text-align-center" data-align="center">University of Technology</td><td class="has-text-align-center" data-align="center">175.45.176.91</td><td class="has-text-align-center" data-align="center">Apache<br>Tomcat/Coyote JSP1.1<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.0.3</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.kass.org.kp" target="_blank" rel="noreferrer noopener">http://www.kass.org.kp</a></td><td class="has-text-align-center" data-align="center">Association of Social Scientists</td><td class="has-text-align-center" data-align="center">175.45.176.91<br></td><td class="has-text-align-center" data-align="center">Apache<br>Tomcat/Coyote JSP1.1<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.0.3</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.youth.rep.kp" target="_blank" rel="noreferrer noopener">http://www.youth.rep.kp</a></td><td class="has-text-align-center" data-align="center">Korean Youth</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.10.1</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.manmulsang.com.kp" target="_blank" rel="noreferrer noopener">http://www.manmulsang.com.kp</a></td><td class="has-text-align-center" data-align="center">Marketplace</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 3.2.0</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.fia.law.kp" target="_blank" rel="noreferrer noopener">http://www.fia.law.kp</a></td><td class="has-text-align-center" data-align="center">Financial Intelligence Agency</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.koredufund.org.kp" target="_blank" rel="noreferrer noopener">http://www.koredufund.org.kp</a></td><td class="has-text-align-center" data-align="center">Korea Education Fund</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.kiyctc.com.kp" target="_blank" rel="noreferrer noopener">http://www.kiyctc.com.kp</a></td><td class="has-text-align-center" data-align="center">Korea International Youth Travel</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.cooks.org.kp" target="_blank" rel="noreferrer noopener">http://www.cooks.org.kp</a></td><td class="has-text-align-center" data-align="center">Korean Dishes</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.airkoryo.com.kp" target="_blank" rel="noreferrer noopener">http://www.airkoryo.com.kp</a></td><td class="has-text-align-center" data-align="center">Air Travel</td><td class="has-text-align-center" data-align="center">175.45.176.69<br></td><td class="has-text-align-center" data-align="center">Apache<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.2.15</span></strong>)<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.4.2</span></strong>)<br>Bootstrap<br>PHP<br>Magento</td></tr><tr><td><a href="http://www.knic.com.kp" target="_blank" rel="noreferrer noopener">http://www.knic.com.kp</a></td><td class="has-text-align-center" data-align="center">National Insurance</td><td class="has-text-align-center" data-align="center">175.45.176.91<br></td><td class="has-text-align-center" data-align="center">Apache<br>Tomcat/Coyote JSP1.1<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.0.3</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.korelcfund.org.kp" target="_blank" rel="noreferrer noopener">http://www.korelcfund.org.kp</a></td><td class="has-text-align-center" data-align="center">Care Elderly</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.tourismdprk.gov.kp" target="_blank" rel="noreferrer noopener">http://www.tourismdprk.gov.kp</a></td><td class="has-text-align-center" data-align="center">Tourism</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.mirae.aca.kp" target="_blank" rel="noreferrer noopener">http://www.mirae.aca.kp</a></td><td class="has-text-align-center" data-align="center">State Commission of Science and Technology</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.ma.gov.kp" target="_blank" rel="noreferrer noopener">http://www.ma.gov.kp</a></td><td class="has-text-align-center" data-align="center">Maritime Administration</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.sdprk.org.kp" target="_blank" rel="noreferrer noopener">http://www.sdprk.org.kp</a></td><td class="has-text-align-center" data-align="center">Sports Department</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.korfilm.com.kp" target="_blank" rel="noreferrer noopener">http://www.korfilm.com.kp</a></td><td class="has-text-align-center" data-align="center">Korean Movies</td><td class="has-text-align-center" data-align="center">175.45.176.91<br></td><td class="has-text-align-center" data-align="center">Apache<br>Tomcat/Coyote JSP1.1<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.0.3</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.pulbora.edu.kp" target="_blank" rel="noreferrer noopener">http://www.pulbora.edu.kp</a></td><td class="has-text-align-center" data-align="center"><em>site is not reachable</em></td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.gpsh.edu.kp" target="_blank" rel="noreferrer noopener">http://www.gpsh.edu.kp</a></td><td class="has-text-align-center" data-align="center">Study House</td><td class="has-text-align-center" data-align="center">175.45.176.91<br></td><td class="has-text-align-center" data-align="center">Apache<br>Tomcat/Coyote JSP1.1<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.0.3</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.minzu.rep.kp" target="_blank" rel="noreferrer noopener">http://www.minzu.rep.kp</a></td><td class="has-text-align-center" data-align="center">Offices of the DPRK</td><td class="has-text-align-center" data-align="center">175.45.176.67</td><td class="has-text-align-center" data-align="center">Apache<br>Squid/4.10<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.12.4</span></strong>)<br>Bootstrap<br>WordPress popular posts Plugin</td></tr><tr><td><a href="http://www.ryomyong.edu.kp" target="_blank" rel="noreferrer noopener">http://www.ryomyong.edu.kp</a></td><td class="has-text-align-center" data-align="center">Education system</td><td class="has-text-align-center" data-align="center">175.45.176.81</td><td class="has-text-align-center" data-align="center">Apache<br>Node.js Express<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 1.11.2</span></strong>)<br>Bootstrap</td></tr><tr><td><a href="http://www.korart.sca.kp" target="_blank" rel="noreferrer noopener">http://www.korart.sca.kp</a></td><td class="has-text-align-center" data-align="center">Korean Art</td><td class="has-text-align-center" data-align="center">175.45.176.91<br></td><td class="has-text-align-center" data-align="center">Apache<br>Tomcat/Coyote JSP1.1<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated</span></strong>)<br>Javascript<br>jQuery<br>(<strong><span class="has-inline-color has-vivid-red-color">deprecated 2.0.3</span></strong>)<br>Bootstrap</td></tr></tbody></table></figure>



<p>Overall, these websites look bad, with slow response, outdated User Interface, lackluster maintenance, old fashion animations. In fact, I dare to say that it&#8217;s quite a nightmare when you compare with the rich content and infinite nature of the Web today, even though the Admin have put significant efforts to put in place these web sites</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="721" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-24-1024x721.png" alt="" class="wp-image-1212" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-24-1024x721.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-24-300x211.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-24-768x540.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-24.png 1296w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Some potential issues to fix</span></strong></p>



<ul class="wp-block-list"><li>It would be good practice to use HTTPS and Certificates, especially for the sites using a logon</li><li>It would be good practice to remove links to cross-origin destinations, as they may be unsafe (found on mediaryugyong.com.kp and others)  : <a href="https://bit.ly/3qWhyyW" target="_blank" rel="noreferrer noopener">https://bit.ly/3qWhyyW</a></li><li>It would be good practive to upgrade the technology from HTTP/1.1 up to HTTP/2, when it comes to performance. Here is an introduction to HTTP/2 : <a href="https://bit.ly/3r6zkj0" target="_blank" rel="noreferrer noopener">https://bit.ly/3r6zkj0</a></li><li>Apache deprecated issue (versions sometimes from 10 years ago !). List of vulnerabilities here : <a href="https://bit.ly/3njenPi" target="_blank" rel="noreferrer noopener">https://bit.ly/3njenPi</a></li><li>Tomcat/Coyote JSP1.1 deprecated issue. There are a bunch of resources available to prepare an exploit of this version. Look here : <a href="https://bit.ly/382tnuL" target="_blank" rel="noreferrer noopener">https://bit.ly/382tnuL</a> and here : <a href="https://bit.ly/3a5o2FA" target="_blank" rel="noreferrer noopener">https://bit.ly/3a5o2FA</a>, using Nmap and Metasploit</li><li>jQuery deprecated issue (versions sometimes from 8 years ago !). List of vulnerabilities here : <a href="https://snyk.io/vuln/npm:jquery" target="_blank" rel="noreferrer noopener">https://snyk.io/vuln/npm:jquery</a></li><li>PHD deprecated issue (version from 6 years ago !). Check this site for PHP exploits : <a href="https://www.exploit-db.com/?platform=php" target="_blank" rel="noreferrer noopener">https://www.exploit-db.com/?platform=php</a></li></ul>



<p>I just checked the potential SSL configuration of www.airkoryo.com.kp. Not a great website to order an airline ticket <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f641.png" alt="🙁" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-40.png" alt="" class="wp-image-1240" width="446" height="494" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-40.png 671w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-40-271x300.png 271w" sizes="(max-width: 446px) 100vw, 446px" /></figure>



<p>There is a good blog post documenting some deprecated SSL certificates from NK : <a href="https://bit.ly/3p4RzmY" target="_blank" rel="noreferrer noopener">https://bit.ly/3p4RzmY</a></p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Additional exploration</span></strong></p>



<p>I recommend this good blog post, a bit outdated but including much more informations : <a href="http://nknetobserver.github.io/" target="_blank" rel="noreferrer noopener">http://nknetobserver.github.io/</a></p>



<p>You will find that some other IP adresses had been allocated to NK</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-34.png" alt="" class="wp-image-1230" width="432" height="471" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-34.png 680w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-34-275x300.png 275w" sizes="(max-width: 432px) 100vw, 432px" /></figure>



<p>There is also a related GitHub page with Nmap scan results (year 2014 and older) : <a href="https://bit.ly/34socTM" target="_blank" rel="noreferrer noopener">https://bit.ly/34socTM</a></p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">RedStar OS</span></strong></p>



<p>In the above analysis of NK domains, you may have noticed that an Operating System was listed, so called &#8220;RedStar4.0 OS&#8221;. What is this ?</p>



<p>You will find on Google that it&#8217;s a self made, North Korea, Operating System, based on Linux. Here&#8217;s a description from The Pyongyang Times, dated June, 2019</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-31.png" alt="" class="wp-image-1223" width="350" height="434" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-31.png 516w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-31-242x300.png 242w" sizes="(max-width: 350px) 100vw, 350px" /></figure>



<p>The current <strong><span class="has-inline-color has-vivid-red-color">Desktop version</span></strong> is the 4.0. These is no downloadable version 4.0, but there is one for version 3.0, that you can download here : <a href="https://archiveos.org/redstar/" target="_blank" rel="noreferrer noopener">https://archiveos.org/redstar/</a></p>



<p>I have made the installation in my Virtual Machine. Some blogs are well documented to proceed with the first installation, such as this one : <a href="https://bit.ly/34l6qBU" target="_blank" rel="noreferrer noopener">https://bit.ly/34l6qBU</a>. You really need it as the commands are in Korean</p>



<p>Once the OS is installed, there is a very good video to get root access, change the language to English, and discover this OS. Highly recommended !</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Redstar OS Installation &amp; Review" width="525" height="295" src="https://www.youtube.com/embed/G9upnwcGyK8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>In the Terminal, type in the &#8216;top&#8217; command (to learn more : <a href="https://bit.ly/2Wt6Mlo" target="_blank" rel="noreferrer noopener">https://bit.ly/2Wt6Mlo</a>). Here is a print screen of the main processes</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-36.png" alt="" class="wp-image-1236" width="479" height="472" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-36.png 642w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-36-300x295.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-36-100x100.png 100w" sizes="(max-width: 479px) 100vw, 479px" /></figure>



<p>There are several processes which are of interest</p>



<p><strong><span class="has-inline-color has-vivid-red-color">securityd</span></strong></p>



<p>The OS includes a securityd that mimics the one present in Mac OS and which features a function to validate the OS, integrity checking, and hardcoded MD5 checksums. The system calls the validate_os() function at startup and reboots if the process fails, which reveals that users are not allowed to make modification to the platform’s core capabilities</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-43.png" alt="" class="wp-image-1243" width="658" height="224" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-43.png 944w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-43-300x102.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-43-768x262.png 768w" sizes="(max-width: 658px) 100vw, 658px" /><figcaption>source : https://bit.ly/3asyres</figcaption></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">scnprc</span></strong></p>



<p>The Red Star OS includes its own firewall and antivirus system,&nbsp;<em>scnprc</em>, which features a GUI that looks just as a regular virus scanner, and which can be automatically triggered when opening files. Designed to detect and delete malicious files, the virus scanner keeps signatures in a file that cannot be read even by root. The application’s creators are those who decide what files are marked as malicious</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-44.png" alt="" class="wp-image-1244" width="560" height="268" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-44.png 914w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-44-300x144.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-44-768x369.png 768w" sizes="(max-width: 560px) 100vw, 560px" /><figcaption><em>source : https://bit.ly/3asyres</em></figcaption></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">opprc</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="905" height="307" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-45.png" alt="" class="wp-image-1245" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-45.png 905w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-45-300x102.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-45-768x261.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>source : https://bit.ly/3asyres</figcaption></figure>



<p>There&#8217;s a good article explaining how this proceeds to watermark any files installed in the hard drive by the user : <a href="https://bit.ly/3am08FY" target="_blank" rel="noreferrer noopener">https://bit.ly/3am08FY</a></p>



<p>This is to trace any installed file, for example from a USB stick, into the PC. The process is going to watermark the file with the MAC adress of the machine. As any PC sold in North Korea has to be registered to the authorities, they may link any distributed file to the MAC adress, and therefore of the PC owner who installed this file initially</p>



<p>Here is what happens to the file before and after transfer into RedStar OS, on a basic file example. There is a string added to the file</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-5.png" alt="" class="wp-image-1246" width="349" height="531" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-5.png 515w, https://www.forensicxs.com/wp-content/uploads/2020/12/Capture-5-197x300.png 197w" sizes="(max-width: 349px) 100vw, 349px" /></figure>



<p>This feature is going to deter people to install USB sticks&#8230;in fact, there are many USB sticks turning around to help NK people to get informations from abroad, being general informations, movies, culture,&#8230;there is seemingly an intense traffic around the borders to smuggle USB sticks into NK : <a href="https://bit.ly/2WrVWwh" target="_blank" rel="noreferrer noopener">https://bit.ly/2WrVWwh</a></p>



<p>I suggest you check the &#8220;Flash Drives for Freedom&#8221; site : <a href="https://flashdrivesforfreedom.org/" target="_blank" rel="noreferrer noopener">https://flashdrivesforfreedom.org/</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-46.png" alt="" class="wp-image-1247" width="321" height="428" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-46.png 650w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-46-225x300.png 225w" sizes="(max-width: 321px) 100vw, 321px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Network</span></strong></p>



<p>Here is our basic network configuration</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-39.png" alt="" class="wp-image-1239" width="399" height="258" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-39.png 610w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-39-300x194.png 300w" sizes="(max-width: 399px) 100vw, 399px" /></figure>



<p>Our <strong><span class="has-inline-color has-vivid-red-color">IP adress</span></strong> <strong><span class="has-inline-color has-vivid-red-color">10.0.2.15</span></strong> is the one from a Private network</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-48.png" alt="" class="wp-image-1250" width="413" height="185" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-48.png 503w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-48-300x134.png 300w" sizes="(max-width: 413px) 100vw, 413px" /></figure>



<p>Here is the default <strong><span class="has-inline-color has-vivid-red-color">Firewall setting</span></strong> configuration. <strong><span class="has-inline-color has-vivid-red-color">SMB is opened</span></strong> by default, on several ports</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-41.png" alt="" class="wp-image-1241" width="468" height="367" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-41.png 591w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-41-300x236.png 300w" sizes="(max-width: 468px) 100vw, 468px" /></figure>



<p>Let&#8217;s check the <strong><span class="has-inline-color has-vivid-red-color">SMB version. It&#8217;s a very old one from year 2007</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-42.png" alt="" class="wp-image-1242" width="431" height="188" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-42.png 562w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-42-300x131.png 300w" sizes="(max-width: 431px) 100vw, 431px" /></figure>



<p>There has been quite a few vulnerabilities (CVE) found in the meantime. You can check the SAMBA protocol home page : <a href="https://www.samba.org/samba/history/" target="_blank" rel="noreferrer noopener">https://www.samba.org/samba/history/</a></p>



<p>Now, let&#8217;s check the Firewall settings. Here is the basic configuration of IPTABLE (<em>command : vi /etc/sysconfig/iptables</em>)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-47.png" alt="" class="wp-image-1249" width="417" height="494" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-47.png 614w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-47-253x300.png 253w" sizes="(max-width: 417px) 100vw, 417px" /></figure>



<p>Let&#8217;s flush these rules to allow all traffic ! </p>



<p>In the Terminal, using the root superuser &#8220;su&#8221;, type in : <em>rm /etc/sysconfig/iptables</em>. Then restart the service as follows</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-51.png" alt="" class="wp-image-1254" width="417" height="70" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-51.png 547w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-51-300x50.png 300w" sizes="(max-width: 417px) 100vw, 417px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Web Browser</span></strong></p>



<p>Let&#8217;s launch the browser. It is based on <span class="has-inline-color has-vivid-red-color"><strong>Firefox</strong></span>. Let&#8217;s check the Preferences. We find the store Certificates. Apparently, they are from the NK governmental authority and not known to the outside world</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-49.png" alt="" class="wp-image-1251" width="572" height="338" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-49.png 831w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-49-300x177.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-49-768x454.png 768w" sizes="(max-width: 572px) 100vw, 572px" /></figure>



<p>Now, let&#8217;s launch the Browser. This is what we get</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="292" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-50.png" alt="" class="wp-image-1253" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-50.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-50-300x86.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-50-768x219.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The Browser, so called &#8220;naenara&#8221;, is looping and cannot reach the <strong><span class="has-inline-color has-vivid-red-color">IP 10.76.1.11</span></strong></p>



<p>Such an IP is again a Private network IP. It points out that the North Korea web is like an &#8220;Intranet&#8221;, and queries are not designed to be routable on the Internet. In fact, all of the DPRK’s national network is <strong><span class="has-inline-color has-vivid-red-color">non-routable IP space</span></strong> ! That&#8217;s why we can&#8217;t reach this IP 10.76.1.11 outside from North Korea, and our browser will return a timeout error</p>



<p>Let&#8217;s make a Google search (this is possible as we have been flushing the IPTABLES configuration). We get the warning message that <strong><span class="has-inline-color has-vivid-red-color">our connection is unencrypted</span></strong>, it means that all our web traffic could be easily monitored by the North Korean authorities, should we be located in NK and go through the NK proxy servers !</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-52-1024x589.png" alt="" class="wp-image-1255" width="574" height="329" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-52-1024x589.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-52-300x173.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-52-768x442.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-52.png 1029w" sizes="(max-width: 574px) 100vw, 574px" /></figure>



<p>Now we know why it is said that the North Korean Web is heavily censored, and that it is a government-run national network. It is called &#8220;<strong><span class="has-inline-color has-vivid-red-color">Kwangmyong</span></strong>&#8220;. Here an article with some sample pictures of what is to be found in this &#8220;Intranet&#8221; : <a href="https://bit.ly/2KeXYNT" target="_blank" rel="noreferrer noopener">https://bit.ly/2KeXYNT</a></p>



<p>As a summary of the situation, here is a good one</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-85.png" alt="" class="wp-image-1308" width="409" height="81" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-85.png 601w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-85-300x59.png 300w" sizes="(max-width: 409px) 100vw, 409px" /><figcaption><em>Martyn Williams &#8211; Digital Trenches</em></figcaption></figure>



<p>Let&#8217;s type in the Browser : &#8220;<em>about:config</em>&#8220;. We can see a bunch of additional informations</p>



<p><strong><span class="has-inline-color has-vivid-red-color">browser.safebrowsing</span></strong></p>



<p>These functions make sure that visited URLs are compared against a blacklist, or submit URLs to a third party to determine whether a site is legitimate or not</p>



<p>In Firefox, this usually points to some Firefox files and Google APIs &#8220;safebrowsing&#8221; : <a href="https://bit.ly/34uBJtV" target="_blank" rel="noreferrer noopener">https://bit.ly/34uBJtV</a></p>



<p>But not here&#8230;it goes throuh the Private network 10.76.1.11 !</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="211" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-54-1024x211.png" alt="" class="wp-image-1258" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-54-1024x211.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-54-300x62.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-54-768x158.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-54-1536x316.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-54.png 1868w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>It seems the North Korean server under this IP, is acting as a &#8220;giant&#8221; proxy server, catching all the traffic</p>



<p><strong><span class="has-inline-color has-vivid-red-color">breakpad.reportURL</span></strong></p>



<p>All crash reports are sent to the NK proxy server 10.76.1.11. So every time the browser fails for some reason, they get information about it. Useful for debugging and also for finding exploits in Firefox, without necessarily giving that information back to Mozilla – a U.S. company</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="97" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-55-1024x97.png" alt="" class="wp-image-1259" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-55-1024x97.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-55-300x28.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-55-768x73.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-55-1536x145.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-55.png 1913w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">gecko.handlerService.schemes.mailto.1.uriTemplate</span></strong></p>



<p>Now, this is getting strange&#8230;the default value points to an HTTPS, Google mail, as the default web mail. And it does not go through 10.76.1.11 ? I&#8217;m suprised, something does not look consistent here. Maybe the OS version that we can download, is not fully representative of what the North Koreans get by default ?</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="207" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-56-1024x207.png" alt="" class="wp-image-1260" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-56-1024x207.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-56-300x61.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-56-768x155.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-56-1536x310.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-56.png 1898w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>There are more informations about the naenara browser mysteries in this website : <a href="https://bit.ly/3pcmgH5" target="_blank" rel="noreferrer noopener">https://bit.ly/3pcmgH5</a></p>



<p><strong><span class="has-inline-color has-vivid-red-color">RedStar</span></strong> <strong><span class="has-inline-color has-vivid-red-color">OS forensics</span></strong></p>



<p>I&#8217;ve put the ISO file of RedStar OS into Autopsy, a well known forensics suite (<a href="https://www.autopsy.com/" target="_blank" rel="noreferrer noopener">https://www.autopsy.com/</a>), hoping to find additional informations</p>



<p>At first, it seems that in the Python based installation files, there is a focus on Apple Mac computers&#8230;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-57-1024x543.png" alt="" class="wp-image-1264" width="782" height="414" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-57-1024x543.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-57-300x159.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-57-768x407.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-57-1536x815.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-57.png 1919w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>I would not try to link it to this picture &#8211; maybe too &#8220;big&#8221; to be true ! -, taken from Kim Jung-Un, sitting in front of an iMac ?</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-58.png" alt="" class="wp-image-1265" width="563" height="395" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-58.png 734w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-58-300x211.png 300w" sizes="(max-width: 563px) 100vw, 563px" /></figure>



<p>The Python install.py dates back to August 2012, according to the file metadata</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-59.png" alt="" class="wp-image-1266" width="307" height="79" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-59.png 314w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-59-300x77.png 300w" sizes="(max-width: 307px) 100vw, 307px" /></figure>



<p>The picture was made probably somewhere around early 2013, as entailed by this article : <a href="https://bit.ly/3atOj0q" target="_blank" rel="noreferrer noopener">https://bit.ly/3atOj0q</a>. So, there is a good &#8220;match&#8221; between the Python file release date, allowing installation on a Mac computer, and this picture <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Pretty <strong><span class="has-inline-color has-vivid-red-color">funny correlation</span></strong></p>



<p>I also looked about potential hidden identities of North Koreans, included in this OS image. We can find a few of these by typing the .kp extension in the search bar (I exported the result in a csv file to make it easier)</p>



<p>That&#8217;s quite a few <strong><span class="has-inline-color has-vivid-red-color">names and Email adresses of IT guys from North Korea</span></strong> ! These are probably some of the guys who contributed to the development of the RedStar OS. Please note it dates back to year 2012/2013 when RedStar OS 3.0 was developped</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-center" data-align="center">Name</th><th class="has-text-align-center" data-align="center">Email</th></tr></thead><tbody><tr><td class="has-text-align-center" data-align="center">ju kum hyok</td><td class="has-text-align-center" data-align="center">kcm@osd.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">gyongil ryang</td><td class="has-text-align-center" data-align="center">rki@osd.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">son guang zin</td><td class="has-text-align-center" data-align="center">sgz@redstar.osd.kp</td></tr><tr><td class="has-text-align-center" data-align="center">chungjin sim</td><td class="has-text-align-center" data-align="center">pf@kut.edu.kp</td></tr><tr><td class="has-text-align-center" data-align="center">kim sehyok</td><td class="has-text-align-center" data-align="center">ksh@www.osd.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">li hyokchol</td><td class="has-text-align-center" data-align="center">lhc@chongbong.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">ryongson guang jin</td><td class="has-text-align-center" data-align="center">kjh@redstar.osd.kp</td></tr><tr><td class="has-text-align-center" data-align="center">ri yong kel</td><td class="has-text-align-center" data-align="center">ryk659@osd.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">kwon chol hak</td><td class="has-text-align-center" data-align="center">kch@osd.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">cholya</td><td class="has-text-align-center" data-align="center">unahsu@osandok.inf.kp</td></tr><tr><td class="has-text-align-center" data-align="center">jong hyok</td><td class="has-text-align-center" data-align="center">xacker@kcc.co.kp</td></tr></tbody></table></figure>



<p>Another fun fact : the IT guy &#8220;cholya&#8221;, made some modifications to the QT for Mac/KDE RPM file in March 2013  (as per the file metadata). This confirms the intention to make RedStar OS compatible with Mac hardware !</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="421" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-60-1024x421.png" alt="" class="wp-image-1270" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-60-1024x421.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-60-300x123.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-60-768x316.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-60.png 1404w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">RedStar OS Server </span></strong></p>



<p>There is also a server version of RedStar OS. The ISO file is available on this site : <a href="https://bit.ly/3au4pqT" target="_blank" rel="noreferrer noopener">https://bit.ly/3au4pqT</a></p>



<p>In fact, there are two ISO files : boot.iso and rss3_32_key_gui_20131212.iso</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-65.png" alt="" class="wp-image-1279" width="466" height="165" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-65.png 580w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-65-300x106.png 300w" sizes="(max-width: 466px) 100vw, 466px" /></figure>



<p>You shall fire up the <strong><span class="has-inline-color has-vivid-red-color">boot.iso</span></strong> first in your VM (choose a 32 bit version when configuring the VM), to bypass the serial number protection. You will get to this screen :</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-66.png" alt="" class="wp-image-1280" width="477" height="359" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-66.png 796w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-66-300x226.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-66-768x579.png 768w" sizes="(max-width: 477px) 100vw, 477px" /></figure>



<p>Type in any serial code, such as 000 &#8211; 0000 &#8211; 0000 &#8211; 0000 &#8211; 0000 (use the up and down arrow keys to move the cursor). The big red button with the &#8220;smiley&#8221; means &#8220;OK&#8221;, but don&#8217;t click yet, you need first to change the ISO to the second one, which is <strong><span class="has-inline-color has-vivid-red-color">rss3_32_key_gui_20131212.iso</span></strong> (for this, you need to select it in your VM menu, on mine it is located at the bottom)</p>



<p>On the next screen, it is configured for IPv4 and IPv6, don&#8217;t change it and move the cursor to OK (the red button on the left)</p>



<p>On the next screen, you shall choose a password. After a few attempts, I managed to pass the screen with ten lower case letters and two numbers and it worked. Click OK to proceed</p>



<figure class="wp-block-image size-large"><img decoding="async" width="800" height="602" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-67.png" alt="" class="wp-image-1281" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-67.png 800w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-67-300x226.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-67-768x578.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The next screen is to create your disk partition. Choose the third line and then click ok (left red button) and it will automatically create the partition for you</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-68.png" alt="" class="wp-image-1282" width="490" height="369" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-68.png 796w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-68-300x226.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-68-768x578.png 768w" sizes="(max-width: 490px) 100vw, 490px" /></figure>



<p>On the next screen, just click Enter and it will take you to the next steps (the partition will create itself)</p>



<p>On the next screen, we can choose what to install : Apache, MySQL, PostgreSQL, PHP, Java,&#8230;bear in mind that this is the server version of RedStar OS so you can install programs for the back-end ! Choose the modules you want with the space bar, then also select &#8220;GUI&#8221;, it will take you to a splash screen when you can select one. I chose KDE. Then you come back on the previous screen and click OK. it will take you to the installation screen</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-69.png" alt="" class="wp-image-1283" width="494" height="370" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-69.png 798w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-69-300x225.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-69-768x576.png 768w" sizes="(max-width: 494px) 100vw, 494px" /></figure>



<p>At the end of the process, just click on the red box, then a quick reboot will follow and you will get on this screen</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-70.png" alt="" class="wp-image-1284" width="411" height="229" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-70.png 536w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-70-300x167.png 300w" sizes="(max-width: 411px) 100vw, 411px" /></figure>



<p>Then, on the first screen, you need to type in &#8220;root&#8221;, and then on the second screen, the password you chose previously. After all this hard work, we are finally on the RedStar OS Server desktop !</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-72.png" alt="" class="wp-image-1286" width="504" height="373" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-72.png 800w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-72-300x222.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-72-768x568.png 768w" sizes="(max-width: 504px) 100vw, 504px" /></figure>



<p>Then you need to navigate with a trial and error process as it is in Korean. On the home screen, the first icon gets you to the file system, where you can find the install log</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-74.png" alt="" class="wp-image-1288" width="500" height="372" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-74.png 798w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-74-300x224.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-74-768x573.png 768w" sizes="(max-width: 500px) 100vw, 500px" /></figure>



<p>On the red star button (bottom left of the screen), you can choose the web browser. It is fully functional, I can navigate to my blog www.forensicxs.com !</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-75.png" alt="" class="wp-image-1290" width="503" height="375" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-75.png 798w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-75-300x224.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-75-768x573.png 768w" sizes="(max-width: 503px) 100vw, 503px" /></figure>



<p>We can also fire up the terminal and have a look at the main processes running</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-76.png" alt="" class="wp-image-1291" width="505" height="377" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-76.png 799w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-76-300x224.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-76-768x574.png 768w" sizes="(max-width: 505px) 100vw, 505px" /></figure>



<p>There are no &#8220;spooky&#8221; processes such as the ones in RedStar OS Desktop ! We will see in the next sections, that the <strong><span class="has-inline-color has-vivid-red-color">RedStar OS Server is much less intrusive</span></strong> to the freedom of the users. In fact, it is designed to be a Server side OS, used mostly by Network Engineers accredited by the Authorities, and therefore there is not this need to control and block users as with the RedStar OS Desktop version</p>



<p>Now, let&#8217;s change the language to English, as with the previous installation of RedStar OS Desktop. In the Terminal, it is the same commands, followed by a reboot. Then I looked a bit into the Firefox configuration files</p>



<p><strong><span class="has-inline-color has-vivid-red-color">application.ini</span></strong></p>



<p>The crash report is sent directly to Mozilla and not through a North Korean IP, as compared with the Desktop version</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-77.png" alt="" class="wp-image-1292" width="366" height="212" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-77.png 574w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-77-300x174.png 300w" sizes="(max-width: 366px) 100vw, 366px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">iptables</span></strong></p>



<p>Let&#8217;s have a look to the configuration of the Firewall iptables. In the Terminal, type in : &#8220;<em>vi /etc/sysconfig/iptables</em>&#8220;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-78.png" alt="" class="wp-image-1293" width="394" height="207" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-78.png 542w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-78-300x158.png 300w" sizes="(max-width: 394px) 100vw, 394px" /></figure>



<p>The configuration is more permissive, as compared with the default RedStar OS Desktop. We can navigate much more freely, by default</p>



<p><strong><span class="has-inline-color has-vivid-red-color">prefs.js</span></strong></p>



<p>To find this file, type in the Terminal : <code>~/.mozilla/firefox/</code> and navigate. You will find it there. Here is some content</p>



<figure class="wp-block-image size-large"><img decoding="async" width="776" height="562" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-79.png" alt="" class="wp-image-1294" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-79.png 776w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-79-300x217.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-79-768x556.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>We see that the <strong><span class="has-inline-color has-vivid-red-color">urlclassifier.keyupdatetime.</span></strong> is pointing to the Google adress &#8220;Google Safe Browsing&#8221;, allowing to synchronize lists of phishy websites</p>



<p><strong><span class="has-inline-color has-vivid-red-color">RedStar OS vulnerabilities</span></strong></p>



<p>After all these analysis, can we consider RedStar OS 3.0 to be a safe Operating System ?</p>



<p> I think not ! As we have seen, it includes outdated versions of softwares (such as an older copy of Firefox, of the SAMBA protocol,&#8230;)</p>



<p>Therefore it is probable that RedStar OS and it&#8217;s server version, along with the weak configuration of the North Korean web sites, as seen earlier in this article, could have provided an accessible &#8220;attack surface&#8221;. However, the NK servers are blocking quite a lot of inbound traffic with Firewall rules and so on</p>



<p>In addition, we reviewed above some protections, hard coded inside the OS. These protections are quite hard to bypass</p>



<p>This article <a href="https://bit.ly/3mxgdLu" target="_blank" rel="noreferrer noopener">https://bit.ly/3mxgdLu</a> speculates about these vulnerabilites, and how they could have been exploited by a Foreign Intelligence body such as the NSA</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-61.png" alt="" class="wp-image-1271" width="500" height="195" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-61.png 754w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-61-300x117.png 300w" sizes="(max-width: 500px) 100vw, 500px" /></figure>



<p>Please note there is a newer version of RedStar OS, version 4.0, as found during our scanning of the NK network. It is highly probable that this newer version adresses some of the vulnerabilites. Unfortunately, there is no downloadable version 4.0 to be found on Internet. It would have been great to compare both versions !</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-64.png" alt="" class="wp-image-1277" width="585" height="122" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-64.png 927w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-64-300x62.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-64-768x160.png 768w" sizes="(max-width: 585px) 100vw, 585px" /><figcaption>Wikipedia</figcaption></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Additional reading about RedStar OS</span></strong></p>



<p>There would be much more to say about RedStar OS, but I&#8217;ll stop here. I highly recommend to look into this GitHub repository : <a href="http://GitHub - takeshixx/redstar-tools: Tools for Red Star OS (붉은별)" target="_blank" rel="noreferrer noopener">http://GitHub &#8211; takeshixx/redstar-tools: Tools for Red Star OS (붉은별)</a></p>



<p>You will find additional datas and files, such as a copy of the sncprc and opprc files discussed above. There is room for additional Reverse Engineering activities !</p>



<p>It is also valuable to view this video about the inner mechanisms of RedStar OS, providing highlights how the protections could be bypassed</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Florian Grunow, Niklaus Schiess: Lifting the Fog on Red Star OS" width="525" height="295" src="https://www.youtube.com/embed/8LGDM9exlZw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Access to the normal Internet</span></strong></p>



<p>In our above scanning of reachable NK websites, it was surprising to see the use of Gmail in the Kim Il Sung University. We had found this Gmail adress : <a href="mailto:ryongnamsan1946@gmail.com">ryongnamsan1946@gmail.com</a></p>



<p>We had also seen previously that North korea has a very low number of Internet users, a mere 51 557 people. But it&#8217;s still several thousand people accessing Internet ! These are people from universities, select businesses and perhaps the homes of top government or military officials (<a href="https://bit.ly/2W9P0DV" target="_blank" rel="noreferrer noopener">https://bit.ly/2W9P0DV</a>)</p>



<p>There is an excellent study made in 2017 by <strong><span class="has-inline-color has-vivid-red-color">Recorded Future</span></strong>. It&#8217;s slightly outdated now but reveals a lot about Internet usage by North Korean Elite : <a href="https://bit.ly/3pbpTwY" target="_blank" rel="noreferrer noopener">https://bit.ly/3pbpTwY</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-83-1024x475.png" alt="" class="wp-image-1305" width="482" height="223" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-83-1024x475.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-83-300x139.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-83-768x356.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-83.png 1103w" sizes="(max-width: 482px) 100vw, 482px" /></figure>



<p>It was updated in 2018 : <a href="https://bit.ly/3roGgb5" target="_blank" rel="noreferrer noopener">https://bit.ly/3roGgb5</a></p>



<p>There has been also an additional study from Recorded Future, who could identify some American hardware used in North Korea, despite sanctions : <a href="https://bit.ly/2WSmCqh" target="_blank" rel="noreferrer noopener">https://bit.ly/2WSmCqh</a></p>



<p>There is a good comparison to make with the two different populations using the fixed telephone lines in North Korea</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-84.png" alt="" class="wp-image-1307" width="389" height="243" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-84.png 591w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-84-300x187.png 300w" sizes="(max-width: 389px) 100vw, 389px" /><figcaption>Martyn Williams &#8211; Digital Trenches</figcaption></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Summary of what we have seen so far</span></strong></p>



<p>I provide a very estimative and rough overview of the potential NK network infrastructure. It is obviously over simplified but I hope it helps to have a global picture. I have divided the population in four parts : <strong><span class="has-inline-color has-vivid-red-color">Citizens</span></strong> (with a restricted network), <strong><span class="has-inline-color has-vivid-red-color">Elite</span></strong> (with a near normal Internet access), <strong><span class="has-inline-color has-vivid-red-color">IT Engineers</span></strong> (all above the rest, with specific privileges and highly critical for the Authorities), and <strong><span class="has-inline-color has-vivid-red-color">Hackers</span></strong> (mostly operating from outside the NK network as they could be spotted otherwise). We will come back on this last category later in this article <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="693" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-82-1024x693.png" alt="" class="wp-image-1304" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-82-1024x693.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-82-300x203.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-82-768x520.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-82.png 1117w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>There&#8217;s a guy called Will Scott who spent some time in North Korea IT University, and he captured what the North Korean network looks like from inside</p>



<p>As we cannot read Korean, I&#8217;m not sure if it&#8217;s a full sketch, representative of the local &#8220;Intranet&#8221; Kwangmyong&#8230;you can view his talk at the CCC in 2014 here : <a href="https://cutt.ly/zhB8a5l" target="_blank" rel="noreferrer noopener">https://cutt.ly/zhB8a5l</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-86.png" alt="" class="wp-image-1314" width="572" height="463" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-86.png 622w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-86-300x243.png 300w" sizes="(max-width: 572px) 100vw, 572px" /></figure>



<p>I provide here a full report about Censorship and Freedom in North Korea, it will help a lot to have a global pictures of all &#8220;processes&#8221; put in place to deter people to access the free Internet : <a href="https://cutt.ly/mhBPQir" target="_blank" rel="noreferrer noopener">https://cutt.ly/mhBPQir</a></p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">North Korean Hackers</span></strong></p>



<p>As a final chapter in this article, I will talk briefly about the famous North Korean Hackers. There are many reports about this topic, so I will just provide an overview, then focus on their modus operandi from a technical perspective (summary). However, it is very important to mention these Hackers, as although North Korea is very isolated from the global Internet, NK Hackers are very active outside of NK, directly into the global Internet</p>



<p><strong><span class="has-inline-color has-vivid-red-color">Targets of North Korean Hackers</span></strong></p>



<p>They are using the Internet as a &#8220;tool&#8221;, to bypass and circumvent international sanctions, with the following aims :</p>



<p><em><strong><span class="has-inline-color has-luminous-vivid-orange-color">Generate Revenue</span></strong></em> -> trying to steal money, from Cryptocurrency exchanges, Banks,&#8230;</p>



<p><em><strong><span class="has-inline-color has-luminous-vivid-orange-color">Gaining confidential informations</span></strong></em> -> trying to steal scientific and technological informations, from Laboratories, Universities, Companies,&#8230;</p>



<p><strong><em><span class="has-inline-color has-luminous-vivid-orange-color">Coordinate Cyber Operations</span></em></strong> -> doing massive attack campaigns against international targets, such as DDoS, destructive malware, online sabotage,&#8230;</p>



<p><strong><span class="has-inline-color has-vivid-red-color">Location of North Korean Hackers</span></strong></p>



<p>As we have seen above, due to the North Korean Internet infrastructure and the degree of isolation of the country, the NK Hackers have developped a strategy of international expansion. In fact, they are structured like a diaspora and located in many countries, such as per the map below</p>



<figure class="wp-block-image size-large"><img decoding="async" width="439" height="271" src="https://www.forensicxs.com/wp-content/uploads/2020/12/image-87.png" alt="" class="wp-image-1319" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/image-87.png 439w, https://www.forensicxs.com/wp-content/uploads/2020/12/image-87-300x185.png 300w" sizes="(max-width: 439px) 100vw, 439px" /><figcaption>Source : Recorded Future</figcaption></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Main Hacking Groups</span></strong></p>



<p>Within the North Korean Authorities, cyberspace operations take place within the Cyber Warfare Guidance Unit, more commonly known as <strong><span class="has-inline-color has-luminous-vivid-orange-color">Bureau 121</span></strong>. This is a division of the Reconnaissance General Bureau, a North Korean intelligence agency that is part of the National Defence Commission. The Bureau 121 is said to be divided into several groups</p>



<p>The first group is what the cyber-security community calls the <strong><span class="has-inline-color has-luminous-vivid-orange-color">Andariel Group</span></strong>, an <strong><span class="has-inline-color has-luminous-vivid-orange-color">Advanced Persistent Threat</span></strong> (<strong><span class="has-inline-color has-luminous-vivid-orange-color">APT</span></strong>), a codename used to describe nation state sponsored hacking units. It is said that their mission is to gather information by conducting reconnaissance on enemy computer systems and creating an initial assessment of the network&#8217;s vulnerabilities</p>



<p>The second group is what the cyber-security community tracks as the <strong><span class="has-inline-color has-luminous-vivid-orange-color">Bluenoroff Group</span></strong>. It is said that their mission is to conduct <strong><span class="has-inline-color has-luminous-vivid-orange-color">Financial Cybercrime</span></strong> by concentrating on long-term assessment and exploiting enemy network vulnerabilities</p>



<p>The third group is what the cyber-security community calls the <strong><span class="has-inline-color has-luminous-vivid-orange-color">Lazarus Group</span></strong>, an umbrella term that the security industry now uses to describe any kind of generic North Korean <strong><span class="has-inline-color has-luminous-vivid-orange-color">Hacking</span></strong></p>



<p><strong><span class="has-inline-color has-vivid-red-color">Main attacks in 2020</span></strong></p>



<p>For sure, there are more attacks than these. First of all, the list is my personal synthesis, and I surely omitted to identify more reports. And, either the attacks have not been attributed with a good degree of certainty, or not yet identified !</p>



<figure class="wp-block-table is-style-regular"><table class="has-fixed-layout"><thead><tr><th>Attack</th><th>Analysis</th><th>Purpose</th></tr></thead><tbody><tr><td>Supply chain</td><td><a href="https://bit.ly/3mE5vCQ" target="_blank" rel="noreferrer noopener">https://bit.ly/3mE5vCQ</a></td><td>Malware in South Korea</td></tr><tr><td>Malicious documents</td><td><a href="https://bit.ly/2WFnSg7" target="_blank" rel="noreferrer noopener">https://bit.ly/2WFnSg7</a></td><td>APT in European Industry<br></td></tr><tr><td>Spear Phishing</td><td><a href="https://bit.ly/3pg4r9W" target="_blank" rel="noreferrer noopener">https://bit.ly/3pg4r9W</a></td><td>APT in Worldwide Targets</td></tr><tr><td>Cooperation with Russians</td><td><a href="https://bit.ly/3hfwKTm" target="_blank" rel="noreferrer noopener">https://bit.ly/3hfwKTm</a></td><td>Cybercrime</td></tr><tr><td>Spear Phishing</td><td><a href="https://bit.ly/3axdf7k" target="_blank" rel="noreferrer noopener">https://bit.ly/3axdf7k</a></td><td>Cryptocurrency</td></tr><tr><td>Social Engineering</td><td><a href="https://bit.ly/3az8pGJ" target="_blank" rel="noreferrer noopener">https://bit.ly/3az8pGJ</a></td><td>Espionage</td></tr><tr><td>Social Engineering</td><td><a href="https://bit.ly/2WEX3Zp" target="_blank" rel="noreferrer noopener">https://bit.ly/2WEX3Zp</a></td><td>Defense &amp; Aerospace</td></tr><tr><td>Digital Skimming</td><td><a href="https://bit.ly/37KKUZk" target="_blank" rel="noreferrer noopener">https://bit.ly/37KKUZk</a></td><td>Online Shopping</td></tr><tr><td>Malicious documents</td><td><a href="https://bit.ly/2WICMlI" target="_blank" rel="noreferrer noopener">https://bit.ly/2WICMlI</a></td><td>Malware distribution</td></tr><tr><td>Malware</td><td><a href="https://bit.ly/3pn6R6T" target="_blank" rel="noreferrer noopener">https://bit.ly/3pn6R6T</a></td><td>MacOS Users</td></tr><tr><td>Miscellaneous Lazarus</td><td><a href="https://bit.ly/3nP8qdi" target="_blank" rel="noreferrer noopener">https://bit.ly/3nP8qdi</a></td><td>Banks, Cryptocurrency</td></tr></tbody></table></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Conclusion</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="631" src="https://www.forensicxs.com/wp-content/uploads/2020/12/nort-korean-hacker-1024x631.png" alt="" class="wp-image-1326" srcset="https://www.forensicxs.com/wp-content/uploads/2020/12/nort-korean-hacker-1024x631.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/12/nort-korean-hacker-300x185.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/12/nort-korean-hacker-768x473.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/12/nort-korean-hacker.png 1182w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>Search Warrant by the FBI of a North Korean Hacker involved in the Ransomware attack WannaCry</figcaption></figure>



<p>In this article, we have been able to uncover the top infrastructure of the North Korean Web, install and discover the North Korean RedStar OS, then propose a summary of recent North Korean Hackers activities</p>



<p>There had been very good articles before on several of these topics, I consider mine as being a &#8220;one stop&#8221; article to get an overall summary</p>



<p>I have been amazed by the <strong><span class="has-inline-color has-vivid-red-color">blatant contradiction between a very isolated North Korean Web</span></strong>, almost unreachable from the outside, <strong><span class="has-inline-color has-vivid-red-color">and the very strong activities of North Korean Hackers</span></strong>, operating from outside of this network. This is really not fair to North Korean people who have a lack of freedom, and also a rogue behaviour towards other countries</p>



<p>The North Korean government is really trying by any means, to tame and prevent their people to enjoy the freedom of Internet</p>



<p>On the other hand, a few elite people can have a broad access to Internet, and the Government is sponsoring Hacking Groups</p>



<p>As a last point, I would like to say that I&#8217;m quite impressed by the <strong><span class="has-inline-color has-vivid-red-color">technical capabilities</span></strong> of IT men and women from North Korea. The Government has been able to create an IT ecosystem, which looks quite vivid, although there are a lot of international sanctions</p>



<p></p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/north-korea-and-the-web/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching 1/49 queries in 0.038 seconds using Disk

Served from: www.forensicxs.com @ 2026-01-01 05:48:03 by W3 Total Cache
-->