You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
WORKS CITED<br />
1. FBI. FBI Liaison Alert System #A-000044-mw. [Online] https://publicintelligence.net/fbi-korean-malware/.<br />
2. US-CERT. Alert (TA14-353A) Targeted Destructive Malware. [Online] https://www.us-cert.gov/ncas/alerts/TA14-<br />
353A.<br />
3. Symantec. Duuzer back door Trojan targets South Korea to take over computers. [Online]<br />
http://www.symantec.com/connect/blogs/duuzer-back-door-trojan-targets-south-korea-take-over-computers.<br />
4. Ullrich, Johannes B. Malware Signed With Valid <strong>SONY</strong> Certificate. [Online]<br />
https://isc.sans.edu/forums/diary/Malware+Signed+With+Valid+<strong>SONY</strong>+Certificate+Update+This+was+a+Joke/1904<br />
9/.<br />
5. Sherstobitoff , Ryan, Liba, Itai and Walter, James. Dissecting Operation Troy: Cyberespionage in South Korea.<br />
[Online] http://www.mcafee.com/us/resources/white-papers/wp-dissecting-operation-troy.pdf.<br />
6. Jiang, Genwei and Kimble, Josiah. Hangul Word Processor (HWP) Zero-Day. [Online]<br />
https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf.<br />
7. SecureSoft. 7.7 DDoS 攻 撃 分 析 及 び 対 応 策 . [Online]<br />
https://www.securesoft.co.jp/news_mt/docs/7.7DDOS_2.pdf.<br />
8. McAfee, Inc. Ten Days of Rain. [Online] http://www.mcafee.com/us/resources/white-papers/wp-10-days-ofrain.pdf.<br />
9. Lelli, Andrea. Backdoor.Prioxer!inf: “Accidentally” the Stealthiest File Infector Ever! [Online]<br />
http://www.symantec.com/connect/blogs/backdoorprioxerinf-accidentally-stealthiest-file-infector-ever.<br />
10. Symantec. Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War.<br />
[Online] http://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-koreacontinue-anniversary-korean-war.<br />
11. Korea Joongang Daily. JoongAng hit by major cyberattack. [Online]<br />
http://koreajoongangdaily.joins.com/news/article/article.aspx?aid=2954219.<br />
12. Kwaak, Jeyup S. Sony Hack Mirrors Attack on South Korean Newspaper, Researcher Says. [Online]<br />
http://blogs.wsj.com/korearealtime/2014/12/19/sony-hack-mirrors-attack-on-south-korean-newspaperresearcher-says/.<br />
13. Boannews. 소니픽처스 vs. 6.25 사이버테러 악성코드 전격 비교분석. [Online]<br />
http://www.boannews.com/media/view.asp?idx=44451.<br />
14. Tarakanov, Dmitry. The “Kimsuky” Operation: A North Korean APT? [Online]<br />
https://securelist.com/analysis/publications/57915/the-kimsuky-operation-a-north-korean-apt/.<br />
15. Fox News. S. Korea Analyzes Computers Used in Cyberattacks. [Online]<br />
http://www.foxnews.com/story/2009/07/12/s-korea-analyzes-computers-used-in-cyberattacks.html.