Posts tagged Air Koryo
Hackers have hit a Facebook page for North Korean airline Air Koryo replacing it with messages in support of Islamic State militants and against North Korean leader Kim Jong Un.
The page shot to fame earlier in the year when it began replying to user comments and questions about trips to North Korea. It claimed to be the airline’s official page, but appeared to be run by an Air Koryo agent in Russia.
The hack came a day after a similar attack on the Facebook and Twitter pages of U.S. Central Command. Hackers typically gain access to Facebook accounts by tricking users into giving away their passwords or by gaining access to their email accounts and then sending password reset messages. More >
A new round of attacks against North Korean websites began Saturday, causing several to become unavailable.
The attacks appear to be part of a loosely coordinated effort by hackers to target North Korean sites after the country’s state-run media said relations with South Korea were “at a state of war.”
As of 3pm Korean time (0600 UTC) on Saturday, attempts to contact the Naenara, Korean Central News Agency, Air Koryo and Voice of Korea all failed.
The sites were hit with an apparent DDoS (distributed denial of service) attack in which the web servers are flooded with so much junk traffic from hackers that they become overloaded and cannot handle requests from normal users.
On Twitter, messages were being grouped with the #OpNorthKorea hash tag.
Some apparently calling for attacks on certain sites.
And others marking the successful takedown of a website.
At time of writing the third site on that list, korea-dpr.com, is still available. The site is the home page of Alejandro Cao de benos’ Korean Friendship Association and appears to be hosted in The Netherlands.
It’s impossible to know who is really behind the attacks, but judging by Twitter messages the cyber call to arms appears to have attracted a small group of people.
The attacks began several hours after state-run Korean Central News Agency (KCNA) said “From this moment, the north-south relations will be put at the state of war and all the issues arousing between the north and the south will be dealt with according to the wartime regulations.
The statement is the latest in an increasingly hard line of rhetoric from the DPRK. The last few days have seen North Korea directly threaten to attack the United States and its military bases while the U.S. has flexed its muscle by overflying South Korea with a B-52 and B-2 bomber.
Despite the heightening tensions, many observers don’t expect the DPRK to follow through with its threats and many again believe any such attack would attract a swift and hard response by South Korean and/or U.S. forces.
A lot of the stories have noted the airline’s one-star rating on Skytrax, a web site which generates ranking from user reviews, although it should be noted there are plenty of positive reviews on the site. No one’s talking about the booking web site yet so there’s not much to go on, but it does have a couple of technical problems.
The site appears to be running on its own web server in Pyongyang. That’s interesting because there are only two other North Korean web sites, KCNA and the Rodong Sinmun, that have their own servers. All the rest share space on a single server.
The machine itself is running Red Hat Linux and the Apache web server software.
Aside all the basic information about the airline there’s a timetable that lists its flights to Beijing, Shenyang and Vladivostok.
There’s also a chance to sign-up to get an account on the site.
That’s an offer I couldn’t refuse, but I didn’t want to give AirKoryo my personal details so I made some up. The registration had some required details — for example, a phone number is needed but a fax is optional — but once completed the account was immediately established.
There was no confirmation e-mail, but I was logged in!
This brought a couple of extra menu options: My profile, which allows the entered information to be changed, and a logout button.
And so on to booking. I said I wanted to fly from Beijing to Pyongyang, departing on 10 November, 2012, and returning on 29 November, 2012. The flights were found in the database and I selected one.
A page requesting my personal information came up, already filled in with the account details I entered. There were also some options, such as the chance to order a vegetarian meal and extra seats. Passengers can book extra seats for a variety of purposes. The most mundane is for a pet, but the list also includes musical instruments, jewelry (an extra seat for jewelry?), a mysterious named “blackbox” (hopefully not the flight recorder) and — my personal favorite — for being “fat.”
But, after completing the page, a problem:
It’s a much nicer apology that United gives me, but there’s clearly a problem with some of the site code. Despite searching for flights in 2012, the web site returned an error for 1970.
Programmers will recognize the significance of this date. January 1, 1970, is the base time in operating systems like Windows and Linux and software keeps count of seconds since that date, so rather than a random old date it’s likely due to a problem in the code behind the site.
The problem meant I couldn’t proceed any further.
I closed Chrome and tried the same purchase with Safari, and this time it worked.
A single flight from Pyongyang to Beijing for US$290.
So, success then? Not quite.
I waited a second … and another second … and a whole lot of seconds and the page never moved on.
But after I aborted the page loading, I found I had a booking. Unfortunately, it’s not possible to pay for the tickets online.
Now, I just need to find a button to cancel the booking …
Unfortunately, there wasn’t much else to note about the website, except perhaps that it doesn’t use SSL. Secure Sockets Layer is a basic web security protocol now used by almost all sites that require a password to log in.
The lack of encryption should be a red flag to anyone using the website to actually buy a ticket. If none is used on the payment page, it means anyone with access to your connection, from Air Koryo or the network admins in Pyongyang all the way back to the kid in the corner of the coffee shop sharing your WiFi network, might be able to see you personal details. For this reason alone, proceed with caution!