Kim Jong-un's "super security system" was easily hacked by a link
Join Leifeng.com, share the information dividend of the AI era, and walk with the intelligent future. I heard that all the great people have clicked here .
[Red Star 3.0 operating system interface]
At first glance, isn't it very similar to Apple's Mac OS X operating system?
The Red Star operating system is a computer operating system developed and improved by North Korea based on the Linux operating system. It is reported that the reason why the Red Star system desktop is similar to the mac OS system is probably related to Kim's personal preference. (For details, please see Leifeng.com's previous report: "True Apple fan, Kim Jong-un endorses Apple | Leifeng Morning News")
Kim Jong-un uses an Apple computer
The main reason why North Korea developed this operating system is that North Korean officials have always believed that there are backdoors and Trojans in foreign operating systems such as Microsoft's Windows, so they decided to develop a more secure operating system on their own, and the Red Star operating system came out.
North Korean officials claim that the system can completely prevent hacker attacks , but a group of security researchers used a web page to access the operating system.
Security organization Hacker House has discovered that a potential attacker could remotely access a computer running the Red Star operating system by tricking the user into opening a malicious link. The researchers explained that this security vulnerability could be exploited to install malware on the operating system.
Security personnel stated:
The main reason why Red Star operating system was hacked was that its built-in browser Naenara (based on Mozilla Firefox) had a security vulnerability.
An application does not sanitize the command line when processing URI parameter requests, so malicious code can be executed by passing a malformed link to the nnrurlshow binary.
From this point of view, the Red Star operating system does not meet Kim Jong-un's so-called "super security" requirements, nor can it provide "safer than other operating systems" protection. The significance of this domestic operating system to the North Korean authorities may be more in the control of computer equipment, helping them to track machines and users.
For example, Red Star OS is able to watermark documents, files, and even USB flash drives connected to computers, making almost every data point easily traceable if the government so desires.