Are Korean music fans a cyber threat to be reckoned with?
Is it a mistake to write-off the cyber threat posed by Korean music fans? Security professionals appear to think so.
Delivering the opening keynote at the virtual Okta Disclosure 2020 security conference on September 3, well-respected cybersecurity analyst the Grugq tackled the application of cyber power. During his highly informative presentation, the Grugq touched on how some non-states have more cyber power that nation-states. In particular, he mentioned K-pop band BTS and their devoted fan base, the BTS ARMY (it stands for Adorable Representative M.C for Youth, apparently), which undoubtedly have such cyber power.
Indeed, a taste of the kind of power that K-pop Stans, the generic name for these devoted and obsessed fans, was revealed during the Black Lives Matter protest when their social media presence was effectively weaponized. This led me to wonder if then, the BTS ARMY and K-pop Stans were, in effect, the new Anonymous?
Estimated to be more than 100 million, the BTS ARMY is 50 million strong alone, I took the question of whether the K-pop Stan phenomena should be treated as part of the cyber threatscape to the people who know best: the cybersecurity industry itself.
Daniel Smith, a security researcher at Radware, is in no doubt that K-pop stans and the BTS ARMY can be considered the new anonymous. "They present the same risks and challenges to the threat landscape as Anonymous did in their prime," Smith says, "K-pop fans have been filling the void of an absent Anonymous." He says that this is certainly something of a "shift in non-state cyber power, from one group to the next, as the landscape evolves."
By way of an example, Smith points to the way that K-pop Stans flooded the Dallas Police Department iWatch Dallas app during the George Floyd protests. The app, which enabled citizens to report on protestor activity, was bombarded with video clips of K-pop artists. "Anonymous used to have this type of following and power," Smith says, "I call it a social botnet, where an idea results in a natural flood of traffic."
Charl van der Walt, head of security research at Orange Cyberdefense, has nothing but praise for the Grugq, calling him "a member of a leading corps of thinkers that we should be listening to more carefully." It should come as no surprise that van der Walt echoes the point that failing to "appreciate where and how the cyber landscape is different to traditional domains of conflict," is something that needs to be overcome.
By forcing our understanding of this landscape into preconceived frameworks, he says, we see cyberwar through a lens of understanding previous wars. "One effect of this is that we will overestimate the significance of familiar elements like hacking tools and other cyber weapons," van der Walt continues, "while underestimating other elements like the idea of soft power and the incredible influence that a networked construct like social media can bring to bear."
This soft power can have hard impacts, as Boris Cipot, a senior security engineer at Synopsys, explains. "In the case of BTS and their 50 million fans," he says, "I can see them being a cyberthreat. On the one hand, they could be used for marketing purposes, or even used politically."
However, it's when we get to the other hand that the more significant threat emerges, according to Cipot. "One of the biggest threats I see is if bad actors leverage the band's popularity for their personal gain," he says, "a threat actor might share a malicious fandom application, luring fans in. Then, after a few weeks, their devices could be used collectively to launch an attack against a third party; essentially, launching a DDoS attack."
OK, so that's a hypothetical scenario, but scenarios are the key to any threat consideration and manipulation "through recruitment and targeted disinformation," says Morgan Wright, chief security advisor at SentinelOne, "using the fan base to achieve the political objectives of an adversarial nation-state," does not seem such an outrageous scenario hypothesis in the context of threats and risk.
Martin Rudd, CTO at Telesoft Technologies, sees this whole phenomenon as being a representation of information warfare today. "Any well-motivated and reasonably well funded tech-savvy group can exert their own influence in todays world," he says, "this happens to be K-pop, able to exert their own techno-political influence."
The decentralization of information and power has led to such groups being able to take advantage by way of "influencing elections, Anonymous mounting DDoS attacks using botnets, to the purity of information warfare," Rudd says. "Were being outplayed," he continues, "they who understand the world and understand how people are getting and digesting data are the ones who are going to win."
K-pop almost defines this threat in that "you have already got people that are ready to listen, its almost pre-canned, you are just dropping the message into an audience that is already ready to listen," Rudd says. And don't forget that Stans, the BTS ARMY, are bonded regardless of race, religion or geographical boundaries. "You dont have to break through bringing them to the cause," Rudd concludes.
This weaponization of cyberspace is not new, as Joe Riggins, a principal security architect at Deep Instinct, reminds us. "What K-pop is doing is bringing it directly upfront and in everyones faces. For the most part, K-pop is using their organized social infrastructure that was initially used to fill stadiums with fans, to now support specific political platforms such as social justice," Riggins says. "Just as Anonymous was a hacktivist platform that had members with specific cyber-hacking skills, 'Stan armies' are deploying the same hacktivist initiatives using social media," he concludes.
Thom Langford, an information security analyst at GigaOm, also points out that this is not a new phenomenon. "In the early days of Anonymous, before they became heavily politicized and overtly active," Langford says, "they recruited regular people (housewives, office workers, students, stay at home dads) to carry out the largest DDoS attack at that time. They had no idea what they were doing was highly illegal and disruptive."
There's no great leap of faith required to see how Stans could be mobilized by bad actors while acting in supposed good faith.
Jamie Akhtar, CEO and co-founder of CyberSmart, told me that the rise of the Stans has undoubtedly expanded both the range of threat actors and the potential effects of cyber-enabled information warfare. "The pertinent question is," he says, "who are the most likely victims?"
Is this something governments should be concerned about, or 'just' a social media problem? "The reality," Akhtar says, "is this affects us all, and so we all have a part to play."As citizens, we must all take responsibility and educate ourselves on misinformation, report content that is inappropriate and be vigilant when it comes to social engineering, Akhtar tells me. "Collectively we need to create herd immunity against information operations both as individuals and as organizations," he says, "institutions must focus on prevention and deterrence by developing effective means of rapidly detecting the start of indicators that lead to information warfare campaigns and respond with rapid action to prevent digital pandemics from causing chaos."
"K-pop Stans, the BTS Army, aren't cyber threats in the normal sense of a malicious act seeking to damage or steal data, or disrupt digital life in general," Kevin Tongs, director of customer success at Flashpoint, says, "they are more the mass mobilization of a unified group of people, using cyber means such as social media, to create influence."
In militaristic terms, he insists, these are information operations and not information warfare. Whatever term you apply, though, there seems little doubting that they are already part of the modern threat landscape.
"The cyber risks posed by masses of people at one time were known as Anonymous, the hacktivist collective," Chris Grove, technology evangelist at Nozomi Networks, says, "prior to that, internet worms caused masses of people to act in coordination, albeit against their knowledge or consent." At the end of the day, he says, organizations are facing a challenge to keep operations up and running, regardless of who is at the other end of the attack, "be that a cocky hacker, criminal extortion gang, K-pop fans, terrorists, or nation-state actors."
"When groups of people work together to commit the crime of attacking computer systems, theyre no longer music fans," Grove says, "they become criminals at that stage." Grove doesn't, however, expect to see K-pop fans participating in Anonymous-style massive DDoS attacks. "I dont feel K-pop fans provide anything new to be feared in cybersecurity space," Grove says, "but their social influence and desire to be political is a different story."
Dusting off the old playbook is a great place to start, according to Daniel Smith, a security researcher at Radware. "We can definitely learn from the past," Smith says, "K-pop fans, just like Anonymous, have been engaging in political hacktivism. They operate in cyberspace by weaponizing social media platforms. At the core, the group will engage in mostly legal and naturally flooding of the oppositions assets or digital presence."
Others will, of course, break off in smaller groups to conduct more aggressive operations such as Denial-of-Service attacks, defacements, or information campaigns based off leaked material. "The best way to prepare for political hacktivism activity," Smith advises, "is to monitor not only the threat landscape but also the social climate."
I'll leave the last words to Morgan Wright, chief security advisor at SentinelOne. "I was a senior advisor in the U.S. State Department Antiterrorism Assistance Program, and a senior SME for the U.S. Department of Justice, leading the development of new information and intelligence sharing systems after 9/11," he says.
When, eventually, hearings were held in Congress, and the 9/11 Commission produced a report, one of the critical findings was a failure of imagination according to Wright. "A multitude of biases and limitations on cognitive ability deceive people into thinking they need to collect large amounts of information in order to make a decision and act," Wright says, "keeping up with the threats is much easier today with the amount of companies and government producing threat intelligence."
What remains harder, of course, is the ability to make a decision based on limited information and act. "How do you mitigate a tsunami?" he asks. "Sometimes taking an option that is good enough trumps waiting for the best option to magically appear," Wright says, concluding, "there is no magic answer on how to do this. It depends on so many factors. Organizations need to use elements of the OODA Loop (Observe-Orient-Decide-Act) to remain adaptive and responsive to ever-changing conditions globally.
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]