North Korea Red Star OS Analysis Reveals Spying Tools

North Korea’s internal computer operating system includes spying tools capable of tracking documents offline, the first in-depth analysis has revealed.

Red Star OS was designed to superficially mimic Apple’s OS X, but hidden features allow it to watermark files and tie them to an individual.

The tools were discovered by two German researchers who conducted the analysis over the past month.

The presented their findings at the Chaos Communication Congress on December 27.

Florian Grunow and Niklaus Schiess pored over the code of Red Star OS version 3.0, which first surfaced online about a year ago.

Any files uploaded to computer via a USB stick or other storage device can be watermarked by the system, allowing the state to trace the journey of that file from machine to machine. Red Star can also identify undesirable files and delete them without permission.

The watermarking function was designed in response to the proliferation of foreign films and music being shared offline.

The system will imprint files with its individual serial number, although it is not known how easily the state can link those serial numbers to individual users.

One element puzzling Florian Grunow is the discovery of an extended version of the watermarking software which he and Niklaus Schiess do not fully understand, but which he says may help identify individual users.

Red Star also makes it nearly impossible for users to modify the system. Attempts to disable its antivirus software or internet firewall will prompt the system to reboot.

The idea for an internal operating system was first conceived by Kim Jong-il, according to Florian Grunow.

As with many things about the world’s most insular state, the extent to which Red Star is used in North Korea is not known. It is likely installed in libraries and other public buildings, says Florian Grunow, where operating systems are installed by the state.

Red Star was built using Linux, a free and open-source platform which can be modified at will, and was designed that way to make it as accessible as possible.

More ironic still is the name of the file used by Red Star to hunt for suspicious files on the machine.

Nancy Clayson

Nancy is a young, full of life lady who joined the team shortly after the BelleNews site started to run. She is focused on bringing up to light all the latest news from the technology industry. In her opinion the hi-tech expresses the humanity intellectual level. Nancy is an active person; she enjoys sports and delights herself in doing gardening in her spare time, as well as reading, always searching for new topics for her articles.

Recent Posts

Donald Trump and Elon Musk Celebrate Election Victory at UFC 309

Image source: Wikimedia Commons President-elect Donald Trump celebrated his election victory at the Ultimate Fighting…

2 days ago

White House 2024: Donald Trump Wins, Kamala Harris Calls Him to Concede Election

Millions of voters across the US chose to return Donald Trump to the White House…

2 weeks ago

Who Won? Donald Trump Declares Victory as He Addresses Jubilant Supporters in Florida

Donald Trump declares victory in the US election as he addresses jubilant supporters in Florida.…

2 weeks ago

Stocks Soaring as Donald Trump Closes in on US Victory

Stocks around the world are rising as Donald Trump appears to be on the cusp…

2 weeks ago

Who Won? Kamala Harris Cancels Election Night Party as Path to Victory Narrows

Donald Trump has won Pennsylvania, North Carolina and Georgia and taken a lead over Kamala…

2 weeks ago

Quincy Jones Dead at 91

Quincy Jones, the celebrated musician and producer who worked with Michael Jackson, Frank Sinatra, Ray…

2 weeks ago