North Korea Red Star OS Analysis Reveals Spying Tools

North Korea’s internal computer operating system includes spying tools capable of tracking documents offline, the first in-depth analysis has revealed.

Red Star OS was designed to superficially mimic Apple’s OS X, but hidden features allow it to watermark files and tie them to an individual.

The tools were discovered by two German researchers who conducted the analysis over the past month.

The presented their findings at the Chaos Communication Congress on December 27.

Florian Grunow and Niklaus Schiess pored over the code of Red Star OS version 3.0, which first surfaced online about a year ago.

Any files uploaded to computer via a USB stick or other storage device can be watermarked by the system, allowing the state to trace the journey of that file from machine to machine. Red Star can also identify undesirable files and delete them without permission.

The watermarking function was designed in response to the proliferation of foreign films and music being shared offline.

The system will imprint files with its individual serial number, although it is not known how easily the state can link those serial numbers to individual users.

One element puzzling Florian Grunow is the discovery of an extended version of the watermarking software which he and Niklaus Schiess do not fully understand, but which he says may help identify individual users.

Red Star also makes it nearly impossible for users to modify the system. Attempts to disable its antivirus software or internet firewall will prompt the system to reboot.

The idea for an internal operating system was first conceived by Kim Jong-il, according to Florian Grunow.

As with many things about the world’s most insular state, the extent to which Red Star is used in North Korea is not known. It is likely installed in libraries and other public buildings, says Florian Grunow, where operating systems are installed by the state.

Red Star was built using Linux, a free and open-source platform which can be modified at will, and was designed that way to make it as accessible as possible.

More ironic still is the name of the file used by Red Star to hunt for suspicious files on the machine.

Nancy Clayson

Nancy is a young, full of life lady who joined the team shortly after the BelleNews site started to run. She is focused on bringing up to light all the latest news from the technology industry. In her opinion the hi-tech expresses the humanity intellectual level. Nancy is an active person; she enjoys sports and delights herself in doing gardening in her spare time, as well as reading, always searching for new topics for her articles.

Recent Posts

House Panel Votes to Release Matt Gaetz Ethics Report

The US House Ethics Committee has voted to release its report on former Republican Representative…

3 days ago

ABC News to Pay $15M to Settle Trump Defamation Suit

ABC News has agreed to pay $15 million to President-elect Donald Trump to settle a…

1 week ago

South Korea’s Parliament Impeaches President Yoon Suk Yeol Following Martial Law Scandal

South Korea’s parliament has voted to impeach President Yoon Suk Yeol over his failed attempt…

1 week ago

Syria: Israeli War Planes Carry Out More Than 100 Air Strikes

Israeli war planes have carried out more than 100 air strikes in Syria on December…

2 weeks ago

Donald Trump Threatens 100% Tariff on BRICS Nations

President-elect Donald Trump has threatened to impose 100% tariffs on the BRICS countries if they…

3 weeks ago

Syria Coup: Rebels Take Control of Aleppo

Syrian troops have withdrawn from the city of Aleppo following an offensive by rebels opposed…

3 weeks ago