IGLOO's Press


Announcement of major security issues of 2012 and security operation trend of 2013



Igloo security, 

Announcement of major security issues of 2012 and security operation trend of 2013


-          major security issues of 2012 : diversification of security incidents, intellectualization of types of attack, evolution of DDoS attacks, expansion of operation scope as a result of increase in smart public service

-          in 2013, simulation exercises and security education will increase to effectively respond to security incidents


December 27th,2012] A leading integrated security management company for next generation, Igloo security (CEO :Lee Deuk-choon, www.igloosec.co.kr) has announced “major security issues of 2012 and security operation trend of 2013” on the basis of years of security experiences and massive threat analysis data.


Igloo security as a leading company in the integrated security management market with some 300 talents and self-developed solutions has provided stable security operation service to a number of public institutions, major companies, financial institutions and educational institutions for a long period of time. 


Especially in 2012, numerous national events have taken place including the 18th presidential election, the 19th general election and nuclear security summits which has accordingly raised the increased possibility of threats to security. Security specialist in the country, however, including Igloo Security have done their part in successfully concluding major national events without a hitch through their excellent technology capabilities and in-depth know-how.


Igloo security has selected major security issues of 2012 on the basis of internally summed up statistics and experiences of holding major national events. They were selected on the basis of survey results conducted on security personnel of Igloo Security carrying out actual security operations in major public institutions, financial institutions and large companies and solely focused on domestic security environment.


According to Igloo security, ranging from malicious codes which continuously attack user devices to DDos attacks which do harm to service availability, infringement spectrum has been diversified, which is one of the most conspicuous features out of this year’s security issues. In particular, through physical/ logical net separation, efforts to block expansion of security threats have continued, while a wide variety of infringement attempts including deprivation of authorization using vulnerabilities of web-server and applications existed net boundaries and attempts to dominate and steal information of end-point devices exposed outside have incessantly made.


One of other main issues includes intellectualization of attack methods. Consecutive attacks using average business software like Hangul as an additional path to launch an attack and Zero-day attacks capitalizing on vulnerabilities have increased. Increase in bypass attacks which hide position of attackers through overseas proxy also shows intellectualization of attack methods..


Aggravated DDoS attack is also considered one of the main security issues this year. While ways to infringe on availability through attack on defunct IP addresses have increased, DDoS attacks for political purposes other than pursuing monetary gains have increased as well. In addition, DDOs attacks tend to occur mainly during the nighttime when security status is considered weaker than that of working hours.


Lastly, the possibility of security incidents in the internal network through mobile devices has increased as public service in the public institutions has expanded. As a result, necessity to secure security of a new domain, mobile has been raised and public institutions have been in a hurry to come up with response measures.


Igloo security has predicted security operation trend of 2013 in addition to major security issues this year stated above. Firstly, in 2013 it has expected that simulation exercises to effectively respond to security incidents and education in respect of the latest security threats and related laws/ regulations will increase. In addition, beyond analysis centered on security and network event, growing needs for more comprehensive and conclusive analysis capabilities such as malicious code and web-hacking analysis will occur.


In addition, Igloo Security has forecasted that fixation of customer-tailored response tools and new-found threats to security will be accelerated, while reorganization of emergency response structure and service providence structure as a result of relocation of public institutions to regional areas will take place..


Cho Chang-sub, director of Igloo Security’s service sector was quoted as saying, Massive data, experience and knowledge of cyber security business accumulated throughout years in public institutions and companies are the core assets of Igloo Security that any other security companies can easily achieve and Igloo Security will continue to come up with counter plans by accurately understanding the latest trend to establish a safe society in the front line of cyber domain.” 


Summary of main security issues of 2012


1.         Diversification of security incidents

2.         Intellectualization of attack methods–increase in Web Shell upload attacks and Zero-day attacks(IE, Adobe reader, Oracle JRE, HWP),distribution of malicious code in the type of Key Loger through Hangul update, bypass attacks which hide location of attackers through overseas proxy

3.         Advancement of DDos attack–increase in attacks for political purposes using abandoned IP addresses to oppose the government’s policies, DDoS attacks in night-time

4.        Expansion of security operation area as a result of increase in public service through mobile devices


Summary of 2013 trend of security operation


1.       Increase in simulation services to effectively respond to security incidents

2.       Increase in security education for employees in respect of already-changed law/system and the latest security threats

3.       Requirement for comprehensive and integrated analysis competence including analysis of malicious codes and web-hacking incidents

4.      Fixation of customer-tailored response tools and security incidents reflecting new-found threats

5.      Reorganization of emergency response structure and service support structure as a result of relocation of public institutions to regional areas