South Korea's Defense Ministry declined to confirm or comment on the reports of a cyberattack.
Tokyo:
North Korean hackers stole a huge trove of classified U.S. and South Korean military documents last year, including a plan to "decapitate" the leadership in Pyongyang in the event of war, a lawmaker in Seoul said Tuesday.
The purported revelations come at a time of heightened tensions over North Korea. President Donald Trump recently said that "only one thing will work" when it comes to Pyongyang, hinting that he thinks diplomatic efforts are proving futile and military action may be necessary.
The defense minister in Japan, a close military ally of the United States, said Tuesday that Trump might take such action against North Korea as soon as next month.
"I think President Trump will judge in the middle of November how effective pressure and other efforts have been," Itsunori Onodera told reporters in Tokyo. "If there have been no changes from North Korea, it's possible that the U.S. will take severe measures."
In Seoul, Rhee Cheol-hee, a lawmaker in the ruling Democratic Party and a member of the parliamentary national defense committee, said North Korean hackers broke into the Defense Integrated Data Center in September last year to steal secret files, including American and South Korean "operational plans" for wartime action. The data center is the main headquarters of South Korea's defense network.
According to Rhee, the stolen documents included OPLAN 5015, a plan drafted two years ago for dealing with full-blown war with North Korea and said to include procedures to "decapitate" the North Korean leadership. He said the cache also included OPLAN 3100, outlining the military response to infiltration by North Korean commandos or another local provocation, as well as a contingency plan in case of a sudden change in North Korea.
Pentagon spokesman Army Col. Robert Manning said Tuesday he was aware of media reports of the breach but would not say if sensitive operation documents were exposed.
"We are confident in the security of our operations plans," Manning said.
While the two Koreas have technically been on a war footing since the Korean War ended in an armistice in 1953, anything that suggests the death or ouster of North Korea's leader, or his assassination, is tantamount to heresy in the North, where the ruling Kims are treated like gods.
Responding to reports about the plans for decapitation strikes, the North's Korean People's Army said in March that it would "deal deadly blows without prior warning" to "the U.S. and South Korean puppet forces."
"They should think twice about the catastrophic consequences to be entailed by their outrageous military actions," the army's general staff said, according to a state news report.
Rhee made his claims about the alleged cyberattack to South Korean reporters, citing documents obtained from the Defense Ministry under a freedom of information request. Rhee's aides told The Washington Post on Tuesday that the lawmaker had collected information from several sources with knowledge of the cyberattacks, and they confirmed that local media had correctly reported Rhee's remarks.
Yonhap News Agency, citing Rhee, reported that the hackers took 235 gigabytes of military documents and that almost 80 percent of the stolen documents have not yet been identified.
The documents also included reports on key South Korean and U.S. military personnel, the minutes of meetings about South Korean-U.S. military drills, and data on military installations and power plants in South Korea, reported the Chosun Ilbo, South Korea's largest newspaper.
"I can't reveal further details because they are a military secret," Rhee said, according to the paper.
The U.S. and South Korean militaries have a mutual defense pact under which the American military would assume operational control of the alliance if a war breaks out. The two militaries conduct large-scale drills twice a year, rehearsing the responses to various scenarios on the Korean Peninsula.
As Kim has accelerated his nuclear weapons program and aimed increasingly bellicose threats at the allies, those plans have been updated to include "beheading operations" - strikes designed to take out North Korea's leaders.
South Korea's Defense Ministry declined to confirm or comment on the reports of a cyberattack.
South Korean lawmakers have a spotty record when it comes to revealing information about what is happening inside North Korea, with many claims later turning out to be wrong. But in this case, the claims relate to something that has happened inside South Korea, and there have been hints about such a cyberattack in recent months.
In May, the Defense Ministry disclosed that the South Korean military's intranet had been hacked by people "presumed to be North Koreans." But the military said that only 53 gigabytes of information were stolen, and it did not reveal what was included.
The previous month, reports emerged that North Korean hackers had broken into the Defense Ministry network and infected more than 3,000 computers, including the defense minister's, with malware.
At the time, South Korean newspapers, quoting unnamed government officials, reported that parts of one operational plan, OPLAN 5027, which outlines troop deployment plans and key North Korean targets, were stolen.
Current and former U.S. officials have said the United States also must be more proactive in launching and openly discussing cyber offensives and retaliations, including in May, when retired Navy Adm. James Stavridis, the former commander of NATO forces, told lawmakers "we should advertise them accordingly" to demonstrate ability and solve.
North Korea was potentially behind phony evacuation messages sent to military families and defense personnel in South Korea last month, advising them via cellphones and social media to quickly leave the country. That incident opens the possibility that last year's breach may have led to the harvest of personal information used for the notifications.
This is hardly the first time that North Korean leader Kim Jong Un's regime has been accused of outrageous cyberattacks. The country's spy agency, the Reconnaissance General Bureau, is thought to have trained and assembled a large cyber army, assumed to be based in China, to launch these kinds of hacks.
North Korea is alleged to have been behind numerous attacks on South Korea's financial networks and government systems and was blamed for the hacking of Sony Pictures Entertainment in 2014, apparently as retaliation for the movie "The Interview," which culminates with Kim's death in an explosion.
Most recently, North Korea was accused of being behind a cyberattack last year on Bangladesh's central bank that netted $81 million and of masterminding the WannaCry ransomware that rocketed around the world earlier this year.
Pyongyang has repeatedly denied any responsibility for or knowledge of the attacks.
The latest alleged cyberattack comes as the United States struggles to harden cyber defenses against adversaries such as Russia, China and North Korea, who have outpaced U.S. efforts to fold cyber weapons into conventional military operations.
The Army said in a manual released Monday that it will seek to put greater emphasis on cyber options in what it calls hybrid war - a blurring of cyber and space operations with traditional military actions like mobilizing ground troops and massing tank units.
- - -
The Washington Post's Yoonjung Seo in Seoul and Alex Horton in Washington contributed to this report.
(This story has not been edited by NDTV staff and is auto-generated from a syndicated feed.)
The purported revelations come at a time of heightened tensions over North Korea. President Donald Trump recently said that "only one thing will work" when it comes to Pyongyang, hinting that he thinks diplomatic efforts are proving futile and military action may be necessary.
The defense minister in Japan, a close military ally of the United States, said Tuesday that Trump might take such action against North Korea as soon as next month.
"I think President Trump will judge in the middle of November how effective pressure and other efforts have been," Itsunori Onodera told reporters in Tokyo. "If there have been no changes from North Korea, it's possible that the U.S. will take severe measures."
In Seoul, Rhee Cheol-hee, a lawmaker in the ruling Democratic Party and a member of the parliamentary national defense committee, said North Korean hackers broke into the Defense Integrated Data Center in September last year to steal secret files, including American and South Korean "operational plans" for wartime action. The data center is the main headquarters of South Korea's defense network.
According to Rhee, the stolen documents included OPLAN 5015, a plan drafted two years ago for dealing with full-blown war with North Korea and said to include procedures to "decapitate" the North Korean leadership. He said the cache also included OPLAN 3100, outlining the military response to infiltration by North Korean commandos or another local provocation, as well as a contingency plan in case of a sudden change in North Korea.
Pentagon spokesman Army Col. Robert Manning said Tuesday he was aware of media reports of the breach but would not say if sensitive operation documents were exposed.
"We are confident in the security of our operations plans," Manning said.
While the two Koreas have technically been on a war footing since the Korean War ended in an armistice in 1953, anything that suggests the death or ouster of North Korea's leader, or his assassination, is tantamount to heresy in the North, where the ruling Kims are treated like gods.
Responding to reports about the plans for decapitation strikes, the North's Korean People's Army said in March that it would "deal deadly blows without prior warning" to "the U.S. and South Korean puppet forces."
"They should think twice about the catastrophic consequences to be entailed by their outrageous military actions," the army's general staff said, according to a state news report.
Rhee made his claims about the alleged cyberattack to South Korean reporters, citing documents obtained from the Defense Ministry under a freedom of information request. Rhee's aides told The Washington Post on Tuesday that the lawmaker had collected information from several sources with knowledge of the cyberattacks, and they confirmed that local media had correctly reported Rhee's remarks.
Yonhap News Agency, citing Rhee, reported that the hackers took 235 gigabytes of military documents and that almost 80 percent of the stolen documents have not yet been identified.
The documents also included reports on key South Korean and U.S. military personnel, the minutes of meetings about South Korean-U.S. military drills, and data on military installations and power plants in South Korea, reported the Chosun Ilbo, South Korea's largest newspaper.
"I can't reveal further details because they are a military secret," Rhee said, according to the paper.
The U.S. and South Korean militaries have a mutual defense pact under which the American military would assume operational control of the alliance if a war breaks out. The two militaries conduct large-scale drills twice a year, rehearsing the responses to various scenarios on the Korean Peninsula.
As Kim has accelerated his nuclear weapons program and aimed increasingly bellicose threats at the allies, those plans have been updated to include "beheading operations" - strikes designed to take out North Korea's leaders.
South Korea's Defense Ministry declined to confirm or comment on the reports of a cyberattack.
South Korean lawmakers have a spotty record when it comes to revealing information about what is happening inside North Korea, with many claims later turning out to be wrong. But in this case, the claims relate to something that has happened inside South Korea, and there have been hints about such a cyberattack in recent months.
In May, the Defense Ministry disclosed that the South Korean military's intranet had been hacked by people "presumed to be North Koreans." But the military said that only 53 gigabytes of information were stolen, and it did not reveal what was included.
The previous month, reports emerged that North Korean hackers had broken into the Defense Ministry network and infected more than 3,000 computers, including the defense minister's, with malware.
At the time, South Korean newspapers, quoting unnamed government officials, reported that parts of one operational plan, OPLAN 5027, which outlines troop deployment plans and key North Korean targets, were stolen.
Current and former U.S. officials have said the United States also must be more proactive in launching and openly discussing cyber offensives and retaliations, including in May, when retired Navy Adm. James Stavridis, the former commander of NATO forces, told lawmakers "we should advertise them accordingly" to demonstrate ability and solve.
North Korea was potentially behind phony evacuation messages sent to military families and defense personnel in South Korea last month, advising them via cellphones and social media to quickly leave the country. That incident opens the possibility that last year's breach may have led to the harvest of personal information used for the notifications.
This is hardly the first time that North Korean leader Kim Jong Un's regime has been accused of outrageous cyberattacks. The country's spy agency, the Reconnaissance General Bureau, is thought to have trained and assembled a large cyber army, assumed to be based in China, to launch these kinds of hacks.
North Korea is alleged to have been behind numerous attacks on South Korea's financial networks and government systems and was blamed for the hacking of Sony Pictures Entertainment in 2014, apparently as retaliation for the movie "The Interview," which culminates with Kim's death in an explosion.
Most recently, North Korea was accused of being behind a cyberattack last year on Bangladesh's central bank that netted $81 million and of masterminding the WannaCry ransomware that rocketed around the world earlier this year.
Pyongyang has repeatedly denied any responsibility for or knowledge of the attacks.
The latest alleged cyberattack comes as the United States struggles to harden cyber defenses against adversaries such as Russia, China and North Korea, who have outpaced U.S. efforts to fold cyber weapons into conventional military operations.
The Army said in a manual released Monday that it will seek to put greater emphasis on cyber options in what it calls hybrid war - a blurring of cyber and space operations with traditional military actions like mobilizing ground troops and massing tank units.
- - -
The Washington Post's Yoonjung Seo in Seoul and Alex Horton in Washington contributed to this report.
(This story has not been edited by NDTV staff and is auto-generated from a syndicated feed.)
Track Latest News Live on NDTV.com and get news updates from India and around the world