{"id":73615,"date":"2017-11-01T19:04:41","date_gmt":"2017-11-02T02:04:41","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2017\/11\/north-korean-hackers-steal-warship-blueprints-from-south"},"modified":"2017-11-01T19:04:41","modified_gmt":"2017-11-02T02:04:41","slug":"north-korean-hackers-steal-warship-blueprints-from-south","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2017\/11\/north-korean-hackers-steal-warship-blueprints-from-south","title":{"rendered":"North Korean hackers steal warship blueprints from South"},"content":{"rendered":"<p><\/p>\n<p><video width=\"636\" height=\"358\" controls><source src=\"https:\/\/lifeboat.com\/blog.images\/north-korean-hackers-steal-warship-blueprints-from-south.mp4\" type=\"video\/mp4\"><\/video><\/p>\n<p>South Korea is \u2018almost 100 per cent certain\u2019 that North Korean hackers have stolen the blueprints for their warships and submarines.<\/p>\n<p>The despotic regime is thought to have taken the documents after hacking into Daewoo Shipbuilding &amp; Marine Engineering Co Ltd\u2019s database in April last year.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.dailymail.co.uk\/news\/north_korea\/index.html\" id=\"mol-16817710-bede-11e7-b254-dd013bb73780\" class=\"\">North Korea<\/a> has often been implicated in cyber attacks in South Korea and elsewhere but Pyongyang has either ignored or denied accusations of hacking.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.dailymail.co.uk\/news\/article-5038181\/North-Korean-hackers-steal-warship-blueprints-South.html\">http:\/\/www.dailymail.co.uk\/news\/article-5038181\/North-Korean...South.html<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>South Korea is \u2018almost 100 per cent certain\u2019 that North Korean hackers have stolen the blueprints for their warships and submarines. The despotic regime is thought to have taken the documents after hacking into Daewoo Shipbuilding &amp; Marine Engineering Co Ltd\u2019s database in April last year. North Korea has often been implicated in cyber attacks [\u2026]<\/p>\n","protected":false},"author":440,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,38,9],"tags":[],"class_list":["post-73615","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-engineering","category-military"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/73615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/440"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=73615"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/73615\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=73615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=73615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=73615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}