Supreme Court of the Republic of Korea’s Case Study on Implementing WSS
Background and Objectives of Implementation
In early 2023, the Supreme Court of Korea discovered that its internal network had been infiltrated by a state-sponsored threat group, believed to be North Korea’s Lazarus. The intrusion had remained undetected for over two years and resulted in the unauthorized exfiltration of over 1,000GB of sensitive court documents. This unprecedented incident highlighted critical vulnerabilities in password management, system monitoring, and incident response.
To reinforce real-time security monitoring and reduce human dependency in threat detection, the judiciary decided to discreetly implement WSS (Web Server Safeguard), developed by UMV Inc.
Implementation Details and Key Initiatives
Implementation Details
- WSS was integrated into the core web server infrastructure of the judicial network.
- The deployment focused on real-time file system monitoring, web shell detection, and malware isolation.
- Integration was performed covertly to minimize operational disruption and public exposure.
Key Initiatives
- Integration was performed covertly to minimize operational disruption and public exposure.
- WSS was integrated into the core web server infrastructure of the judicial network.
- The deployment focused on real-time file system monitoring, web shell detection, and malware isolation.
Feedback from Customers
Although the implementation was classified, internal feedback from security officers and administrators has been highly positive.
Officials expressed that the solution was instrumental in regaining operational trust following the breach.
They noted a significant improvement in detection speed and a sharp drop in manual inspection workload.
WSS’s lightweight design minimized performance impact, while its detailed logging improved forensic investigation.
apt apt41 case study data breach double dragon hack hyundai capital supreme court UMV web shell wss