The massive cyber attacks on South Korean banks and broadcasters earlier this year were part of a broad campaign of cyber espionage which dates back at least to 2009, a US security firm has concluded.
The study by the firm McAfee stopped short of blaming specific entities for the March 20 onslaught but said it found a pattern of sophisticated attacks, including efforts to wipe away traces that could lead to detection.
"The level of sophistication would indicate it is above and beyond your average individual or run-of-the mill hacktivism group," said James Walter, a McAfee researcher and co-author of the study.
An official South Korean investigation in April determined North Korea's military intelligence agency was responsible for the attacks which shut down the networks of TV broadcasters KBS, MBC and YTN, halted financial services and crippled operations at three banks—Shinhan, NongHyup and Jeju.
Walter told AFP that McAfee drew no official conclusion but added that "I have no reason to disagree" with the South Korean investigation conclusion.
But McAfee said the attacks represented only a small portion of the cyber campaign being carried out since 2009.
"One of the primary activities going on here is theft of intellectual property, data exfiltration, essentially stealing of secrets," Walter said.
The report said the attacks, known first as Dark Seoul and now as Operation Troy were "more than cybervandalism... South Korean targets were actually the conclusion of a covert espionage campaign."
McAfee concluded that two groups claiming responsibility for the attack were not credible.
"The clues left behind confirm that the two groups claiming responsibility were a fabrication to throw investigators off the trail and to mask the true source," the report said.
Walter said that it is possible that with the campaign nearing detection, the hackers launched these attacks to distract the public and then sought to blame them on little-known entities, the NewRomanic Cyber Army Team, and the Whois Hacking Team.
He added that up to now, the cyber espionage effort "has been very successful in being under the radar" and that "what we see now was a more visible activity that is coupled with a distraction campaign."
McAfee concluded that the remote-access Trojan was compiled January 26, and a component to wipe the records of numerous systems was compiled January 31.
"The attackers who conducted the operation remained hidden for a number of years prior to the March 20 incident by using a variety of custom tools," the report said.
"Our investigation into Dark Seoul has found a long-term domestic spying operation underway since at least 2009... We call this Operation Troy, based on the frequent use of the word Troy in the compile path strings in the malware."
McAfee carried out the study as part of its research into cybersecurity issues, Walter said.
The attack came days after North Korea had accused South Korea and the United States of being behind a "persistent and intensive" hacking assault that temporarily took a number of its official websites offline.
It also coincided with heightened military tensions on the Korean peninsula, following Pyongyang's nuclear test in February.
Explore further: South Korea beefs up cyber security