Home > Computing > Researchers get a glimpse into North Korea’s…

Researchers get a glimpse into North Korea’s homemade operating system

A group of security researchers have taken an in-depth look at how North Korea’s state-built operating system RedStar OS works and tracks the citizens that use it.

Florian Grunow and Niklaus Schiess from German security company ERNW presented their findings at this week’s Chaos Communication Congress in Hamburg after the duo managed to get their hands on the code for the operating system.

RedStar OS operates much like the totalitarian regime in North Korea. It’s primitive and completely controlled by its creators, though it’s based on Linux’s Fedora 11, an open source technology that is ironically all about free speech and access to information.

Related: North Korea ‘upgrades’ to copycat version of Mac OS X

The OS that Grunow and Schiess have analyzed is a version from 2013. The researchers have not revealed how exactly they got access to the code, but mentioned they downloaded the code from a site outside North Korea.

The RedStar OS was devised by Kim Jong-il, the father of current leader Kim Jong-un, over a decade ago as a means for North Korea to run a basic internet-like network while also controlling it entirely. The network is actually an intranet running off servers in North Korea, which allows access to a limited number of government-approved sites.

Most striking, the operating system tracks any changes that the user might make to the OS. This is most likely a means to track any possible back doors implanted for foreign agencies to spy on the regime, according to Grunow and Schiess. “They may want to be independent of other operating systems because they fear back doors,” Grunow told The Guardian.

Related: North Korea blames the U.S. for intranet woes

Any time a user inserts a USB stick into their computer, RedStar OS will watermark the files in order to track them, and keep tabs on who has access to them. This is done covertly. “It’s done stealthily and touches files you haven’t even opened,” said Grunow. This is particularly interesting as one of the main avenues for sneaking western or South Korean content like films and TV shows into the hermit kingdom is via smuggled USB drives.

The OS is largely tamper proof, too. Any time a user attempts to make any changes to the main settings, like disabling the antivirus or firewalls, the OS will automatically reboot itself.

However, the researchers found no evidence that the RedStar OS has ever been used in cyber-attacks on foreign targets, despite North Korea being accused several times for attacks on western nations and companies. This doesn’t mean the country wasn’t involved — but it does seem unlikely the attacking computers ran RedStar OS.