Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Network Solutions Unlimited can assist you in making those preparations effectively. Give us a call at 217-428-6449 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Computer Fan Gifts Project Management Experience Computer Accessories Technology Nanotechnology Efficiency FAQ Smartphones Personal Information Thank You Virtualization Internet Exlporer Employer-Employee Relationship Outlook Flexibility Internet of Things Managed IT Service WIndows Server 2008 Password Administration Compliance Smartphone Customer Communications Device Security Data Loss Robot Meetings Cybersecurity Innovation Dark Web Google Docs Bandwidth Privacy Internet exploMicrosoft Search Cortana Shortcut Microsoft Word Video Games Security Wireless Technology Sports Touchpad Productivity Quick Tips IT Support Ciminal Browser Webinar Upgrade Vulnerability Vendor Management Holiday Backup Software as a Service Content Filtering Private Cloud Network Identity Theft Tip of the Week The Internet of Things Loyalty Data Management OneNote Training Monitors Cache Benefits Managed IT Services Google Drive Retail Workers Unified Threat Management IT Solutions Audiobook Ransomware Fraud Cloud Computing How to Assessment Workplace Tips Smart Technology Reputation Physical Security Worker Commute HBO Battery Two-factor Authentication MSP Storage Wireless Charging Miscellaneous Data storage Router Data Security Virtual Reality Phone System USB iPhone Alert Rootkit Electronic Medical Records Mobile Device Collaboration Disaster Recovery Monitor Hard Drives Charger Tablets Cybercrime History Commerce Apple Value Transportation Mobile Devices Malware Applications Colocation How To Managed Service Provider Wireless Identities Work/Life Balance Screen Mirroring Spyware BDR Hybrid Cloud Hardware Data Protection Black Market CrashOverride Business Management Sync Keyboard Telephone Systems Congratulations Hosted Solution Operating System Advertising Sales Managed IT Services User Tips Politics Tech Support Windows 10s Office 365 Automation Office Tips Passwords Specifications Microsoft Office Windows 10 Money IT Services Business HIPAA Microsoft Social Media Mobile Device Management Hard Disk Drive Two Factor Authentication Settings IT Management Redundancy Legal Legislation Bluetooth Troubleshooting IT Support Remote Monitoring Devices Managed IT VoIP Outsourced IT Files Data Breach intranet Encryption Server Computer Consultant Comparison Law Enforcement Humor Marketing Evernote Emails Windows 10 Excel Wi-Fi Data Recovery Cost Management Augmented Reality Government Television Health Word Scalability WiFi Artificial Intelligence Computer Care Worker Hacking Application Samsung Mobility Computers Emergency Business Computing Email Unsupported Software Public Computer Remote Computing BYOD Windows Ink Firewall User Error Small Business Android IT solutions Spam Blocking Licensing Upgrades Users Solid State Drive Patch Management Techology Business Owner Adobe Professional Services Save Money Best Practices Office Credit Cards Content Instant Messaging Mobile Data Storage WannaCry Touchscreen Cleaning Root Cause Analysis Cast Spam Google Employer Employee Relationship Safety Laptop Proactive IT IT budget Network Security Gadgets Internet Updates Networking Chrome Windows Scam Information Technology Public Cloud Document Management Business Continuity hacker Data Microsoft Excel Lifestyle Software Books Hosted Solutions iOS Apps Save Time Travel PDF Hackers Recovery Productivity File Sharing Budget HaaS NFL Social Engineering Edge Shadow IT Chromecast Hiring/Firing Audit Facebook Regulation Entertainment Gmail Downtime VPN Maintenance App Relocation Big Data Phishing Automobile Avoiding Downtime Business Intelligence Cloud Education Blockchain Data Backup Best Practice Bring Your Own Device Saving Money SaaS Going Green Risk Management Computing Infrastructure Google Maps Conferencing End of Support eWaste

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *