Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Network Solutions Unlimited can assist you in making those preparations effectively. Give us a call at 217-428-6449 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Work/Life Balance Upgrades Vulnerability Data Recovery Public Cloud Operating System Instant Messaging Administration Peripheral Avoiding Downtime Printers Spyware Techology Safety Collaboration User Error Experience SaaS Networking Outlook Company Culture Windows Scalability Smart Technology Shadow IT Server Audit Tip of the Week Television Business Continuity Marketing Tech Support Customer Touchpad Automobile Innovation Information Hacking Remote Monitoring Bring Your Own Device Evernote Devices Search Save Money Mobile WPA3 Co-Managed Services Employee-Employer Relationship Internet of Things IT Support Malware Audiobook Save Time Business Hackers Facebook intranet Document Management Wireless Technology Laptop Windows 10 Phishing Communications IT Services Tablets Device Security Hard Drives Email Education Data Theft Identities WannaCry Windows 10s Analysis Management Edge Smartphone Computing Public Computer Virtualization App store Personal Information Data Breach MSP Windows 10 Politics Charger Update Disaster Recovery Software as a Service Private Cloud Business Computing Wasting Time hacker Managed Service Provider IT Solutions iOS Sports Benefits IT solutions Entertainment Computer Hybrid Cloud Project Management Admin IoT Troubleshooting Twitter Content Filtering Two-factor Authentication HIPAA Social Media Workplace Tips Access Control History Rootkit Battery Virtual Reality Alert Video Games PDF Antivirus End of Support Computers VoIP Password Managed IT Services Upgrade Business Owner Websites Microsoft Word Utility Computing Chromecast Travel Connectivity Legislation WIndows Server 2008 Settings Data Backup Microsoft Office HaaS Thank You Screen Mirroring Data Storage Phone System Licensing How to File Storage Flexibility Value Comparison VPN Vendor Printing Consultant Google Docs Redundancy How To Managed IT Service Conferencing Word Browser Excel Computing Infrastructure Cast Backup Security Holiday Display Keyboard Managing Stress Monitors Financial Technology Productivity Application Internet Exlporer Automation Congratulations Encryption Physical Security Workers Productivity File Sharing Patch Management Adobe Touchscreen Data Privacy Business Management Privacy Unified Threat Management Wireless Internet eWaste Cost Management Managed IT Services App WiFi Monitor Budget Retail Hardware Cortana Chromebook Virtual Assistant Augmented Reality Managed IT Business Intelligence Communication Google Hosted Solutions Wireless Charging Software Blockchain iPhone Proactive Memory Transportation Wi-Fi Going Green Gifts Data storage Computer Forensics Saving Money IT budget Users Specifications Gadgets Alexa for Business Health Spam Blocking HBO Two Factor Authentication Quick Tips Loyalty Chrome Information Technology Lifestyle Mobile Device Technology Storage Regulation Emails Recovery Smartphones Bluetooth Monitoring Worker BDR Cybersecurity Professional Services Financial Emergency Android Commerce Credit Cards Updates Windows Ink CrashOverride Computer Care Virus Microsoft Excel Social Engineering Robot Proactive IT Managed Service Nanotechnology Cache Spam Ciminal Scam Streaming Media Google Maps Keyboard Shortcuts Best Practice Solid State Drive Telephone Systems Data Loss Projects Government Gmail Outsourced IT Money FAQ Mobile Security Cleaning Business Technology Internet exploMicrosoft NFL Best Practices Data Management Identity Theft BYOD Meetings Downtime Router Network Apps Computer Accessories Sync Dark Web Samsung Small Business The Internet of Things Sales Apple IT Support Electronic Medical Records User Tips Telephone Passwords Miscellaneous Saving Time Shortcut Advertising Colocation Mobile Devices Office Tips Efficiency Hiring/Firing Smart Tech IT Management Unified Communications Accessory Gamification Compliance Books Wireless Office 365 Network Security Assessment Artificial Intelligence Cloud Computing Big Data Files Amazon Wasting Money Humor Firewall Windows 7 Mobile Device Management Mobility Testing Students OneNote Content Maintenance Remote Computing Google Drive Applications Content Filter Root Cause Analysis Employer-Employee Relationship Ransomware Fraud Law Enforcement USB Reputation Cybercrime PowerPoint Hard Drive Risk Management Language Webinar Vendor Management Tech Term Computer Fan Legal Bandwidth Internet Google Assistant Data Protection Office Black Market Cloud Unsupported Software Hyperlink Relocation Data Security Identity Hard Disk Drive Worker Commute Hosted Solution Microsoft Camera Training Data Employer Employee Relationship