Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Network Solutions Unlimited can assist you in making those preparations effectively. Give us a call at 217-428-6449 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Spyware Comparison Dark Web Proactive Employer Employee Relationship CrashOverride Security Cameras Data Recovery Credit Cards Best Practice Automation Money Business Management Virtual Private Network Router Managed Service Provider Computer Accessories WIndows Server 2008 Battery Scam Vendor Server Search Internet Exlporer Legislation Sync Browser Phishing Audiobook Disaster Recovery Hacking Cybersecurity Display Application eWaste VPN Apps Device Security Memory Government Communications Monitors Utility Computing Electronic Medical Records Language Financial Malware IoT Saving Money User Error Business Technology Advertising IT solutions PDF Data Storage Sports Computing Infrastructure Virtual Reality Downtime Specifications Gamification Students Emails IT Management Cleaning Charger Samsung Paperless Office Windows Ink Hosted Solutions Spam Blocking Travel Hardware Project Management Worker Commute Internet of Things Miscellaneous Access Control Smart Tech Virus Webinar Cloud Computing Managed IT Hyperlink Ransomware Content Business Continuity Users Managing Stress Data Breach Hackers Remote Monitoring Cast WiFi How to Privacy Google Colocation Managed IT Service History Business Intelligence HaaS Network IT Support Innovation Private Cloud Chrome Quick Tips Android How To Instant Messaging hacker Remote Workers Customer Commerce Smart Technology Cache WPA3 Facebook Monitoring Human Resources Passwords Wasting Money Save Money Saving Time Bluetooth iOS BYOD Shadow IT Wireless Charging Computer Microsoft Remote Computing Two-factor Authentication Automobile Wireless Internet Robot Sales Wasting Time Avoiding Downtime Productivity Flexibility Techology Entertainment Backup Alexa for Business Data storage Information Technology Excel VoIP Tech Term Applications Machine Learning Professional Services Administration Computer Fan Computer Forensics Benefits Microsoft Word Windows 7 Virtualization Hybrid Cloud Books Identity Compliance Smartphones Wi-Fi Loyalty Settings Google Maps Bring Your Own Device Data Privacy Business Computing Vulnerability Going Green Windows 10s Communication Vendor Management Upgrades Emergency Content Filter Lifestyle Legal Chromecast Consultant Computer Care Employer-Employee Relationship Storage Projects Employee Small Business IT Services USB Unified Threat Management Payroll Email Collaboration Updates Productivity Cortana Root Cause Analysis Cloud Streaming Media IT Support Education Computers Assessment Upgrade Data Management Two Factor Authentication Gadgets Telephone Systems Troubleshooting Workers Data The Internet of Things Cost Management Spam Patch Management Apple Mobile Device Microsoft Office Office Networking Adobe Evernote Touchpad Wireless Hard Drive Printers Telephone Encryption Holiday Files Management Big Data Cybercrime Nanotechnology PowerPoint Meetings BDR Gmail Connectivity User Tips Social Media Printing Company Culture Reputation Co-Managed Services Recovery Business Owner Data Security Touchscreen Monitor Value Ciminal Politics Mobile Devices Tablets Fraud Chromebook Unified Communications Technology intranet Thank You Edge IT Solutions Artificial Intelligence Social Engineering Relocation Law Enforcement Update Office Tips Microsoft Excel Training Public Computer Outsourced IT Hiring/Firing Tip of the Week Word Firewall Work/Life Balance Worker FAQ SaaS Transportation Internet exploMicrosoft Marketing Software as a Service Employee-Employer Relationship Black Market Regulation Data Loss Bandwidth Workplace Tips Audit Risk Management WannaCry Television Conferencing Devices Shortcut Gifts Mobility Camera Redundancy Safety Save Time Windows Document Management App Office 365 Password Peripheral Licensing Computing Laptop App store Google Drive Antivirus Personal Information Managed IT Services Outlook HIPAA Phone System Hosted Solution Google Docs Amazon Google Assistant SMB Testing Software NFL Mobile Security Windows 10 Data Backup Data Protection Wireless Technology Windows 10 Twitter Managed Service Humor Blockchain Financial Technology File Sharing Security iPhone Smartphone Operating System Network Security E-Commerce Keyboard Information Content Filtering Screen Mirroring Payment Cards Efficiency Identities End of Support Augmented Reality Congratulations Rootkit Backup and Disaster Recovery Analysis File Storage Keyboard Shortcuts Maintenance MSP Experience Admin Websites Health Internet OneNote Virtual Assistant Retail Mobile Tech Support Alert Unsupported Software Accessory Proactive IT Public Cloud Physical Security IT budget Hard Disk Drive Scalability Hard Drives Solid State Drive Video Games Budget Business Identity Theft Mobile Device Management Best Practices Data Theft IT Service Managed IT Services HBO