Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Network Solutions Unlimited can assist you in making those preparations effectively. Give us a call at 217-428-6449 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Virtualization IT solutions Unified Threat Management Productivity SaaS Evernote Innovation Privacy Google Drive Fraud Mobile Data Theft Outsourced IT Productivity Wireless Technology Samsung Management Gmail Data Protection Google Maps Nanotechnology IT Support Wireless Hackers Audiobook Information Technology Travel Workers Microsoft Excel Two Factor Authentication Social Media HaaS hacker Marketing Computer Forensics Computing Infrastructure Google Assistant Analysis Private Cloud Sync Patch Management Charger Word Password Blockchain Specifications Public Cloud Windows 10 Webinar Content Filtering Employer Employee Relationship Smart Technology Credit Cards Mobile Device Management Commerce Tech Term How to Touchpad Data Wireless Charging Files Save Time Updates Health Hard Disk Drive Cybersecurity Hybrid Cloud Data Recovery Hiring/Firing Conferencing Value Compliance Network Virtual Reality Vendor Management Emails Upgrade Tech Support Websites Instant Messaging Monitors Sports Browser Chromebook Virus Scam Shadow IT Bandwidth Tip of the Week HIPAA Miscellaneous NFL Windows Lifestyle Smart Tech Passwords Software as a Service Congratulations Cortana USB Best Practices intranet Mobile Security Cast Edge Regulation VPN Assessment Settings Root Cause Analysis Advertising Collaboration Security Battery Device Security Antivirus Google Licensing Windows 10 Budget IoT Communications Apple Server Phone System Hardware Scalability Relocation Office Best Practice Computer Fan BDR Chrome Employer-Employee Relationship Artificial Intelligence Managed IT Services PDF Efficiency Administration Recovery Software Remote Computing Spam Workplace Tips Microsoft Computer Accessories Bluetooth Dark Web Gadgets Public Computer Robot Troubleshooting Managed IT Services Physical Security Money Spyware Monitoring OneNote Automation Save Money Hosted Solutions Thank You Facebook WannaCry IT Solutions Proactive IT Data Loss Going Green Internet Hard Drives VoIP Data Storage Touchscreen Project Management Office Tips Downtime Router Humor CrashOverride Personal Information Internet exploMicrosoft Wi-Fi Big Data Meetings Saving Money IT Management HBO WiFi Adobe Retail Comparison Bring Your Own Device Apps Firewall Business Computing Legal Internet Exlporer Tablets Storage WIndows Server 2008 Worker Twitter Automobile Backup Financial Technology Politics Applications Business Intelligence App store Cache Colocation Legislation Managed Service Provider Augmented Reality Telephone Systems Social Engineering Android Cleaning Maintenance Avoiding Downtime Network Security Computing Holiday Document Management Vulnerability Streaming Media Data Security Phishing Microsoft Word Mobility History Search Managed IT Service Email How To Entertainment Emergency Books Cloud Computing Techology Business Owner Networking Rootkit Cloud Office 365 Government Two-factor Authentication Technology Data Management Content Filter Identities Gifts Black Market Electronic Medical Records Loyalty Smartphones Malware Communication Computer iPhone MSP Computer Care Video Games Upgrades Application Business Audit Professional Services Worker Commute Mobile Device Data storage IT budget Devices Flexibility Sales Unsupported Software Language Internet of Things Operating System Update Spam Blocking Remote Monitoring Data Breach Outlook File Sharing Business Management Consultant Printing Proactive Transportation Work/Life Balance Windows Ink Customer Risk Management Shortcut Hard Drive Keyboard The Internet of Things Screen Mirroring BYOD Cost Management Hacking Encryption IT Services Data Privacy Windows 10s Disaster Recovery Data Backup Identity Theft Hosted Solution App User Tips Cybercrime Ransomware iOS IT Support Small Business Television Reputation Microsoft Office Laptop Identity Experience Law Enforcement Safety Training Managed IT Users Quick Tips Google Docs End of Support User Error FAQ Alert Smartphone Ciminal Mobile Devices Solid State Drive Content Redundancy Excel Education Computers Connectivity Benefits Monitor Chromecast Business Continuity eWaste