Contact us today!

Network Solutions Unlimited Blog

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Network Solutions Unlimited can assist you in making those preparations effectively. Give us a call at 217-428-6449 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Data Breach Encryption Outlook Google Maps Technology Cleaning Best Practices Save Money Device Security Cache Browser Collaboration Server App store Assessment Audiobook Private Cloud Router Streaming Media Hardware Operating System IT Management Hybrid Cloud Chromecast Information Cybersecurity Business Owner Benefits HBO IT budget Unsupported Software Microsoft Office Software Business Continuity Gamification Business Intelligence Alexa for Business Augmented Reality Customer Unified Communications Cortana Apps Tech Term Computing Infrastructure Wireless Internet IT Solutions Big Data Wireless Technology Bandwidth Computer Accessories Malware Social Media Spyware Worker Managed Service Provider Two-factor Authentication Students hacker Application Wireless Amazon Mobility Maintenance Two Factor Authentication Phone System HaaS Twitter Evernote Unified Threat Management Updates Troubleshooting Cloud Computer Care Microsoft Excel Update Blockchain Hosted Solutions File Storage OneNote Network Government Wi-Fi Business Cybercrime Network Security Project Management WIndows Server 2008 Smart Technology Office Tips Office Workers Information Technology Credit Cards Humor Ciminal Cost Management Administration HIPAA Legislation Windows 10s Antivirus Alert iOS Virus Transportation Data Management Google Chrome Social Engineering Bluetooth Virtual Assistant Dark Web Specifications VPN Compliance Google Drive Going Green Advertising Automation Keyboard Windows 10 Backup Travel Commerce Management Analysis User Error WPA3 Efficiency VoIP Disaster Recovery Data Loss Memory Miscellaneous Google Assistant Best Practice Upgrade Screen Mirroring Search BDR Safety Identity Relocation Emails Webinar Marketing Training Company Culture IT Services How To Facebook Employer Employee Relationship Health Touchscreen Sync Fraud Loyalty Mobile Vendor Management Internet exploMicrosoft Telephone Systems Identity Theft Proactive Privacy Video Games Communications Innovation Politics Business Computing Excel Smartphones Meetings Identities Applications IT solutions Windows Ink Lifestyle Automobile Computing Shadow IT Content Hard Disk Drive PowerPoint Scalability Holiday Apple Gmail Managed IT Services Employer-Employee Relationship Internet Email eWaste Retail Content Filtering Entertainment Artificial Intelligence User Tips Public Computer Data Protection Touchpad Sales FAQ Hard Drive Data Storage Spam Television Mobile Security Firewall Flexibility Devices Software as a Service Risk Management Mobile Device Physical Security Data storage Microsoft Word Chromebook Language Networking Personal Information Data Recovery Phishing Spam Blocking Bring Your Own Device WannaCry Mobile Device Management Robot Downtime Financial Technology The Internet of Things Computers Hiring/Firing Content Filter Quick Tips IoT SaaS Outsourced IT Edge Small Business Comparison Budget Files Experience Virtual Reality Root Cause Analysis Smart Tech Consultant Remote Computing Scam PDF How to Battery Tech Support Conferencing Users MSP BYOD Hackers Computer Financial Google Docs Thank You Saving Money Wasting Money Data Hard Drives Data Security Law Enforcement Cloud Computing Storage Save Time Sports Value Monitors History Charger Monitor Solid State Drive Congratulations Data Privacy Black Market Android Patch Management Recovery Hosted Solution Shortcut NFL Computer Forensics Windows 10 Security End of Support Gifts Microsoft Wireless Charging Laptop Professional Services Productivity Virtualization Worker Commute Tablets Ransomware CrashOverride Managed IT Services File Sharing Proactive IT Password Samsung Windows Instant Messaging Education Managed IT USB Redundancy Business Technology Colocation Reputation Techology Upgrades IT Support Public Cloud Managing Stress Avoiding Downtime Tip of the Week Internet of Things Mobile Devices iPhone Computer Fan Nanotechnology Electronic Medical Records Settings Regulation Adobe Legal Audit Word Passwords Document Management Managed IT Service Monitoring Communication Data Backup App Internet Exlporer Money Productivity intranet Remote Monitoring Smartphone Emergency Business Management Printing Workplace Tips Connectivity Data Theft Books Hacking Office 365 Gadgets Vulnerability Websites Licensing IT Support Rootkit WiFi Cast Work/Life Balance