Velocity Technology Partners Blogs

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Velocity Technology Partners can assist you in making those preparations effectively. Give us a call at (800) - 983 - 5765 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Financial Technology Updates Thank You Mobile Security Mobility Edge Wi-Fi Cloud Computing Gadgets Softphones App Data Security Congratulations Devices Managed IT Efficiency Outlook Hackers Value Tablets Artificial Intelligence Big Data iPhone Passwords Charger Wireless Charging Redundancy Smartphone Email Gifts Best Practice Operating System Two-factor Authentication Marketing Virtualization Streaming Media Word Google Assistant Shortcut Android Maintenance Cost Management Commerce Apps Collaboration Business Privacy Microsoft Excel Tip of the Week Network Security Software as a Service Networking WiFi Travel Automation PowerPoint Twitter Business Continuity WannaCry Comparison FAQ Computers Analysis Business Computing Managed IT Services Unsupported Software User Tips Fraud Excel Managing Stress Identity Theft Technology Identities Gmail Remote Computing Windows Ink User Error Patch Management Saving Money Mobile Device Management Credit Cards Alert Productivity Google Maps Lifestyle Data Loss Chrome Telephone Cast Wireless Technology Cybercrime Wireless Internet Virus IT Management Screen Mirroring Computer Sales eWaste Hard Drive Bring Your Own Device Sports Managed IT services Cloud Google Docs Cleaning Licensing Application Content Filtering Apple Language WIndows Server 2008 Computer Forensics The Internet of Things Google Management Social Media BDR Business Management Identity MSP Unified Communications Communication Google Drive IT Solutions Education Project Management Backup Microsoft Word Adobe IoT Data Privacy Safety Phishing Vendor Management Microsoft Office Financial Internet of Things Memory Specifications Flexibility Proactive Personal Information Data Backup Smartphones Windows 10 Network Software VoIp Students Cortana IT budget Security Government Work/Life Balance SaaS Malware Social Engineering Applications Data Theft OneNote Content Filter Spam Best Practices Regulation Office 365 IT support Communications Small Business Smart Tech Storage Monitoring Data Server Windows Law Enforcement History Data Management Employer-Employee Relationship Emergency Websites Audit IT Services Outsourced IT Tech Support Ransomware Antivirus Spyware Data Protection Proactive IT Legislation Conferencing Data Storage Managed Service Provider NFL Data Breach Ciminal Internet Gamification Vulnerability Hosted Solution Mobile Devices Encryption Cybersecurity Data Recovery HBO Device Security intranet Retail Company Culture Workers Legal Disaster Recovery Blockchain Computing App store Innovation VPN Hosted Solutions IT Support Compliance Politics Risk Management Microsoft Holiday Printing File Sharing Telephone Systems Browser Sync Remote Monitoring BYOD Tech Term Router Update Hardware Evernote Chromebook Money Connectivity Hybrid Cloud