Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Velocity Technology Partners can assist you in making those preparations effectively. Give us a call at (800) - 983 - 5765 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Hosted Solutions Communications Data Storage Holiday Conferencing Cloud Law Enforcement Wi-Fi Gifts Comparison Backup iPhone Sync Commerce Tip of the Week Cybercrime Spam Collaboration Apple Microsoft Unsupported Software Chrome The Internet of Things BYOD Network Security Congratulations Managed Service Provider Excel Marketing WIndows Server 2008 Data Protection Mobile Devices Google Google Maps Email Phishing Work/Life Balance Passwords Cortana Apps Microsoft Excel History Gadgets Data Recovery NFL Identity Theft Vulnerability File Sharing Virtualization Updates Risk Management Adobe Lifestyle FAQ VoIp Wireless Charging Sports Hardware Retail Specifications Two-factor Authentication Data Management OneNote Audit IT Management Alert Malware Google Docs Windows 10 IT Services Patch Management Content Filtering Thank You Artificial Intelligence Credit Cards Networking Internet Managed IT Licensing Google Drive Managed IT Services Maintenance Computer Security Politics Business Management Social Media Server Microsoft Word Telephone Systems Outsourced IT Technology Money Data Loss Screen Mirroring Small Business Business Continuity SaaS Sales WiFi Software Mobile Device Management IT support Mobility Saving Money Evernote User Error Legislation Cast Data Breach Shortcut Data Security Android Travel Microsoft Office Outlook Best Practice Word Cybersecurity Browser Charger Computers Privacy Emergency Disaster Recovery Productivity VPN Workers Applications Redundancy Hackers Office 365 App Tablets Proactive IT Government Windows Ink IT Solutions Hosted Solution Smartphones Personal Information IT Support Best Practices Encryption User Tips Software as a Service WannaCry eWaste HBO Smartphone Windows Data Backup Cloud Computing Wireless Technology Storage

Blog Archive

February
March
April
May
June
July
August
September
October
November
December