Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Velocity Technology Partners can assist you in making those preparations effectively. Give us a call at (800) - 983 - 5765 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Best Practice Wireless Internet Congratulations Networking Money Data Privacy Google Drive Proactive Applications Excel Audit Google Social Engineering Microsoft Office iPhone Tip of the Week Cortana Redundancy Content Filtering Managed IT Services Lifestyle Apps Smartphones Personal Information Mobile Device Management Conferencing Backup Hardware Politics Shortcut PowerPoint Data Theft Hosted Solution Data Security Email Software Vendor Management Sports Risk Management Analysis Legislation Cybercrime Screen Mirroring Work/Life Balance History Identity Theft User Error Data Recovery Gifts Internet of Things Productivity Managed IT Business Management Charger Spam Passwords Small Business Retail Best Practices Workers Proactive IT Word Employer-Employee Relationship Security Project Management Identity Business Computing Memory Two-factor Authentication Sales IoT Data Unified Communications Spyware Browser Printing Evernote Data Management Network Security IT support Maintenance Device Security Ransomware Data Breach Gamification HBO Edge Financial Legal IT Services Computing Hackers MSP Comparison Updates Outlook Alert Telephone Internet Automation Holiday Blockchain Vulnerability Wireless Charging SaaS Licensing NFL Softphones Microsoft Sync Computer Google Docs IT budget Social Media Identities IT Support Big Data Smart Tech Government Cleaning Mobile Devices Compliance Computer Forensics Technology Gadgets Fraud Managed Service Provider The Internet of Things Windows Android Streaming Media Remote Computing Storage Virtualization Collaboration intranet Malware Tablets Travel Unsupported Software VoIp Wi-Fi Antivirus Cast Update Telephone Systems Specifications eWaste WIndows Server 2008 Application Financial Technology Managing Stress File Sharing Google Assistant Students Outsourced IT Content Filter Data Backup Network Thank You Law Enforcement Hard Drive Encryption Business Continuity Marketing Server BYOD Patch Management Microsoft Excel Data Loss Safety Hosted Solutions FAQ Privacy Chrome Apple Cloud Computing Devices Communications Disaster Recovery Cloud Tech Support Data Storage WannaCry IT Solutions VPN App Saving Money OneNote Business Tech Term IT Management Monitoring Data Protection Innovation Value Chromebook Smartphone Connectivity Efficiency Mobility Virus Adobe Office 365 Twitter Gmail Software as a Service WiFi Artificial Intelligence Websites Cybersecurity Mobile Security BDR App store Emergency Company Culture Credit Cards Management Phishing Google Maps Flexibility Ciminal Windows Ink Communication Windows 10 User Tips Commerce Language Computers Cost Management Router Operating System Remote Monitoring Wireless Technology Microsoft Word Education