Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Eclipse Integrated Systems can assist you in making those preparations effectively. Give us a call at 800-340-0505 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Internet Business Computing Malware Software Google Business Management Network Security Microsoft Windows 10 Computer Innovation User Tips Backup Hosted Solutions Productivity Productivity Business Apps Email Windows Cybercrime Efficiency Hardware Mobile Devices Cybersecurity Smartphone Law Enforcement Operating System Virtualization Disaster Recovery Browser Ransomware Android Managed IT Services Small Business Business Continuity IT Support Data Security VoIP Telephone Systems Mobile Device Management Money Phishing Miscellaneous Passwords Mobility Holiday Office 365 Smartphones Server Quick Tips Microsoft Office Data Backup communications Internet of Things Chrome Cloud Computing Tech Term Google Drive Wi-Fi Application Unsupported Software Saving Money Wireless Update Communication Outsourced IT IT Services Collaboration Password Best Practice Risk Management Data Recovery Workplace Tips Gadgets Social Vulnerability Health Information Technology App Government Two-factor Authentication Upgrade Work/Life Balance Data Management Facebook Antivirus Data Managed Service Provider Current Events Politics IT Support Computers Hacking Managed IT Save Money Spam User Error Windows 10 Office tips BDR USB Shortcut Identity Theft Alert Social Media Flexibility Audit Hosted Solution History DDoS Mobile Computing End of Support Computer Care Cortana Private Cloud Sports Proactive IT Recovery HaaS Office Automation Tech Support Network Fraud Personal Information Cleaning Cost Management Patch Management Transportation Internet Exlporer Going Green Wireless Technology Apple Battery Encryption Save Time eWaste WiFi Excel VPN Humor Telephony Commerce Streaming Media Bandwidth Automobile Social Engineering Remote Computing Mobile Security iPhone Television Google Docs Data Storage Blockchain Users OneNote Samsung Artificial Intelligence Employer-Employee Relationship Legal Search Data Protection Meetings Managed IT Services The Internet of Things File Sharing Books Language Touchscreen Benefits IT Management Settings Device Security Company Culture Router Licensing Data storage Scalability Storage Electronic Medical Records Computer Fan FAQ Smart Technology IT Solutions Trending Administrator Devices Travel Lithium-ion battery Emails How To Safety Distributed Denial of Service Bluetooth Virus WannaCry Charger Access Marketing Spyware Tablets Webinar Legislation Fax Server Proactive Wireless Charging Advertising WIndows Server 2008 Virtual Reality Entertainment NFL IT solutions Comparison Reputation Files Websites Nanotechnology Data Breach Scam Education Gmail Laptop Wearable Technology Edge Mobile Device Word Windows 10s Black Market Specifications Data Theft Root Cause Analysis Evernote Employer Employee Relationship Outlook Robot Experience Touchpad Ciminal Windows Ink Solid State Drive Sales Cast Computing Augmented Reality Networking Computer Accessories PDF Point of Sale Phone System Running Cable Project Management SaaS Google Maps App store Hard Disk Drive Instant Messaging Retail Hacker BYOD SharePoint Workers Text Messaging Sync Data Loss Music Operating Sysytem Uninterrupted Power Supply IT budget Unified Threat Management Managing Stress Conferencing Keyboard Budget Updates Vendor Management Analytics Avoiding Downtime Upgrades Video Games Identity Gifts HBO Chromecast Teamwork Microsoft Word Adobe Microsoft Excel Big Data Screen Mirroring Identities Consultant Data Privacy iOS Credit Cards Hiring/Firing Maintenance Training Applications Worker Commute Disaster Hard Drive Cache Remote Monitoring Emergency Monitors Worker Relocation CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login