croom new

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Eclipse Integrated Systems can assist you in making those preparations effectively. Give us a call at 800-340-0505 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Hackers Internet Malware Business Management Software User Tips Microsoft Productivity Hosted Solutions Tech Term Computer Innovation Efficiency Backup Windows 10 Cybersecurity Browser Productivity Business Apps Managed IT Services Windows Mobile Devices Saving Money Smartphones Email Small Business VoIP Hardware Communication Virtualization Cybercrime Smartphone Data Recovery Workplace Tips communications Data Backup Law Enforcement Android Collaboration Operating System Disaster Recovery Internet of Things Passwords Data Security IT Support Microsoft Office Business Continuity Ransomware Miscellaneous Server Holiday Mobility Update Gadgets Cloud Computing Network Users IT Support Social Media Mobile Device Management Telephone Systems Office 365 BDR Wireless Phishing Data Quick Tips Chrome Money Application Risk Management Information Technology App Windows 10 Vulnerability Unsupported Software Cost Management Password Best Practice Employer-Employee Relationship Wi-Fi Mobile Device Health Government Google Drive Outsourced IT Social IT Services Politics Spam Bandwidth User Error Alert Proactive IT Managed Service Provider Computers Work/Life Balance Blockchain Shortcut Facebook Hacking Upgrade Office tips Current Events Data Management Patch Management Managed IT Services USB Artificial Intelligence Antivirus Save Money Sports Managed IT Two-factor Authentication Identity Theft Streaming Media Automation Tech Support Router Gmail Encryption Devices Cortana Mobile Security History Information Television Marketing Transportation End of Support Battery Internet Exlporer The Internet of Things Office Wireless Technology Private Cloud Business Intelligence Google Docs Wireless Charging Hosted Solution Cleaning HaaS Samsung OneNote iPhone Managing Stress Fraud Data Storage Compliance VPN Automobile Meetings Telephony Humor Personal Information Going Green Data Protection Social Engineering Touchscreen Apple Maintenance Remote Computing Audit Legal Save Time eWaste Analytics Company Culture Search Recovery Mobile Computing DDoS WiFi Storage Flexibility Excel Networking SaaS Commerce Computer Care Safety Emails Bluetooth Distributed Denial of Service BYOD Retail Printing Medical IT Chromecast Travel G Suite PDF Worker Commute Analysis WannaCry Files Scalability Sync Workers Movies Unified Threat Management Data Loss IT budget Proactive Keyboard Books Charger PowerPoint Authentication Webinar Fax Server Laptop Experience Conferencing Google Assistant GDPR Vendor Management Instant Messaging Tablets Spyware Bring Your Own Device Text Messaging Legislation Identity Managed Service How To Updates Upgrades Point of Sale Websites Amazon Teamwork WIndows Server 2008 Connectivity Authorization Robot IT solutions Touchpad Phone System HBO Gifts Value Dark Web NFL Hybrid Cloud Consultant Data storage Comparison Data Privacy Scam Nanotechnology Trending Adobe Microsoft Word Unified Communications Advertising Wearable Technology Microsoft Excel Identities Data Theft Virtual Assistant Hiring/Firing iOS Video Games Data Breach Downloads Lithium-ion battery Managed IT Service Windows 10s Music Credit Cards Error Training Administrator Word Edge Screen Mirroring Specifications Hard Drive Employer Employee Relationship Root Cause Analysis Reputation Applications RAM File Sharing Language Computing Plug-In Benefits Outlook Evernote Trends Troubleshooting Cables Solid State Drive Uninterrupted Power Supply Operating Sysytem IT Management Internet Explorer Microsoft Office 365 Settings Access Virtual Reality Windows Ink Ciminal Electronic Medical Records Entertainment Cast Sales Chromebook Reporting Computer Accessories Augmented Reality Budget Black Market Licensing Device Security Microsoft Teams Running Cable App store Remote Monitoring and Management Smart Technology Computer Fan A.I. Google Maps Project Management Virus Voice over Internet Protocol Hacker Hard Disk Drive SharePoint Avoiding Downtime Big Data IT Solutions FAQ Threat Access Control Education Remote Monitoring Emergency CrashOverride Relocation Monitors Disaster Printers Worker Twitter Regulation Cache

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login