croom new

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Eclipse Integrated Systems can assist you in making those preparations effectively. Give us a call at 800-340-0505 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
5 Ways to Reduce Technology-Related Stress in the ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Google Business Management Internet Malware Software Microsoft Computer Backup Windows 10 Innovation Hosted Solutions User Tips Productivity Business Apps Cybersecurity Tech Term Productivity Windows Mobile Devices Email Efficiency Managed IT Services Hardware Cybercrime Smartphone communications Disaster Recovery VoIP Saving Money Operating System Law Enforcement Small Business Virtualization Browser Internet of Things Smartphones Ransomware Data Recovery Collaboration Business Continuity Android IT Support Data Security Data Backup Wireless Quick Tips Phishing Money Microsoft Office Telephone Systems Mobile Device Management Mobility Communication Miscellaneous Passwords Chrome Holiday IT Support Workplace Tips Office 365 Server Outsourced IT Update Cost Management Cloud Computing IT Services Employer-Employee Relationship Password Social Media Government Best Practice Google Drive Vulnerability Social Unsupported Software Network Wi-Fi Data Health Risk Management Application App BDR Gadgets Information Technology Managed IT Alert Identity Theft Users Computers Two-factor Authentication Upgrade Politics Hacking Spam Data Management Windows 10 Managed Service Provider Save Money Work/Life Balance Sports Facebook Shortcut Streaming Media Office tips Current Events USB User Error Artificial Intelligence Antivirus Patch Management Search Audit Transportation Data Protection Save Time Maintenance Company Culture Internet Exlporer Wireless Technology The Internet of Things Flexibility Hosted Solution Commerce Encryption Meetings Router Computer Care Going Green Excel Networking History End of Support Battery Apple VPN Social Engineering Devices Telephony Humor eWaste Cortana Private Cloud Mobile Computing DDoS Proactive IT Office WiFi Remote Computing iPhone Managing Stress HaaS Cleaning Samsung OneNote Recovery Wireless Charging Automobile Bandwidth Google Docs Blockchain Automation Fraud Personal Information Mobile Security Gmail Television Managed IT Services Tech Support Data Storage Legal Credit Cards Virtual Reality Google Assistant Benefits Word Edge Analytics Bring Your Own Device Identity Solid State Drive Teamwork Applications Entertainment Business Intelligence Settings Laptop Screen Mirroring Specifications Black Market Electronic Medical Records Outlook Evernote Connectivity Computer Accessories Augmented Reality File Sharing Language Websites Amazon IT Management Education Value Smart Technology Computer Fan Robot Windows Ink Ciminal Big Data Hybrid Cloud SaaS Data Privacy Hacker Hard Disk Drive Licensing Device Security Unified Communications Wearable Technology Touchpad Cast Sales Safety Emails Trending PDF Worker Commute Downloads Data storage Storage Scalability Data Theft Virtual Assistant IT Solutions FAQ WannaCry Lithium-ion battery Google Maps Project Management Books Managed IT Service Unified Threat Management Instant Messaging Hard Drive Keyboard Administrator Travel Experience RAM BYOD Retail Webinar Sync Workers Text Messaging Trends Vendor Management How To Computing Charger Point of Sale Internet Explorer Data Loss IT budget Cables Upgrades Chromebook Access Tablets Spyware Phone System Microsoft Teams Running Cable Uninterrupted Power Supply Operating Sysytem Conferencing IT solutions SharePoint Budget Updates A.I. Legislation App store Bluetooth Distributed Denial of Service WIndows Server 2008 Advertising Threat Scam Nanotechnology Video Games Virus Voice over Internet Protocol Consultant Printing Hiring/Firing iOS NFL Music G Suite Mobile Device Avoiding Downtime HBO Gifts Windows 10s Chromecast Adobe Microsoft Word Movies Training Marketing Comparison Reputation Touchscreen Fax Server Files Data Breach PowerPoint Employer Employee Relationship Root Cause Analysis Microsoft Excel Identities Proactive Information Disaster Cache Twitter Relocation Remote Monitoring Emergency CrashOverride Plug-In Monitors Remote Monitoring and Management Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login