888.678.7282    Get SUPPORT

Strata Information Technology Blog

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

Bossert wrote an opinion-editorial piece for The Wall Street Journal that said:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

This isn’t exactly news, as it only took a month after the attack to associate WannaCry with a North Korean hacking group named Lazarus.

Thanks to the efforts of another hacking group, the National Security Agency lost EternalBlue, an exploit that took advantage of a critical flaw in Windows Server Message Block. WannaCry took advantage of the EternalBlue exploit to launch a worldwide malware campaign in April of 2017, infecting thousands and causing healthcare providers to shut their doors.

In response, Facebook and Microsoft formed a partnership to help fight off any future attacks like WannaCry. While they will hopefully never need to take action, it is a good thing they are preparing. Bossert has stated that North Korea has shifted its focus away from nuclear threats, turning its attention instead towards cyberwarfare to fund their other initiatives and terrorize the world.

So why should this matter to your business?

Simply put, these actions should light a fire and push you to ensure that you have a comprehensive security plan in place for your business. While most governments have staggering resources at their disposal, the proper preparations might help you to avoid at least some of the damage.

Strata Information Technology is here to assist you as you make those preparations. Call 888.678.7282 to learn more.

Tip of the Week: How ‘StarWars’ Can Compromise You...
You Can Use Cortana with Your Most-Used Applicatio...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Hackers Communications User Tips Cybersecurity Productivity Ransomware Backup Software Tech Term Business Management Smartphones Outsourced IT VoIP Efficiency Microsoft Passwords IT Support Alert Business Hardware Email Productivity Data Browser IT Services Innovation Network Social Media Google Data Backup Windows 10 Communication Small Business Data Recovery Cloud Computing Mobile Device Smartphone Microsoft Office Phishing Holiday Users Collaboration Save Money Hosted Solutions Vulnerability Data Breach Miscellaneous Android Saving Money App Bandwidth Access Control Twitter Internet of Things Business Continuity Apps Law Enforcement Workplace Tips Blockchain Patch Management Workers Office 365 Personal Information Settings Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Cybercrime Networking Politics Wireless Government Mobile Device Management Mobile Devices Wi-Fi Computer Compliance BDR Applications Facebook Recovery Marketing Antivirus Maintenance Password Retail Computers Office Website Data Security BYOD Education Medical IT Vendor Management Automation Managed IT Service SaaS Spam Dark Web Managing Stress Chrome Virus Information Remote Monitoring and Management Windows Word Virtual Assistant Connectivity How To Entertainment Sales Managed Service Provider Cost Management Streaming Media Outlook Travel Business Intelligence The Internet of Things Regulation Vulnerabilities Cleaning Printers Gadgets Budget Troubleshooting Physical Security Technology Tips Hybrid Cloud Healthcare WiFi Managed IT Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Certification HIPAA Botnet VPN Document Management Database Leadership Access Tablet Downloads Managed Service Live Streaming Reporting Computer Care VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Mobility Remote Support Hard Drive Paperless Office Tactics Knowledge Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Upgrade IT budget PowerPoint Gaming Console VoIPSavings Yahoo SSD Voice over Internet Protocol Proactive IT E-Commerce Remote Control Analytics Authentication Training Processors Digital Internet Explorer GDPR Comparison Hard Drives A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal IT Management Sports Video Games Google Maps Update Emergency Telephony DDoS Inventory Payment Threat IaaS Two-factor Authentication Authorization Dongle Worker Security Cameras Apple Edge Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Spyware Value Television Information Technology Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology instant Messaging Email Management HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer iPhone Error Data loss Gadget Safety Help Desk Telephone System WannaCry Unified Threat Management HP Biometrics Network Attached Storage Managed IT Services Hacker eCommerce Operating System Paper Telecommuting Customer Relationship Management Competition Server Management IP Address Online Shopping Environment Big Data Cryptocurrency Ink Millennials Fun Customer Service Google Drive Mobile Office IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Search Scheduling Copy Public Speaking Spam Blocking User Security Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Instagram Mobile Security Paste Augmented Reality Business Technology Laptop Printing Quick Tips Remote Computing Samsung Wireless Technology 5G Wearables Money IBM Conferencing Unified Communications

Newsletter Sign Up