888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

Bossert wrote an opinion-editorial piece for The Wall Street Journal that said:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

This isn’t exactly news, as it only took a month after the attack to associate WannaCry with a North Korean hacking group named Lazarus.

Thanks to the efforts of another hacking group, the National Security Agency lost EternalBlue, an exploit that took advantage of a critical flaw in Windows Server Message Block. WannaCry took advantage of the EternalBlue exploit to launch a worldwide malware campaign in April of 2017, infecting thousands and causing healthcare providers to shut their doors.

In response, Facebook and Microsoft formed a partnership to help fight off any future attacks like WannaCry. While they will hopefully never need to take action, it is a good thing they are preparing. Bossert has stated that North Korea has shifted its focus away from nuclear threats, turning its attention instead towards cyberwarfare to fund their other initiatives and terrorize the world.

So why should this matter to your business?

Simply put, these actions should light a fire and push you to ensure that you have a comprehensive security plan in place for your business. While most governments have staggering resources at their disposal, the proper preparations might help you to avoid at least some of the damage.

Strata Information Technology is here to assist you as you make those preparations. Call 888.678.7282 to learn more.

Tip of the Week: How ‘StarWars’ Can Compromise You...
You Can Use Cortana with Your Most-Used Applicatio...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Business Computing Managed IT Services Cloud Technology Malware Hackers Ransomware Best Practices Productivity Communications Outsourced IT Alert Backup Cybersecurity Internet VoIP Software Phishing IT Support Business Data Breach App Android Smartphones Save Money Vulnerability Business Management Windows 10 Network Security Microsoft Passwords Microsoft Office IT Services Smartphone Office 365 Remote Monitoring Saving Money Settings Scam Politics Hardware Mobile Device Management Government Email Business Continuity Small Business Law Enforcement Workers User Tips Miscellaneous Google Social Media Excel Mobile Device Website Education Bandwidth Data Backup Hosted Solutions Efficiency Word Data Apps How To Entertainment Productivity Recovery Applications Cloud Computing Browser Patch Management Office Holiday Personal Information Retail Vendor Management Cybercrime Chrome Access Control Twitter Windows Computer Communication Marketing Data Recovery Unified Threat Management Printers Travel Cleaning Gadget Current Events WiFi Content Filtering Battery VPN Botnet Live Streaming Document Management Computer Care Shortcut Net Neutrality Telephone Systems Data Management Data Protection Gmail Disaster Recovery Automation WhatsApp Paperless Office Gaming Console CrashOverride Remote Control Yahoo Spam Dark Web DDoS Lead Generation Virus Digital Video Games Worker Two-factor Authentication Information Technology Television Google Maps Avoiding Downtime Virtual Assistant News Edge Printer Email Management Tech Support Biometrics Staffing The Internet of Things WannaCry Telephone System Maintenance Hiring/Firing Antivirus Budget Gadgets Sales Access Physical Security Leadership Managed IT Employer Employee Relationship HIPAA Blockchain Password Tablet Employer-Employee Relationship Innovation Users BYOD Files Encryption Network Collaboration Automobile Hard Drive Remote Support Computers Knowledge Company Culture Synergy Managed IT Service Analytics SaaS Scalability Processors IT budget Comparison Internet of Things Telephony Emergency IaaS Phone System Credit Cards Spyware Apple IT Management Specifications Smart Technology Multi-Factor Security Cortana Dark Data Voice over IP Printer Server Licensing HaaS Facebook Managed Service Provider HP iPhone Conferencing Hacker Cost Management eCommerce Business Intelligence Customer Relationship Management Network Attached Storage Router IP Address Online Shopping Customer Service Mobile Office Domains Wireless Charging Hard Drives File Sharing User Tip Autocorrect Mobile Devices Public Speaking Spam Blocking User Security Tip of the week Lithium-ion battery Augmented Reality Windows 10 Business Technology Remote Computing Safety Money Laptop Competition Telecommuting Managed IT Services Fun Big Data Millennials Upgrade Google Drive Virtualization Wireless IT Support Hosted Solution Search Server Wi-Fi Scheduling Presentation Copy Emoji 5G Instagram Wireless Technology VoIP Paste Samsung IBM Tech Terms

Newsletter Sign Up