888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

Bossert wrote an opinion-editorial piece for The Wall Street Journal that said:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

This isn’t exactly news, as it only took a month after the attack to associate WannaCry with a North Korean hacking group named Lazarus.

Thanks to the efforts of another hacking group, the National Security Agency lost EternalBlue, an exploit that took advantage of a critical flaw in Windows Server Message Block. WannaCry took advantage of the EternalBlue exploit to launch a worldwide malware campaign in April of 2017, infecting thousands and causing healthcare providers to shut their doors.

In response, Facebook and Microsoft formed a partnership to help fight off any future attacks like WannaCry. While they will hopefully never need to take action, it is a good thing they are preparing. Bossert has stated that North Korea has shifted its focus away from nuclear threats, turning its attention instead towards cyberwarfare to fund their other initiatives and terrorize the world.

So why should this matter to your business?

Simply put, these actions should light a fire and push you to ensure that you have a comprehensive security plan in place for your business. While most governments have staggering resources at their disposal, the proper preparations might help you to avoid at least some of the damage.

Strata Information Technology is here to assist you as you make those preparations. Call 888.678.7282 to learn more.

Tip of the Week: How ‘StarWars’ Can Compromise You...
You Can Use Cortana with Your Most-Used Applicatio...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 28 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Privacy Managed IT Services Cloud Technology Best Practices Malware Hackers Ransomware Communications Internet Outsourced IT Alert Backup Cybersecurity Productivity VoIP Software Business Business Management Network Security Microsoft Passwords Phishing Smartphones Hardware Save Money IT Support Vulnerability Social Media Windows 10 Twitter IT Services Smartphone Data Breach Android App Email Workers Miscellaneous User Tips Google Excel Cybercrime Microsoft Office Office 365 Remote Monitoring Saving Money Settings Scam Politics Mobile Device Management Bandwidth Data Backup Government Business Continuity Data Small Business Law Enforcement Cloud Computing Browser Password Patch Management Blockchain Office Employer-Employee Relationship Holiday Personal Information Retail Computers Vendor Management Chrome Internet of Things Access Control Wi-Fi Windows Computer Communication Facebook BDR Data Recovery Mobile Device Website Education Spam Virus Hosted Solutions Efficiency Word Apps How To Entertainment Recovery Applications Productivity Maintenance Antivirus Managed IT Access Physical Security Leadership Employer Employee Relationship HIPAA Users Tablet Staff Innovation Encryption BYOD Files Network Collaboration Automobile Hard Drive Remote Support Knowledge Websites Company Culture Synergy Wireless Managed IT Service e-waste Analytics SaaS IT budget Scalability Processors PowerPoint Comparison Networking IaaS Phone System Telephony disposal Emergency Apple IT Management Credit Cards Spyware Sports Dark Data Specifications Dongle Smart Technology Multi-Factor Security Cortana HaaS Voice over IP Value Printer Server Licensing iPhone Tech Terms Managed Service Provider HP Connectivity Marketing Unified Threat Management Cleaning Gadget Cost Management Tech Term Printers Travel WiFi Current Events Botnet Content Filtering Technology Tips Router Battery VPN Computer Care Shortcut Database Live Streaming Document Management Data Protection Net Neutrality Telephone Systems Data Management Gmail Backup and Disaster Recovery Disaster Recovery Gaming Console CrashOverride Wireless Charging Tactics Automation WhatsApp Paperless Office Remote Control Hard Drives Yahoo SSD Dark Web DDoS Video Games Mobile Devices Lead Generation Internet Explorer Digital Worker Two-factor Authentication Inventory Information Technology Television Google Maps Avoiding Downtime Virtual Assistant Threat News Edge Printer Email Management Tech Support Safety Biometrics Staffing The Internet of Things WannaCry Telephone System Gadgets Sales Data loss Hiring/Firing Budget Competition Telecommuting Operating System Managed IT Services Fun Big Data Paper Millennials Environment Upgrade Ink Google Drive Virtualization IT Support Hosted Solution Search Server Scheduling Presentation Copy Emoji VoIP 5G Instagram Wireless Technology Paste Samsung IBM Hacker Conferencing eCommerce Network Attached Storage Business Intelligence Customer Relationship Management Streaming Media IP Address Online Shopping Server Management Customer Service Downloads Mobile Office Domains File Sharing Artificial Intelligence Trends Autocorrect User Tip Public Speaking User Security Machine Learning Spam Blocking Lithium-ion battery Tip of the week Windows 10 Augmented Reality Business Technology Telecommute Money Remote Computing Mobile Security Printing Laptop

Newsletter Sign Up