MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

MERIT Solutions can assist you in making those preparations effectively. Give us a call at (757) 420-5150 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Managed IT Services Computer Mobile Devices Microsoft Disaster Recovery Outsourced IT Business VoIP Business Continuity communications IT Support Windows 10 Innovation Email User Tips Cybersecurity Hardware IT Services Data Backup Efficiency Cybercrime Windows Tech Term Managed IT Small Business Apps Server Data Recovery Ransomware Mobility Saving Money Mobile Device Management browser Productivity Data Smartphone Law Enforcement Operating System Internet of Things Telephone Systems Android Virtualization BDR Save Money Office 365 Passwords Data Security Hosted Solution Quick Tips Cloud Computing Money Phishing Smartphones Microsoft Office Password Holiday BYOD Automation Managed Service Provider Chrome Communication Information Technology VPN Recovery Network Two-factor Authentication Update Wireless Gadgets Collaboration IT Support Google Drive Risk Management Hacking Unsupported Software Avoiding Downtime Alert Health Miscellaneous upgrade Social Computers Work/Life Balance Vulnerability Cost Management App Wi-Fi Application Best Practice Social Media Data Breach Facebook Budget Government Data Management Gmail Politics Tech Support USB Cleaning Workplace Tips Save Time Data Protection Wireless Technology Identity Theft Telephony Social Engineering Streaming Media Artificial Intelligence Flexibility Shortcut Office tips Applications Private Cloud Spam History search Remote Computing Firewall Proactive IT Managed IT Services Antivirus Current Events Audit The Internet of Things User Error Compliance Employer-Employee Relationship Personal Information Devices Data Loss Automobile Marketing Value Sports Google Assistant Google Docs Saving Time IT solutions Hacker Fraud Office Internet Exlporer Solid State Drive DDoS Computer Care Phone System Redundancy Legal Encryption Commerce Television iPhone Users Mobile Computing Cortana Project Management Apple Transportation Patch Management Windows 10 Big Data Robot WiFi Going Green Education End of Support Bandwidth Vendor Management Wireless Charging Excel Router eWaste SaaS Data Storage Samsung OneNote Management Content Filtering Battery Blockchain Humor Disaster HaaS Mobile Security Black Market Settings Printing Consultant Administration stock Safety Chromecast IoT Smart Technology Retail Identity Updates Licensing Avoid Downtime WannaCry Shadow IT Colocation Spyware tweet Language Conferencing Document Management HBO Webinar Hard Drives Data Privacy Microsoft Word calculator Experience Files Mobile Microsoft Excel Lithium-ion battery Remote Monitoring Computer Forensics Twitter Administrator Gifts control IT solutions Hard Drive Professional Services Video Games File Sharing Virtual Reality PowerPoint Relocation Edge WSJ Access Virus Scam Exchange IT Management Windows 10s Nanotechnology Chromebook Distributed Denial of Service altivista Music Travel Storage Wireless Internet Ciminal Proactive Employer Employee Relationship Credit Cards SBS WIndows Server 2008 Hard Disk Drive PDF Root Cause Analysis Smart Tech compaq Analytics Tablets Instant Messaging Gamification Keyboard Text Messaging Websites Wearable Technology Computer Accessories FAQ Worker Commute Augmented Reality Connectivity Mobile Device hp NFL Lifestyle Managing Stress Business Intelligence Touchscreen Memory MSP Data Theft Charger domain Outlook Content Filter Books Word Scalability Legislation Managed IT Service Students intranet Hiring/Firing Computing Laptop remote Uninterrupted Power Supply iOS Monitoring Yahoo Windows Ink How To Benefits Comparison Unified Communications IT budget Analysis Running Cable Touchpad Evernote Server 2008 Regulation Computer Fan Unified Threat Management Reputation Maintenance Ali Rowghani Google Maps Specifications Screen Mirroring Financial Trending Advertising App store Training Networking Entertainment Sync Dark Web Meetings Financial Technology Upgrades Device Security Electronic Medical Records Software as a Service Identities Data storage Sales Point of Sale Cast Emails Company Culture Workers server installation dvd "cannot install required files" HIPAA Adobe Thank You Congratulations Cache Emergency Monitors Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...