MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

MERIT Solutions can assist you in making those preparations effectively. Give us a call at (757) 420-5150 for more information.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Business Computing Hackers Malware Software Network Security Hosted Solutions Backup google Internet Productivity Microsoft Managed IT Services Disaster Recovery Computer IT Support Business Continuity Mobile Devices Business VoIP User Tips Outsourced IT Windows 10 Innovation Email IT Services Business Management Hardware communications Productivity Mobility Windows Managed IT Data Backup Efficiency Server Ransomware Smartphone Cybercrime Mobile Device Management Cybersecurity Data Recovery Telephone Systems Small Business Apps Save Money Saving Money browser Hosted Solution Quick Tips Android Virtualization Law Enforcement Operating System Passwords Office 365 Microsoft Office Password Holiday BYOD Data BDR Chrome Money Information Technology VPN Recovery Gadgets Phishing Google Drive Hacking Avoiding Downtime Alert Health Wireless Miscellaneous Social upgrade Managed Service Provider Computers App Unsupported Software Communication Cloud Computing Social Media Facebook Work/Life Balance Budget Government Smartphones Data Management Wi-Fi Firewall Application Current Events Windows 10 Audit Vulnerability Workplace Tips Wireless Technology Personal Information Automation Managed IT Services Politics Telephony Two-factor Authentication USB Save Time Office tips Applications Private Cloud search Risk Management History Data Security Identity Theft Proactive IT Best Practice The Internet of Things Shortcut Collaboration User Error IT Support Commerce Gmail SaaS Network Sports Samsung Antivirus Cortana Update Content Filtering Battery IT solutions Hacker HaaS Solid State Drive Internet Exlporer Compliance Spam DDoS Excel Automobile Television iPhone Data Storage Social Engineering OneNote Mobile Computing Transportation Data Breach Streaming Media Apple Saving Time Cleaning Office Robot WiFi Computer Care Phone System Going Green Remote Computing Marketing Bandwidth End of Support Users Encryption Google Docs Internet of Things Artificial Intelligence Flexibility Data Protection Humor Disaster Cost Management Redundancy Employer-Employee Relationship stock Vendor Management Storage Administration Maintenance Router Chromecast How To WIndows Server 2008 Hard Disk Drive Credit Cards Benefits Tablets Root Cause Analysis tweet Colocation Patch Management Tech Support Unified Threat Management FAQ Hard Drives calculator NFL Augmented Reality Files Touchscreen Lithium-ion battery Twitter Training Entertainment Lifestyle Business Intelligence Administrator Outlook Upgrades control Electronic Medical Records Charger Point of Sale Word Access WSJ Company Culture HIPAA Legislation Relocation Managed IT Service Black Market iOS Consultant Exchange Wireless Charging altivista Smart Technology Windows Ink Distributed Denial of Service Value Comparison Avoid Downtime Evernote PDF Shadow IT Regulation Computer Fan SBS compaq Document Management Google Maps Screen Mirroring Experience Specifications Networking Text Messaging Sync Dark Web Wearable Technology hp Software as a Service Meetings Video Games Cast Emails Sales domain Workers Virtual Reality Adobe Scam Data Loss Settings Legal Music Retail remote Updates Licensing Laptop WannaCry Uninterrupted Power Supply eWaste Yahoo Employer Employee Relationship HBO Webinar Analytics Conferencing Server 2008 Keyboard Microsoft Word Instant Messaging Mobile Touchpad Running Cable Ali Rowghani Computer Accessories Worker Commute Microsoft Excel Reputation IT solutions Trending Mobile Device Big Data Gifts Advertising Managing Stress Professional Services File Sharing Scalability IT Management Data storage Windows 10s Books server installation dvd "cannot install required files" Hiring/Firing Education Travel Nanotechnology Thank You Congratulations Safety CrashOverride Emergency Worker Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...