MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

MERIT Solutions can assist you in making those preparations effectively. Give us a call at (757) 420-5150 for more information. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup Business Management google Managed IT Services Productivity Computer Disaster Recovery Microsoft IT Support Outsourced IT communications Mobile Devices VoIP Business Continuity Business User Tips Windows 10 Email IT Services Hardware Innovation Productivity Cybercrime Windows Efficiency Managed IT Data Backup Server Mobility Mobile Device Management Small Business Apps Smartphone Cybersecurity Ransomware browser Operating System Saving Money Internet of Things Data Recovery Save Money Telephone Systems Hosted Solution Quick Tips Android Virtualization Law Enforcement Passwords Microsoft Office Chrome BYOD Data Security Data BDR Money VPN Office 365 Information Technology Password Recovery Holiday Phishing Risk Management Unsupported Software Social Cloud Computing upgrade Google Drive Hacking App Work/Life Balance Avoiding Downtime Automation Communication Wi-Fi Alert Health Miscellaneous Managed Service Provider Computers Facebook IT Support Government Social Media Best Practice Update Gadgets Vulnerability Budget Wireless Smartphones Data Management Managed IT Services Social Engineering Identity Theft Data Breach Wireless Technology Flexibility search Shortcut Telephony Firewall Application Antivirus Collaboration User Error Current Events Office tips Applications Audit Private Cloud History Proactive IT Personal Information Windows 10 Politics Two-factor Authentication The Internet of Things Workplace Tips USB Spam Save Time Television Sports Data Storage Network Legal Encryption OneNote Users Tech Support Streaming Media Apple Hacker Solid State Drive Internet Exlporer WiFi Artificial Intelligence Data Loss Going Green Marketing Bandwidth iPhone Cost Management Fraud Tech Term Google Docs eWaste Mobile Computing SaaS Transportation Samsung Data Protection Robot Content Filtering Battery Redundancy HaaS Project Management End of Support Remote Computing Commerce Compliance Gmail Automobile Cortana Patch Management Disaster Humor IT solutions Saving Time DDoS Cleaning Office Employer-Employee Relationship Computer Care Phone System Excel Blockchain Scam Comparison Colocation Computer Fan Music Evernote SBS Device Security Regulation compaq Identities Google Maps Hard Drives Employer Employee Relationship Files Specifications Screen Mirroring Sync Dark Web Administrator Wearable Technology Analytics Lithium-ion battery Networking Devices hp Instant Messaging IoT Software as a Service Meetings Keyboard Emails Computer Accessories Worker Commute Sales Cast Adobe Relocation Mobile Device Access Big Data Workers domain Spyware Managing Stress Language Settings Retail Licensing WannaCry Books Updates remote Scalability Yahoo Education PDF Hiring/Firing Webinar Vendor Management Conferencing Router HBO Mobile Running Cable Microsoft Word Server 2008 How To Edge Ali Rowghani Virus Microsoft Excel Text Messaging Benefits IT solutions Trending Gifts Professional Services Unified Threat Management Ciminal Proactive File Sharing Windows 10s Training Entertainment IT Management Travel Nanotechnology Upgrades Electronic Medical Records server installation dvd "cannot install required files" Uninterrupted Power Supply stock Point of Sale Websites Storage Laptop Hard Disk Drive Company Culture HIPAA Credit Cards WIndows Server 2008 MSP Tablets Root Cause Analysis Consultant Black Market Smart Technology tweet Touchpad Reputation Value FAQ Avoid Downtime Shadow IT intranet NFL Advertising Augmented Reality calculator Twitter Document Management Lifestyle Business Intelligence Touchscreen Experience Charger control Outlook IT budget Word Data storage WSJ Legislation Managed IT Service Administration iOS Chromecast Wireless Charging Exchange Video Games Maintenance altivista Virtual Reality Windows Ink Distributed Denial of Service Cache Monitors Remote Monitoring Thank You Safety Data Theft Congratulations Emergency CrashOverride Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...