Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

Bossert wrote an opinion-editorial piece for The Wall Street Journal that said:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

This isn’t exactly news, as it only took a month after the attack to associate WannaCry with a North Korean hacking group named Lazarus.

Thanks to the efforts of another hacking group, the National Security Agency lost EternalBlue, an exploit that took advantage of a critical flaw in Windows Server Message Block. WannaCry took advantage of the EternalBlue exploit to launch a worldwide malware campaign in April of 2017, infecting thousands and causing healthcare providers to shut their doors.

In response, Facebook and Microsoft formed a partnership to help fight off any future attacks like WannaCry. While they will hopefully never need to take action, it is a good thing they are preparing. Bossert has stated that North Korea has shifted its focus away from nuclear threats, turning its attention instead towards cyberwarfare to fund their other initiatives and terrorize the world.

So why should this matter to your business?

Simply put, these actions should light a fire and push you to ensure that you have a comprehensive security plan in place for your business. While most governments have staggering resources at their disposal, the proper preparations might help you to avoid at least some of the damage.

Out of the Box Solutions is here to assist you as you make those preparations. Call 800-750-4OBS (4627) to learn more.

Tip of the Week: How ‘StarWars’ Can Compromise You...
You Can Use Cortana with Your Most-Used Applicatio...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Hardware Cybersecurity Network Security Internet Ransomware Business Computing Technology Email Wi-Fi Applications Malware Smartphones Android Data Wireless Charging Employer-Employee Relationship Managed IT services Small Business VPN IT Services Business Data Management Communications Outsourced IT Mobile Devices Tech Terms Cortana Microsoft Passwords Windows 10 IT Support Cloud Computers Save Money Backup Remote Computing Saving Money Staff Office Technology Tips Telecommuting Business Management Vulnerability Office 365 Artificial Intelligence Knowledge Analytics Virtualization Cloud Computing Content Filtering Spyware Data Backup Telephony Machine Learning Gmail Business Intelligence Server Websites HP Backup and Disaster Recovery Workers IT Management VoIp Voice over IP User Tips Big Data Safety Hard Drives Millennials Holiday Lead Generation Networking SSD Business Technology eCommerce Telecommute Patch Management Document Management Dongle Managed IT Services Physical Security Social Media Virtual Assistant Facebook Productivity Network Attached Storage Paperless Office Online Shopping Smartphone Bandwidth Tip of the week Laptop Twitter Phishing Password Digital Data loss Comparison Government User Tip Innovation WannaCry Data Breach Efficiency Browser Software Settings Spam Specifications BDR Blockchain Marketing HIPAA Server Management Sales Edge Wireless Virus Hard Drive Managed IT Service Communication Tablet Battery Antivirus Conferencing Hackers IT budget Processors Excel Automation Computer Gadgets Users Inventory Data Protection Data recovery Mobile Security