Tag Archives: wannacry

Update 2: UK & US blame North Korea for WannaCry – ‘directly responsible’

Update 2: UK US blame North Korea for WannaCry – ‘directly responsible’

North Korea was behind the WannaCry ransomware that blazed a destructive path around the world last spring, wreaking havoc on hospitals, the financial sector, FedEx, and companies of all stripes, a high-ranking adviser in the US Trump administration said Monday.

Then today (19/12/2018) the UK Foreign Office Minister Lord Ahmad of Wimbledon backed up the assertions, also attributing the WannaCry ransomware incident to North Korean actors the Lazarus Group. “The decision to publicly attribute this incident sends a clear message that the UK and its allies will not tolerate malicious cyber activity,” said the government release.

After the UK National Health service was severely impacted by Wannacry, the UK led the international investigation, and within weeks, in May 2017, the UK National Cyber Security Centre (NCSC) attributed the attack to North Korea.

The WannaCry ransomware incident impacted

Read more at: https://www.scmagazineuk.com/news/update-2-uk-us-blame-north-korea-for-wannacry--directly-responsible/article/719499/

UK names North Korean cyber crime group as WannaCry attack culprits

Britain has publicly named the shadowy North Korea cyber crime group it believes was responsible for the WannaCry ransomware attack which crippled parts of the NHS.

The Foreign Office said the National Cyber Security Centre had assessed that it was “highly likely” the attack in May was the work of cyber criminals known as the Lazarus Group.

[Read more: Experts question North Korea role in WannaCry cyber attack]

Security minister Ben Wallace has previously said the Government believed “quite strongly” that a foreign state was behind the attack, naming North Korea as the

Read more at: http://home.bt.com/tech-gadgets/tech-news/wannacry-north-korea-us-cyberattack-nhs-11364238021418

UK names North Korean cyber crime group as WannaCry attack culprits

Press Association

Britain has publicly named the shadowy North Korea cyber crime group it believes was responsible for the WannaCry ransomware attack which crippled parts of the NHS.

The Foreign Office said the National Cyber Security

Read more at: http://www.dailymail.co.uk/wires/pa/article-5193635/US-North-Korea-directly-responsible-global-WannaCry-attack-hit-NHS.html

North Korea is ‘directly responsible’ for global WannaCry attack, according to US

Britain has publicly named the shadowy North Korea cyber crime group it believes was responsible for the WannaCry ransomware attack which crippled parts of the NHS.

The Foreign Office said the National Cyber Security Centre had assessed that it was “highly likely” the attack in May was the work of cyber criminals known as the Lazarus Group.

Security minister Ben Wallace has previously said the Government believed “quite strongly” that a foreign state was behind the attack, naming North Korea as the main suspects.

In the latest statement, Foreign Office minister Lord Ahmad of Wimbledon

Read more at: http://home.bt.com/tech-gadgets/tech-news/wannacry-north-korea-us-cyberattack-nhs-11364238021418

US: North Korea `directly responsible´ for global WannaCry attack that hit NHS

Press Association

Britain has publicly named the shadowy North Korea cyber crime group it believes was responsible for the WannaCry ransomware attack which crippled parts of the NHS.

The Foreign Office said the National Cyber Security

Read more at: http://www.dailymail.co.uk/wires/pa/article-5193635/US-North-Korea-directly-responsible-global-WannaCry-attack-hit-NHS.html

US Publicly Blames North Korea For the WannaCry Ransomware Attack

Photo: AP

President Donald Trump’s homeland security adviser, Tom Bossert, claimed that North Korean hackers were behind this year’s massive, global WannaCry ransomware attack on Monday evening in a Wall Street Journal editorial.

Beginning in May 2017, the WannaCry malware spread rapidly across computer systems across the globe, allegedly aided by leaked National Security Agency technology. The software locked users’ computer systems and demanded ransoms in Bitcoin, generating an embarrassingly small amount of actual cryptocurrency ransom but leaving a digital paper trail a mile wide. The attack was eventually slowed down due to an amateurish mistake in WannaCry’s code that exposed its kill switch, though updated versions of the malware are still circulating.

Security firms tentatively concluded WannaCry’s creators were “fluent in Chinese” based

Read more at: https://gizmodo.com/us-publicly-blames-north-korea-for-the-wannacry-ransomw-1821409962

How to prepare for the next WannaCry – CSO | The Resource for …

In May the WannaCry ransomware attack wreaked worldwide havoc, infecting and paralysing 230,000 computers across 150 countries. While the size of the attack reached record levels, it was its execution that set it apart from other cyber attacks. It didn’t force down the front door with a crushing distributed denial of service (DDoS) attack. 

It didn’t poke and probe repeatedly until it found a chink in the security armour. Instead, WannaCry quietly targeted an obscure vulnerability in outdated Microsoft Windows operating systems.

One month later, the Petya and NotPetya ransomware attacks appeared, affecting computers in more than 65 countries, once again by targeting a preventable and patchable software vulnerability. Versions of the ransomware are reportedly available on thedarknet for distribution with an attractive 85/15 revenue split for the entrepreneurial cybercriminal, marking a disturbing new trend: ransomware-as-a-service.

Ransomware is now the most downloaded malware in the APAC in

Read more at: https://www.cso.com.au/article/631205/how-prepare-next-wannacry/

How to prepare for the next WannaCry

In May the WannaCry ransomware attack wreaked worldwide havoc, infecting and paralysing 230,000 computers across 150 countries. While the size of the attack reached record levels, it was its execution that set it apart from other cyber attacks. It didn’t force down the front door with a crushing distributed denial of service (DDoS) attack. 

It didn’t poke and probe repeatedly until it found a chink in the security armour. Instead, WannaCry quietly targeted an obscure vulnerability in outdated Microsoft Windows operating systems.

One month later, the Petya and NotPetya ransomware attacks appeared, affecting computers in more than 65 countries, once again by targeting a preventable and patchable software vulnerability. Versions of the ransomware are reportedly available on thedarknet for distribution with an attractive 85/15 revenue split for the entrepreneurial cybercriminal, marking a disturbing new trend: ransomware-as-a-service.

Ransomware is now the most downloaded malware in the APAC in

Read more at: https://www.cso.com.au/article/631205/how-prepare-next-wannacry/

WannaCry ransomware: Hospitals were warned to patch system to protect against cyber attack – but didn’t

istock-459246447.jpg

The UK’s National Health Service was one of the most high-profile victims of the WannaCry ransomware attack.


Image: Getty

The National Health Service was left vulnerable to the WannaCry ransomware attack because, despite warnings to trusts to patch systems, many local organisations had failed to do so.

A National Audit Investigation

Read more at: http://www.zdnet.com/article/wannacry-ransomware-hospitals-were-warned-to-patch-system-to-protect-against-cyber-attack-but-didnt/

WannaCry, NotPetya and the New Age of Cyber Warfare

WannaCry, NotPetya and the New Age of Cyber Warfare

WannaCry and NotPetya marked a turning point in cyber warfare — one that demands a different response from conventional malware threats.

Here we see old-school worm outbreaks, the type that plagued networks in the late 1990s and early 2000s, combined with modern payloads designed to steal money and disrupt government systems.

We don’t know exactly what drives the re-emergence of worms outbreaks, but I believe we’re witnessing the testing of early prototypes for cyber warfare development programs. It’s similar to detecting underground nuke tests, like those we see in North Korea.

If that is indeed what’s going on, every industrial sector and global economy must take notice and start adapting.

Lessons of Code Red and Nimda

I started my tour at DARPA in 2002, not long after the Code Red and Nimda worms were unleashed on the world,

Read more at: https://www.scmagazine.com/wannacry-notpetya-and-the-new-age-of-cyber-warfare/article/701209/