773-635-5100    Let's Meet    Get SUPPORT

Shartega Systems Blog

Shartega Systems has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

This conclusion has been around for quite a while, as the North Korean hacking group Lazarus was first associated with WannaCry in June, a mere month after the attacks took place. As Bossert said in an opinion-editorial piece for the Wall Street Journal:

“We do not make this allegation lightly. It is based on evidence. We are not alone with our findings, either. Other governments and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

WannaCry was so effective because it leveraged a flaw in the Windows Server Message Block that was the foundation of the National Security Agency exploit EternalBlue. EternalBlue had been stolen from the NSA and released by another hacking group, the Shadow Brokers, in April. This combination managed to infect thousands of businesses around the world, and wound up shutting down healthcare organizations.

These events also spurred Microsoft to partner with Facebook to help take a stand against future attacks like WannaCry. This is a very good thing, as North Korea has--according to Bossert--shifted its focus from nuclear threats to cyber initiatives as a means of funding their other projects and creating discord around the world.

So, what does this have to do with your business?

More than anything, activities like these being leveraged by governments only reinforces the importance of ensuring that your business has a comprehensive security plan of action. While some attacks like these can’t be avoided, the damage can be mitigated with the proper preparations.

Shartega Systems can assist you in making those preparations effectively. Give us a call at 773-635-5100 for more information.

Tip of the Week: Is OneNote, or Evernote, Right fo...
There Is More to the Internet of Things Than You K...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Network Security Best Practices Software Technology Productivity Malware Hackers Business Computing Managed IT Services Cloud IT Support Disaster Recovery Outsourced IT Backup Business Continuity Google Internet Mobile Devices Windows 10 Microsoft IT Services Data Backup Managed IT Business Management Mobility Small Business Communications User Tips Data Recovery Ransomware Hosted Solutions Email Alert WIndows Saving Money Cybersecurity Save Money Smartphone Business Vulnerability Server VoIP Efficiency Law Enforcement Office 365 Mobile Device Management Hardware Android Innovation Social Media Health Phishing Cybercrime Microsoft Office Money Unsupported Software Cloud Computing Hosted Solution Firewall Chrome BDR Best Practice Information Technology Audit Apps Holiday Budget Gadgets Browser Miscellaneous Avoiding Downtime Virtualization Wireless Data Security Computer Politics Google Drive Managed Service Provider App Government Shortcut Collaboration Office tips Smartphones Quick Tips Facebook Two-factor Authentication BYOD Data Google Docs USB Data Storage The Internet of Things Cost Management Content Filtering Compliance Samsung Encryption OneNote Save Time Redundancy Social Risk Management iPhone Data Management Search Applications Cleaning Identity Theft Cortana Passwords Wireless Technology Saving Time Data Protection Marketing Work/Life Balance Operating System Computer Care Commerce HaaS Application Telephone Systems Data Breach Battery Personal Information SaaS End of Support User Error Spam WiFi Proactive IT Automobile Computers Mobile Device Avoid Downtime Conferencing Patch Management Updates Advertising Tablets Microsoft Excel Virtual Reality CrashOverride Document Management Screen Mirroring Gifts Upgrades Outlook Update Microsoft Word NFL File Sharing Internet of Things Employer-Employee Relationship Electronic Medical Records Users Cast Mobile Computing Consultant Excel Smart Technology HIPAA Humor Maintenance Word Training Meetings Storage Emergency Credit Cards Regulation Company Culture eWaste PDF Windows Ink Settings Sports FAQ Touchscreen Sync Productivity Wi-Fi Value Current Events iOS Google Maps Network Solid State Drive Lifestyle HBO Keyboard Communication Charger Adobe Office Experience Computer Fan Text Messaging VPN IT Support Legislation Hacker Education Password Wireless Charging Managed IT Services Phone System Dark Web Software as a Service Comparison Automation IT Management WannaCry Licensing Apple Black Market Artificial Intelligence Specifications Reputation IT Solutions Hacking Evernote Emails Mobile Hard Drives Shadow IT Nanotechnology Point of Sale Business Intelligence History Sales Networking Webinar Professional Services Router Data Loss Television Disaster Root Cause Analysis Managed IT Service Retail Unified Threat Management WIndows Server 2008 Antivirus Flexibility Workers IT solutions Internet Exlporer Travel Augmented Reality Tech Support Safety Scalability Windows 10s Hiring/Firing Competition Big Data Entertainment Hard Disk Drive Fun Upgrade Windows 10 Taxes Instant Messaging How To Supercomputer Presentation Video Games Device Security IT Budget Managing Stress Worker Commute Remote Computing 5G IBM Devices Scam Private Cloud Customer Relationship Management Recovery Spyware Benefits IP Address Website Legal Employer Employee Relationship Remote Monitoring Analytics Customer Service Music Mobile Office Domains Telephony Computer Accessories Books Transportation Public Speaking Workplace Tips Lithium-ion battery Vendor Management

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *