Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Tuesday May 23 2017, @11:34PM   Printer-friendly
from the dear-leader-wrote-it-himself-20-years-ago dept.

Symantec and FireEye have linked the recent WannaCry ransomware attacks to North Korea:

Cybersecurity researchers at Symantec Corp. and FireEye Inc. have uncovered more evidence tying this month's WannaCry global ransomware attacks to North Korea.

The cyberattack that infected hundreds of thousands of computers worldwide was "highly likely" to have originated with Lazarus, a hacking group linked to the reclusive state, Symantec said. The software used was virtually identical to versions employed in attacks earlier this year attributed to the same agency, the company said in a report late Monday. FireEye on Tuesday agreed WannaCry shared unique code with malware previously linked to North Korea. "The shared code likely means that, at a minimum, WannaCry operators share software development resources with North Korean espionage operators," Ben Read, a FireEye analyst, said in an emailed statement.

[...] The initial attack was stifled when a security researcher disabled a key mechanism used by the worm to spread, but experts said the hackers were likely to mount a second attack because so many users of personal computers with Microsoft operating systems couldn't or didn't download a security patch released in March labeled "critical."

Also at NYT, Reuters, Ars Technica, and The Hill. Symantec blog (appears scriptwalled).

Here's a screenshot of Wana Decrypt0r 2.0. Note the Wikipedia licensing section.

Previously: Security In 2017: Ransomware Will Remain King
"Biggest Ransomware Attack in History" Hits Around 100 Countries, Disrupts UK's NHS
WannaCrypt Ransomware Variant -- Lacking Kill Switch -- Seen in Wild [Updated]
Decryption Utility for WannaCry is Released


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Tuesday May 23 2017, @11:37PM (3 children)

    by Anonymous Coward on Tuesday May 23 2017, @11:37PM (#514580)

    That thing had the most impact in Russia, a supposed Nork's ally.

  • (Score: 3, Funny) by takyon on Tuesday May 23 2017, @11:41PM (1 child)

    by takyon (881) <takyonNO@SPAMsoylentnews.org> on Tuesday May 23 2017, @11:41PM (#514583) Journal

    Their Bitcoins are as good as anybody's :D

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
    • (Score: 0) by Anonymous Coward on Wednesday May 24 2017, @12:14AM

      by Anonymous Coward on Wednesday May 24 2017, @12:14AM (#514594)

      I can just imagine the Rusky cybergoons chuckling:

      "Damn, gooks, yous pulled a doozy. Give it up - high five!"

  • (Score: 2) by Jeremiah Cornelius on Wednesday May 24 2017, @03:19PM

    by Jeremiah Cornelius (2785) on Wednesday May 24 2017, @03:19PM (#514841) Journal

    Yeah. The attribution method is dubious. It contains more NSA code than NK code. This was cobbled together from available parts.

    Symantec is done, as a trustworthy analyst. Bluecoat aquired them and went private. They peddle for various big gov customers. It's a shame, really.

    --
    You're betting on the pantomime horse...