Threat Intelligence
5/25/2017
01:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows

But a Chinese-language link doesn't shoot down theories of the North Korean Lazarus Group's involvement in the ransomware worm attacks, say language experts at Flashpoint.

A linguistic analysis of the ransom notes used in the WannaCry ransomware attacks shows a Chinese-speaking author was behind the original blackmail message.

Language experts at Flashpoint who conducted the analysis say these findings do not, however, contradict research findings by Symantec, Kaspersky Lab, BAE, and others, that WannaCry ransomware worm is the handiwork of the infamous North Korean Lazarus Group hackers.

"Our findings don't necessarily contradict a link to Lazarus. This is just an added data point in the attribution bubble. We don't know a helluva lot about the Lazarus Group so it's entirely possible, if our analysis is correct, there are Chinese speakers in that group" involved in WannaCry, says Jon Condra, director of Asia Pacific research for Flashpoint. That means they could be native speakers or people who speak Chinese as well as their native tongue.

Symantec this week doubled down on its theory that the epic WannaCry ransomware worm was the handiwork of hackers out of North Korea, but with the caveat that it was not a state-sponsored campaign. WannaCry infected some 230,000 machines in 150 countries yet generated only about $110,000 in ransom since its launch on May 12. Other researchers, including from Google, Kaspersky Lab, and BAE Systems, also suspect Lazarus Group connections, while other security firms say it's too soon for any attribution.

Getting a view into North Korea's cyber machine is difficult since the nation is so isolated and cloaked, especially online, but experts long have theorized that North Korea has hackers operating out of other countries such as China to mask their activities or to throw off investigators.

Condra says it's known that North Koreans often travel abroad, including to China, and speak the language there as well. North Korean hackers are believed to operate out of China, especially in the northeast region of the country, he says, as well as now increasingly in Malaysia and Southeast Asia. "It's very likely somebody within Lazarus or an affiliate who knows somebody [in Lazarus]" worked on WannaCry, he says.

Other security experts have noted that North Korea's cyber operations spread beyond its borders. John Bambenek, manager of threat intelligence systems for Fidelis Cybersecurity, says North Korea's state-sponsored cyber operations are effective because "they don't operate in" North Korea.

One twist that has Flashpoint's Condra and his team baffled, however, is that the Korean-language ransom note is poorly written syntactically, with very basic errors and incorrect grammar structure. "Why is the Korean [language] so butchered? That's a question in itself. Why would they go to such lengths to obfuscate Korean and make it look non-native, but not change the infrastructure [Lazarus Group] behind the attack?"

Flashpoint studied the 28 different ransom notes found in the WannaCry attacks, which were written in 27 different languages. There were two notes in Chinese, one in so-called simplified characters and the other, so-called traditional characters. They found that the two Chinese ransom notes were more detailed and appeared to be handcrafted, while the others likely had been generated from an English-language written note to the other languages, which include Bulgarian, French, German, Italian, Japanese, Korean, Russian, Spanish, Vietnamese, and others.

"Flashpoint assesses with high confidence that the author(s) of WannaCry’s ransomware notes are fluent in Chinese, as the language used is consistent with that of Southern China, Hong Kong, Taiwan, or Singapore. Flashpoint also assesses with high confidence that the author(s) are familiar with the English language, though not native. This alone is not enough to determine the nationality of the author(s)," the researchers wrote in a report published today.

Condra explains the clues they found as compelling. "The Chinese ransom notes were substantially different," he says. "They had five or six different colloquial sayings that don't show up in the other notes," for example, he adds.

The clauses, "Right, I forgot to tell you," and "Even the coming of God can't restore these documents," were unique to those notes, he says. "These are little minor things in there that add flavor or color that doesn't exist in the other languages'" notes, he says.

He believes the Chinese ransom notes were hand-typed rather than translated via Google Translator or another application. "They made a typo that a machine translator would not have made," he says.

The English version of the ransom note, meanwhile, also read smoothly, as if someone crafting it spoke the language and it wasn't generated via a translator program. Flashpoint says that note was likely used as the base for auto-translating to the other languages (with the exception of the Chinese notes). Flashpoint found a 96%-plus overlap between the English ransom note and all other ransom notes, with the exception of the Chinese-language ones.

The English ransom note used correct spelling and capitalization, for example, but there were clues it wasn't written by a native speaker, according to the study. The author incorrectly used the word "couldn't" instead of "can't," in a sentence, for example, and used a clause with the incorrect word order: "You have not so enough time." Condra says these patterns could have been intentional as a false flag, for example.

Flashpoint says it has "moderate confidence" the authors have English-language familiarity and "are likely to have based the English ransomware note off of the Chinese one, and subsequently used it as the basis for machine translation of the ransom notes into all other languages."

Meantime, Flashpoint's linguistic analysis doesn't really confirm or deny the North Korean Lazarus Group's involvement. "Unfortunately, we don't know enough about the Lazarus Group. Maybe it's a combination of North Korea and Chinese" members, Condra says.

The Lazarus Group also could have employed subcontractors for the ransom notes, for example, he says. But the researchers concluded that the notes were generated for the WannaCry attacks and not recycled from some previous ransomware attacks. 

Related Content:

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.