Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/15/2017
06:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

NSA Reportedly Confident North Korea Was Behind WannaCry

But some say no evidence exists to unequivocally pin blame for attacks on Pyongyang.

The US National Security Agency (NSA) appears to have joined the ranks of those convinced that the North Korean government was behind the recent WannaCry ransomware epidemic even as many others remain skeptical of that conclusion.

The Washington Post Wednesday reported that NSA officials have determined with "moderate confidence" that the tactics and techniques used in the WannaCry attacks point to the Reconnaissance General Bureau, the North Korean intelligence agency. The motive for the attacks apparently was to try and raise money in the form of ransom payments from victims, the Washington Post said, citing sources within the NSA.

The NSA's assessment of WannaCry concludes that threat actors sponsored by the North Korean intelligence agency created two versions of WannaCry.

News of the NSA's reported analysis coincides with a somewhat oddly timed released this week of a US-CERT technical analysis linking the North Korean government to a botnet used to launch DDoS attacks worldwide.

Together, the developments suggest that the US government could be making a case for some sort of retaliatory action against the North Korean government for its alleged misbehavior in cyberspace, though it is too early to know for sure. Such a move would certainly jibe with the Trump Administration's overall get-tough stance against Pyongyang over the isolated nation's controversial missile program.

WannaCry crypto ransomware infected over 300,000 Windows computers worldwide earlier this year using a leaked NSA exploit dubbed EternalBlue to propagate itself to vulnerable systems.

The US government's apparent conclusions about its origins have at least some measure of support within the security industry. At a Congressional hearing Thursday on the lessons learned from the WannaCry outbreak, a senior executive from Symantec reiterated statements the company has made previously about its belief that North Korea had a hand in the attacks.

"There were very, very close similarities to other kinds of attacks we have seen, specifically attacks we attribute to a group called Lazarus," said Hugh Thompson in his testimony before the Joint Subcommittee on Oversight and Subcommittee on Research and Technology hearing.

"The malware, the reuse of strings in that malware the reuse of command and control infrastructure out on the Internet by that malware led our researchers to believe there is a strong link to the Lazarus group," which the FBI has linked to North Korea, he said. The same group was linked to the attacks on Sony and to the more than $81 million cyberheist from the Bank of Bangladesh last year, he said.

Other security experts are less sure of the connection and say there's not enough evidence available to unequivocally attribute the attacks to North Korea.

"We think it is ambiguous to conjecture over the origins of WannaCry," Salim Neino, chief executive officer of Kryptos Logic, said in his testimony at the hearing. Some of the pieces of code used in the WannaCry attacks suggest that a nation-state actor was involved. According to Neino, WannaCry may have impacted as many as 2 million systems worldwide, which is considerably more than previous estimates.

"But unfortunately, anyone could have created this level of attack," and then made it look like North Korea was behind it, he said. "I would compare it perhaps to photo-shopping a program to make it look a certain way. Or, it could have simply been what it is. What I can say is these attacks are very difficult to attribute," he noted.

Others have suggested that the authors of WannaCry have a Chinese connection. Security vendor FlashPoint, for instance, says its linguistic analysis of the 28 ransomware messages used in the WannaCry attacks suggest the authors are from China or are Chinese-speaking.

"Many researchers have linked the WannaCry malware to the “Lazarus Group,” which is itself believed affiliated with North Korea," FlashPoint said in a separate intelligence report earlier this month. "Flashpoint’s own analysis of the 28 odd foreign language ransom notes, however, strongly suggests a Chinese-speaking author of the notes themselves," the note said. "These two findings—the link to North Korea and a Chinese-speaking author of the ransom notes—are not mutually exclusive, however," the company added.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
cybersavior
100%
0%
cybersavior,
User Rank: Strategist
6/16/2017 | 2:54:43 PM
Headline:
"U.S. government accuses North Korea of unleashing a malware attack that was devised from computer exploits developed by the U.S. government for attacking computers"
Armanor
50%
50%
Armanor,
User Rank: Apprentice
6/16/2017 | 2:01:04 AM
Question about WannaCry
Does WannaCry only target companies or can it attack everybody ? I thought it was only targeting companies
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
CVE-2019-12400
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
CVE-2019-15092
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.