NSA Reportedly Confident North Korea Was Behind WannaCry
But some say no evidence exists to unequivocally pin blame for attacks on Pyongyang.
June 15, 2017
The US National Security Agency (NSA) appears to have joined the ranks of those convinced that the North Korean government was behind the recent WannaCry ransomware epidemic even as many others remain skeptical of that conclusion.
The Washington Post Wednesday reported that NSA officials have determined with "moderate confidence" that the tactics and techniques used in the WannaCry attacks point to the Reconnaissance General Bureau, the North Korean intelligence agency. The motive for the attacks apparently was to try and raise money in the form of ransom payments from victims, the Washington Post said, citing sources within the NSA.
The NSA's assessment of WannaCry concludes that threat actors sponsored by the North Korean intelligence agency created two versions of WannaCry.
News of the NSA's reported analysis coincides with a somewhat oddly timed released this week of a US-CERT technical analysis linking the North Korean government to a botnet used to launch DDoS attacks worldwide.
Together, the developments suggest that the US government could be making a case for some sort of retaliatory action against the North Korean government for its alleged misbehavior in cyberspace, though it is too early to know for sure. Such a move would certainly jibe with the Trump Administration's overall get-tough stance against Pyongyang over the isolated nation's controversial missile program.
WannaCry crypto ransomware infected over 300,000 Windows computers worldwide earlier this year using a leaked NSA exploit dubbed EternalBlue to propagate itself to vulnerable systems.
The US government's apparent conclusions about its origins have at least some measure of support within the security industry. At a Congressional hearing Thursday on the lessons learned from the WannaCry outbreak, a senior executive from Symantec reiterated statements the company has made previously about its belief that North Korea had a hand in the attacks.
"There were very, very close similarities to other kinds of attacks we have seen, specifically attacks we attribute to a group called Lazarus," said Hugh Thompson in his testimony before the Joint Subcommittee on Oversight and Subcommittee on Research and Technology hearing.
"The malware, the reuse of strings in that malware the reuse of command and control infrastructure out on the Internet by that malware led our researchers to believe there is a strong link to the Lazarus group," which the FBI has linked to North Korea, he said. The same group was linked to the attacks on Sony and to the more than $81 million cyberheist from the Bank of Bangladesh last year, he said.
Other security experts are less sure of the connection and say there's not enough evidence available to unequivocally attribute the attacks to North Korea.
"We think it is ambiguous to conjecture over the origins of WannaCry," Salim Neino, chief executive officer of Kryptos Logic, said in his testimony at the hearing. Some of the pieces of code used in the WannaCry attacks suggest that a nation-state actor was involved. According to Neino, WannaCry may have impacted as many as 2 million systems worldwide, which is considerably more than previous estimates.
"But unfortunately, anyone could have created this level of attack," and then made it look like North Korea was behind it, he said. "I would compare it perhaps to photo-shopping a program to make it look a certain way. Or, it could have simply been what it is. What I can say is these attacks are very difficult to attribute," he noted.
Others have suggested that the authors of WannaCry have a Chinese connection. Security vendor FlashPoint, for instance, says its linguistic analysis of the 28 ransomware messages used in the WannaCry attacks suggest the authors are from China or are Chinese-speaking.
"Many researchers have linked the WannaCry malware to the “Lazarus Group,” which is itself believed affiliated with North Korea," FlashPoint said in a separate intelligence report earlier this month. "Flashpoint’s own analysis of the 28 odd foreign language ransom notes, however, strongly suggests a Chinese-speaking author of the notes themselves," the note said. "These two findings—the link to North Korea and a Chinese-speaking author of the ransom notes—are not mutually exclusive, however," the company added.
Related Content:
About the Author
You May Also Like
Harnessing the Power of Automation to Boost Enterprise Cybersecurity
Oct 3, 2024DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024