US to Charge North Korea for Sony Breach, WannaCryUS to Charge North Korea for Sony Breach, WannaCry
The DoJ plans to charge North Korean threat actors for their involvement in two major cyberattacks, US officials report.
September 6, 2018
The Department of Justice is preparing to charge North Korean hackers for the 2014 Sony cyberattack and WannaCry, the May 2017 global ransomware campaign, US officials report.
A New York Times report on the indictment states the US government has long had the suspect, North Korean spy Pak Jin-hyok, on its radar. Intelligence officials believe Pak worked with the North Korea Reconnaissance General Bureau, the country's equivalent to the CIA and the same organization believed to be responsible for both WannaCry and Bangladesh bank thefts.
The indictment was delayed, the New York Times continues, because much of the incriminating information officials wanted to leverage against Pak was classified and could not be used.
In a separate report, Reuters implies the DoJ will charge multiple North Korean hackers for both the Sony and WannaCry attacks. It also states the charges are part of a US government strategy to prevent future cyberattacks by publicly identifying the alleged threat actors.
Read more details here.
Black Hat Europe returns to London, Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks