New Insight on WannaCry's Roots

Is it possible we've been looking in the wrong direction for the source of the WannaCry attack?

Ever since news of the WannaCry attack broke, people have been searching for the culprits -- those responsible for the attack and from which evil lair the attacks were launched. Many fingers were pointed at Russia and eastern Europe -- but were those fingers pointed at the wrong target?

According to an article in Foreign Policy, those early fingers might have been pointed too far to the West. The article references researchers at Symantec and other anti-malware companies who found tell-tale electronic fingerprints on the attack -- fingerprints that would seem to belong to hackers in North Korea.

For years, security researchers have used digital "fingerprints," or snippets of code that tend to be unique to an individual programmer or group of programmers, to identify the source of attacks and vulnerability exploits. Over time, these researchers have found that this evidence that a particular programmer worked on a block of code tend to be persistent, no matter how many other hackers might touch the malware, because of the tendency to cut and paste rather than develop each attack from a clean sheet of paper.

The fingerprints on the WannaCry code indicate that it spent time in North Korea. What it doesn't really say, is whether the attack was launched, or ordered, by North Koreans. There are plenty of signs to indicate that the attack didn't come from a nation state: It didn't really raise very much money, and the feature that allowed a researcher to stop WannaCry in its tracks was rather crudely implemented.

Why does all this matter?

Because, like plant and animal DNA, the digital fingerprints on malware ultimately allow researchers to tell the story of where the software has been, how it's evolved, and how it's likely to be used in the future. All of that adds up to information that makes it possible to more effectively fight the malware and remediate the damage done, and ultimately, to point the finger of responsibility in the right direction.

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Read more about:

Security Now

About the Author(s)

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights