Share

Cybersleuths unearth more clues on WannaCry origin

Hong Kong - Cyber security researchers at Symantec and FireEye have uncovered more evidence tying this month’s WannaCry global ransomware attacks to North Korea.

The cyber attack that infected hundreds of thousands of computers worldwide was “highly likely” to have originated with Lazarus, a hacking group linked to the reclusive state, Symantec said. The software used was virtually identical to versions employed in attacks earlier this year attributed to the same agency, the company said in a report late on Monday.

FireEye on Tuesday agreed WannaCry shared unique code with malware previously linked to North Korea. “The shared code likely means that, at a minimum, WannaCry operators share software development resources with North Korean espionage operators,” Ben Read, a FireEye analyst, said in an emailed statement.

North Korean diplomats and official media have denied in recent days that the country played any role in the attacks.

WannaCry, the malware behind a global cyber attack dubbed “unprecedented” by Europol, infected an estimated 200 000 computers worldwide, infiltrating global institutions from the UK’s National Health Service to FedEx and PetroChina.

It gave its victims 72 hours to pay typically $300 in bitcoin or risk permanent loss of data. As of last Friday however, the estimated total amount of ransom paid failed to hit six figures.

READ: Up to million computers hit in biggest cyber attack ever

The initial attack was stifled when a security researcher disabled a key mechanism used by the worm to spread, but experts said the hackers were likely to mount a second attack because so many users of personal computers with Microsoft operating systems couldn’t or didn’t download a security patch released in March labelled “critical”.

Last week, a Google researcher posted on Twitter that an early version of WannaCry shared some of the same programming code as malicious software used by Lazarus, the alleged North Korean government hackers behind an attack on Sony in 2014 and the theft of $81m from a Bangladeshi central bank account at the New York Fed last year. 

Other researchers have speculated that if the perpetrators were indeed North Korean, their intent may have been to cause a widespread internet outage to coincide with a scheduled missile test.

“Despite the links to Lazarus, the WannaCry attacks do not bear the hallmarks of a nation-state campaign but are more typical of a cybercrime campaign,” Symantec wrote in its report.

SUBSCRIBE FOR FREE UPDATE: Get Fin24's top morning business news and opinions in your inbox.

Read Fin24's top stories trending on Twitter:

We live in a world where facts and fiction get blurred
Who we choose to trust can have a profound impact on our lives. Join thousands of devoted South Africans who look to News24 to bring them news they can trust every day. As we celebrate 25 years, become a News24 subscriber as we strive to keep you informed, inspired and empowered.
Join News24 today
heading
description
username
Show Comments ()
Rand - Dollar
19.11
+0.4%
Rand - Pound
23.80
-0.4%
Rand - Euro
20.46
-0.0%
Rand - Aus dollar
12.40
-0.2%
Rand - Yen
0.12
+0.4%
Platinum
920.40
-1.1%
Palladium
1,026.50
+1.1%
Gold
2,322.61
-0.2%
Silver
27.34
+0.6%
Brent Crude
87.00
-0.3%
Top 40
68,051
+0.8%
All Share
74,011
+0.6%
Resource 10
59,613
-2.2%
Industrial 25
102,806
+1.7%
Financial 15
15,897
+1.8%
All JSE data delayed by at least 15 minutes Iress logo
Company Snapshot
Editorial feedback and complaints

Contact the public editor with feedback for our journalists, complaints, queries or suggestions about articles on News24.

LEARN MORE
Government tenders

Find public sector tender opportunities in South Africa here.

Government tenders
This portal provides access to information on all tenders made by all public sector organisations in all spheres of government.
Browse tenders