. 24/7 Space News .
CYBER WARS
Jury out on North Korea link to ransomware attack
By Rob Lever
Washington (AFP) May 25, 2017


Leonardo says it has developed a ransomware solution
Washington (UPI) May 23, 2017 - Leonardo says it has combined cyber-intelligence and behavioral technologies to counter the ransomware cyber-virus threat.

The solution, developed to protect Italy's Public Administration, uses RaPToR technology from security company Cyber Intuition. It stops the ransomware virus from being propagated, intercepting execution attempts and preventing the encoding of user and system data.

Leonardo said its solution also enables restoration of data using a sophisticated recovery method in case a new type of ransomware should circumvent the recognition systems.

A Ransomware virus, dubbed WannaCry, recently compromised thousands of computers around the world in its demand for cash payments to unlock computer user data it had blocked.

Specifics about the solution developed, which was announced to the PA Forum in Rome Tuesday, were not disclosed in the company's news release .

Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?

That's the subject of heated debate in cybersecurity circles after analysts found similarities in the "WannaCry" worm to other malware attributed to North Korea, including the 2014 hack of Sony Pictures and a cyberheist of millions of dollars from the Bangladesh central bank.

The security firm Symantec this week said the shared code makes it "highly likely" that the attacks were connected to the hacker group given the code name Lazarus, which many believe is North Korean.

Israel-based cybersecurity firm Intezer last week reached a similar conclusion, finding that WannaCry had "strong links to other malware families, believed to be developed by North Korean hackers, or known to be used in attacks against South Korean organizations."

Russian-based security firm Kaspersky Labs and others also pointed to a likely North Korean link.

While the evidence is not conclusive -- hackers can often hide or "spoof" their real identities -- North Korea is emerging as one of the likely suspects despite a strong denial by the Pyongyang envoy to the United Nations, some analysts say.

Symantec researchers said that despite the likely North Korea link, the WannaCry attacks "do not bear the hallmarks of a nation-state campaign but are more typical of a cybercrime campaign."

- Desperate for cash -

"I could easily see North Korea doing this as a way to get money," said Paul Benda, a Pentagon and Department of Homeland Security official who is now chief technology officer at Global Security and Innovative Strategies, a Washington consultancy.

"With the sanctions they are under they need cold hard cash."

Other analysts have noted that sanctions squeezing Pyongyang may be prompting desperate actions to raise cash through various channels, including cybercrime.

"While years of sanctions have isolated the Hermit Kingdom from much of the global financial system, North Korea may be seeking to fund the state's coffers through a widespread cybercrime campaign," said FireEye analyst Luke McNamara in a recent post on the Lawfare blog.

Paradoxically, he said, the effort to persuade and other nations to pressure North Korea may be encouraging further cyberattacks: "Pyongyang would be left with few options to compensate for lost income that it could ramp up as quickly as cybercrime."

The attacks discovered last week caused havoc in global computer networks, affecting as many as 300,000 machines in 150 countries and disrupting governments and several industries. The hackers developed the virus to exploit a flaw exposed in leaked documents from the National Security Agency.

- Inconsistencies -

But despite the growing concerns over North Korea, some analysts say it's too soon to point the finger and cite inconsistencies with the Pyongyang connection.

The WannaCry attack appeared unsophisticated: researchers were able to halt the spread with a $10 purchase of a web domain that activated a "kill switch."

And various estimates showed the "ransom" raised amounted to a paltry $116,000 from 302 entities more than a week after computers were locked down.

James Scott, a senior fellow at the Institute for Critical Infrastructure Technology, said WannaCry was "barely functional" and spread widely only because of the large number of networks and computers which failed to upgrade security and were vulnerable to the self-replicating "worm."

The hackers known as Lazarus are a sophisticated cybermercenary group, Scott told AFP. "They use elaborate traps, obfuscation techniques and wipers to eliminate digital footprints. This (WannaCry) has none of that."

More likely, Scott said, is that the attacks were carried out by hackers from China's People's Liberation Army "moonlighting" in their spare time.

Scott, who disputes the widely held belief that the Lazarus group is North Korean, said it is possible that Pyongyang has outsourced some of its cybercrime to these freelance Chinese hackers.

Analysts at Boston-based security firm Cybereason also questions the role of North Korea.

"Nothing in North Korea's past cyber campaigns or in their conventional military and foreign policy fit this mold," the researchers said in a blog.

John Arquilla, chair of defense analysis at the Naval Postgraduate School, said that despite the common patterns in the recent attacks, cyber forensics still have a long way to go to positively identify the source of an attack.

"We are not at the level of CSI," he said, referring to the popular television criminal forensics show.

"We have to be very careful about the potential for deception. I would not rush to take military or economically coercive actions on the basis of what might or might not be the truth" on the source of the attacks, Arquilla said.

CYBER WARS
Ex-Trump aide Flynn defies Senate subpoena in Russia probe
Washington (AFP) May 22, 2017
President Donald Trump's former national security advisor Michael Flynn defied a Senate subpoena Monday for documents on his links to Russia, saying it came amid a stream of "outrageous allegations" that "feed the escalating public frenzy against him." But Flynn quickly faced fresh accusations from a top Democrat saying he misled the Pentagon about his Russia contacts one year ago. Elija ... read more

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
SoftBank-Saudi high-tech Vision fund raises $93bn

'Stone Age' Trump going back to horse and cart says Schwarzenegger

Saving time in space

SpaceX Dragon to deliver research payloads to Space Station

CYBER WARS
Spaceflight buys Electron Rocket from Rocket Lab

Aerojet Rocketdyne tests 3D-printed rocket

Mining the moon for rocket fuel to get us to Mars

Arianespace launches SES-15 using Soyuz rocket

CYBER WARS
HI-SEAS Mission V Mars simulation marks midway point

Deciphering the fluid floorplan of a planet

How hard did it rain on Mars

Mars Rover Opportunity Begins Study of Valley's Origin

CYBER WARS
A cabin on the moon? China hones the lunar lifestyle

China tests 'Lunar Palace' as it eyes moon mission

China to conduct several manned space flights around 2020

Reach for the Stars: China Plans to Ramp Up Space Flight Activity

CYBER WARS
AsiaSat 9 ready for shipment

SES Networks offers new hybrid resiliency service

Allied Minds' portfolio company BridgeSat raises $6 million in Series A financing

AIA report outlines policies needed to boost the US Space Industry competitiveness

CYBER WARS
Arralis launches plug and play Ka band chipset

A new tool for discovering nanoporous materials

One-dimensional crystals for low-temperature thermoelectric cooling

New theory predicts wetted area of droplets colliding with flat surface

CYBER WARS
Scientists propose synestia, a new type of planetary object

Kepler Telescope Spies Details of Trappist-1's Outermost Planet

Astronomers Confirm Orbital Details of TRAPPIST-1h

Study shows how radioactive decay could support extraterrestrial life

CYBER WARS
Hubble spots moon around third largest dwarf planet

NASA asks science community for Europa Lander Instruments ideas

Waves of lava seen in Io's largest volcanic crater

Not So Great Anymore: Jupiter's Red Spot Shrinks to Smallest Size Ever









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.