5 years after WannaCry: North Korea's cyber capabilities

Share post

Five years ago, the WannaCry ransomware attack, which experts attribute to North Korea, was launched. The effects were sometimes dramatic. A commentary by Jens Monrad, Mandiant's Head of Threat Intelligence, EMEA, on the development of North Korea's cyber capabilities today compared to five years ago. 

WannaCry is malware that encrypts important data on infected systems in order to extort money from victims. WannaCry exploited a zero-day vulnerability in the Windows operating system for this purpose, which was then fixed with a patch from Microsoft.

230.000 computers encrypted in 150 countries

“WannaCry was not only one of the most widespread and destructive ransomware attacks, but also a turning point for North Korean state-backed cyber operations. He demonstrated the capabilities and willingness of the isolated regime to harm other nations in pursuit of national interests. North Korea had little incentive to "play by the rules". This evolution continues five years later, with the regime using its cyber capabilities to support both political and national security priorities and financial goals.

Today, while the Lazarus Group is often used as an umbrella term for North Korean cyber actors, in reality there are several different groups operating as distinct cyber entities with different goals for the state. The country's espionage operations, for example, likely reflect the regime's immediate concerns and priorities. These are currently likely focused on raising financial resources through crypto heists, attacks on media, news and political entities, as well as foreign relations and nuclear intelligence.

North Korean Crypto Heists?

Jens Monrad, Head of Threat Intelligence, EMEA at Mandiant (Image: Mandiant).

At the same time, overlaps in the infrastructure, malware, and tactics, techniques, and procedures used by the North Korean groups suggest that there are shared resources for cyber operations and thus overall coordination. According to our intelligence, most of North Korea's cyber operations, including espionage, destructive operations and financial crimes, are primarily conducted by elements of the General Intelligence Office.

Half a decade after WannaCry, North Korean groups continue to pose a serious threat. We must continue to gather intelligence on their structures and capabilities to identify attack patterns that enable proactive defense.” For more information on North Korean hacking groups, visit the blog of Client: Not So Lazarus: Mapping DPRK Cyber ​​Threat Groups to Government Organizations.

More at Mandiant.com

 


About Mandiant

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response. With decades of experience on the cyber frontline, Mandiant helps organizations confidently and proactively defend against cyber threats and respond to attacks. Mandiant is now part of Google Cloud.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more