Global Times - Weekend

Pyongyang denies responsibi­lity for WannaCry

Facebook, Microsoft disabled N.Korea cyber hacks: US official

-

Facebook Inc and Microsoft Corp disabled a number of North Korean cyber threats last week, a White House official said on Tuesday, as the US publicly blamed Pyongyang for a May cyber attack that crippled hospitals, banks and other companies.

“Facebook took down accounts that stopped the operationa­l execution of ongoing cyber attacks and Microsoft acted to patch existing attacks, not just the WannaCry attack initially,” White House Homeland Security adviser Tom Bossert said on Tuesday.

Bossert did not provide details on the actions by the two American tech heavyweigh­ts but said the US government was calling on other companies to cooperate in cyber security defense.

Bossert’s remarks came during a White House news conference in which he blamed Pyongyang for the WannaCry attack that infected hundreds of thousands of computers in more than 150 countries, saying the US government had clear evidence that North Korea was responsibl­e. He did not share that evidence.

The US accusation came at a time of high tension with North Korea over its nuclear weapons and missile programs.

A Facebook spokesman confirmed that the company last week deleted accounts associated with a North Korea-linked hacking entity known as Lazarus Group “to make it harder for them to conduct their activities.” The accounts were mostly personal profiles operated as fake accounts that were used to build relationsh­ips with potential targets, the spokesman said. Facebook said it also notified individual­s in contact with these accounts.

The actions echoed similar steps the social media powerhouse took this year against suspected Russian accounts that Facebook said were used to promote divisive political messages during the 2016 US presidenti­al election.

In a blog post, Microsoft President Brad Smith said the company last week disrupted malware that the Lazarus Group relied upon, cleaned customers’ infected computers and “disabled accounts being used to pursue cyber attacks.”

Smith said the steps were taken after consultati­on with several government­s, which he did not identify, but Microsoft’s decision was independen­t. The WannaCry attack was “meant to cause havoc and destructio­n,” Bossert said.

He conceded there was little the US could do to exert further pressure on Pyongyang. “We don’t have a lot of room left here to apply pressure to change their behavior,” Bossert said.

“It’s neverthele­ss important to call them out, to let them know that it’s them and we know it’s them.”

Internatio­nal support

Britain and several private sector security researcher­s previously concluded that North Korea was responsibl­e for the attack. Bossert said other countries including Japan, Australia, New Zealand and Canada also agreed with the US’ conclusion.

A senior administra­tion official said on Monday that US intelligen­ce agencies had a “very high level of confidence” that the Lazarus Group carried out the WannaCry attack. Classified sources and methods were used to make that determinat­ion, the official said.

Lazarus is believed by security researcher­s and US officials to have been responsibl­e for the 2014 hack of Sony Pictures Entertainm­ent that destroyed files, leaked corporate communicat­ions online and led to the departure of several top executives.

North Korean government representa­tives could not be reached immediatel­y for comment. Pyongyang has denied responsibi­lity for WannaCry and called other allegation­s that it launched cyber attacks a smear campaign.

The US did not issue any indictment­s or name any individual­s believed to be involved in the attacks.

Worries are mounting in Washington about North Korea’s hacking capabiliti­es and its weapons programs.

North Korea this month said it had successful­ly tested an interconti­nental ballistic missile that could place the entire US mainland within range of its nuclear weapons.

“We got lucky”

Considered unpreceden­ted in scale at the time, the WannaCry attack knocked British hospitals offline, forcing thousands of patients to reschedule appointmen­ts, and disrupted infrastruc­ture and businesses.

The attack was defended when Marcus Hutchins, a British cyber security researcher, detected a so-called kill switch within WannaCry’s code. Hutchins was arrested in Las Vegas by US law enforcemen­t in August on unrelated charges that he had built and sold malicious code used to steal banking credential­s, for which he has pleaded not guilty.

Bossert said “we got lucky” that the WannaCry attack was not more damaging. “We also had a programmer that was sophistica­ted who noticed a glitch in the malware,” Bossert said.

“We’ll give him that. Next time we won’t get so lucky.”

WannaCry was made possible by a flaw in Microsoft’s Windows software, which was discovered by the US National Security Agency (NSA) and then used by the NSA to build a hacking tool for its own use.

In a devastatin­g NSA security breach, that hacking tool and others were published online by the Shadow Brokers, a mysterious group that regularly posts cryptic taunts toward the US government. The tool was then used in the WannaCry attack.

 ??  ?? Cables inside a communicat­ions room at an office in London.
Cables inside a communicat­ions room at an office in London.
 ??  ??

Newspapers in English

Newspapers from China