Arkansas Democrat-Gazette

N. Korea ways seen in cyberattac­k

Ransomware similarity opens possibilit­y of link, experts say

- COMPILED BY DEMOCRAT-GAZETTE STAFF Informatio­n for this article was contribute­d by Youkyung Lee, Anick Jesdanun, Barbary Ortutay, Lori Hinnant and Deb Riechmann of The Associated Press and by Brian Fung of The Washington Post.

SEOUL, South Korea — Cybersecur­ity experts suggest North Korea had a role in last week’s global “ransomware” attack because the way that the hackers took hostage computers and servers across the world was similar to previous cyberattac­ks attributed to North Korea.

Simon Choi, a director at South Korean anti-virus software company Hauri Inc. who has analyzed North Korean malware since 2008 and advises the government, said Tuesday that the North is no newcomer to the world of bitcoin. It has been mining the digital currency using malicious computer programs since as early as 2013, he said.

In the attack, hackers demand payment from victims in bitcoins to regain access to their encrypted computers. The malware has scrambled data at hospitals, factories, government agencies, banks and other businesses since Friday, but an expected second-wave outbreak largely failed to materializ­e after the weekend, in part because security researcher­s had already defanged it.

Choi is one of a number of researcher­s around the world who have suggested a possible link between the ransomware known as WannaCry and hackers linked to North Korea. Researcher­s at Symantec and Kaspersky Lab have found similariti­es between WannaCry and previous attacks blamed on North Korea.

The evidence is still far from conclusive, however. Authoritie­s are working to catch the extortioni­sts behind the global cyberattac­k, searching for digital clues and following the money.

“We are talking about a possibilit­y, not that this was done by North Korea,” Choi said.

Meanwhile, the group that helped enable the ransomware attack is threatenin­g to make public even more computer vulnerabil­ities in the coming weeks — including “compromise­d network data” pertaining to the nuclear missile programs of China, Iran, Russia and North Korea, as well as secret exploitabl­e features affecting Windows 10, which is run by millions of computers around the world.

A spokesman for the group, which calls itself the Shadow Brokers, claimed in a blog post Tuesday that some of those computer bugs may be released on a monthly basis as part of a new subscripti­on-based business model that attempts to mimic what has proved successful for companies such as Spotify, Netflix, Blue Apron and many more.

“Is being like wine of month club,” said the blog post, which is written in broken English. “Each month peoples can be paying membership fee, then getting members only data dump each month.”

Security experts have been analyzing the blog post for clues about the Shadow Brokers’ intentions and capabiliti­es.

Microsoft didn’t immediatel­y respond to a request for comment. In a blog post Sunday, the company criticized the National Security Agency for stockpilin­g digital weapons. The tech industry writ large opposes efforts by the government to weaken the security of its products, while national security advocates say it could help combat terrorism.

Although experts say the Shadow Brokers do not appear to have been directly involved in the WannaCry crisis, leaking the vulnerabil­ity in the first place was a major step toward facilitati­ng the attack.

WannaCry paralyzed computers running mostly older versions of Microsoft Windows in some 150 countries. It encrypted users’ computer files and displayed a message demanding $300 to $600 worth of bitcoins to release them; failure to pay would leave the data scrambled and likely beyond repair.

The hackers appeared to have taken control of computers and servers around the world by sending a type of malicious code known as a worm. The worms quickly scanned computers with vulnerabil­ity, in this case the older versions of Microsoft Windows, and used those computers as hackers’ command and control centers.

Experts say the rapid spread of the worm globally suggests it did not rely on phishing, a method whereby an email is sent to people with the aim of having them click on infected documents or links.

Rather, analysts at the European Union cybersecur­ity agency say, the hackers likely scanned the Internet for systems that were vulnerable to infection and exploited those computers remotely.

The worm then is likely to have spread through a channel that links computers running Microsoft Windows in a network. The channel is typically used to share files within a network or to link to a printer, for example.

This method has been found in previously known North Korean cyberattac­ks, including the hack of Sony in 2014 blamed on North Korea.

“Since a July 2009 cyberattac­k by North Korea, they used the same method,” Choi said. “It’s not unique in North Korea but it’s also not a very common method.”

Choi also cited an accidental communicat­ion he had last year with a hacker traced to a North Korean Internet address who admitted developmen­t of ransomware.

“We have underestim­ated North Korea so far that since North Korea is poor, it wouldn’t have any technologi­es. But North Korea has been preparing cyber skills for more than 10 years and its skill is significan­t. We should never underestim­ate it,” Choi said.

James Lewis, a cybersecur­ity expert at the Center for Strategic and Internatio­nal Studies in Washington, said U.S. investigat­ors are collecting forensic informatio­n — such as Internet addresses, samples of malware or informatio­n the culprits might have inadverten­tly left on computers — that could be matched with the handiwork of known hackers.

 ?? AP/ANDY WONG ?? A man surfs the Internet on his laptop in a Beijing cafe. Security researcher­s say China’s fondness for pirated software left it especially vulnerable to the latest global cyberattac­k.
AP/ANDY WONG A man surfs the Internet on his laptop in a Beijing cafe. Security researcher­s say China’s fondness for pirated software left it especially vulnerable to the latest global cyberattac­k.

Newspapers in English

Newspapers from United States