USA TODAY US Edition

A new front in ‘cyber mischief’

Motive of massive ransomware attack remains unclear

- Elizabeth Weise and Jon Swartz @eweise @jswartz

A shadowy or-SAN FRANCISCO ganization suspected in the world’s largest ransomware attack may represent a new front in the escalating tensions between North Korea and the West. Or it may just be about cold, hard cash.

In the days after a virulent form of malware paralyzed computers in 150 countries, cyber security researcher­s poring over the WannaCry code and earlier, similar viruses noted a resemblanc­e that amounted to a digital trail of breadcrumb­s pointing to what’s known as the Lazarus Group, which may have ties to North Korea.

Whether or not it worked on behalf of North Korea, the group wanted to raise money:

“The Lazarus group appears to be a contractor in the area of cyber mischief, but they seem to straddle the worlds of politics and crime.” John Arquilla, Naval Postgradua­te School

$300 in bitcoin per frozen computer, according to victims such as the U.K. National Health Service, Spain’s Telefonica and U.S. shipper FedEx. That would fit the profile of a communist country that is cash-strapped, security experts say, even though this ransomware scam has collected only $70,000.

“The Lazarus group appears to be a contractor in the area of cyber mischief, but they seem to straddle the worlds of politics and crime,” says John Arquilla, chair of defense analysis at the Naval Postgradua­te School in Monterey, Calif. “I would call them a strategic criminal actor.”

Unlike many hacking groups, the undergroun­d organizati­on doesn’t claim responsibi­lity for attacks, does not release communiqué­s and does not tweet

handful of countries — Russia, China and Iran are others — with “offensivel­y advanced cyber-attacking capabiliti­es,” says Robert Silvers, former assistant secretary for cyber policy at the U.S. Department of Homeland Security under the Obama administra­tion.

Silvers says the only course of action for the United States is to impose economic sanctions, as it did against North Korea in early 2015 after the Sony hack.

“What is alarming is they are willing to use them and not be constraine­d,” Silvers says. “It’s becoming clear North Korea is turning to the cyberdomai­n to operate and achieve its political and criminal objectives. It doesn’t seem concerned about being caught; there is a sense of impunity to it.”

The murky underworld of the Dark Web makes it difficult to positively identify cyber criminals, cautions Michael Daniel, president of Cyber Threat Alliance and a former cyber security adviser to President Obama.

“It’s still early and evidence is limited,” Daniel says. “But if I was still in government, I would be asking the intelligen­ce communi- ty to look into the (North Korea) connection.”

The Lazarus Group is not a North Korean enterprise but a hacking and criminal contractin­g group whose heads are probably in Russia but whose workers are spread across the globe, says Avivah Litan, a senior cyber security analyst with Gartner.

“Everybody uses this rented hacking infrastruc­ture, that’s why attributio­n to the person who ordered it is so hard to do,” she says.

The Lazarus Group has been hired to accomplish multiple hacks, possibly including the pillaging of Democratic National Committee informatio­n and interferen­ce in the German election, she says.

“The Lazarus group appears to be a contractor in the area of cyber mischief, but they seem to straddle the worlds of politics and crime,” says John Arquilla, chair of defense analysis at the Naval Postgradua­te School in Monterey, Calif. “I would call them a strategic criminal actor.”

The evidence that North Korea hired the Lazarus groups is “highly circumstan­tial and gossamer thin,” Arquilla says. “It’s a matter of suspicions and implicatio­ns. We don’t really have CSICybercr­imes just yet.”

 ?? YONHAP VIA EUROPEAN PRESSPHOTO AGENCY ?? Employees monitor possible WannaCry ransomware cyberattac­ks at South Korea’s Internet and Security Agency.
YONHAP VIA EUROPEAN PRESSPHOTO AGENCY Employees monitor possible WannaCry ransomware cyberattac­ks at South Korea’s Internet and Security Agency.

Newspapers in English

Newspapers from United States