WannaCry Ransomware: Symantec Says 'Highly Likely' North Korea Behind Cyber-Attacks

Advertisement
By Reuters | Updated: 23 May 2017 10:33 IST
Highlights
  • US government has previously accused North Korea in the 2014 Sony attack
  • North Korea has routinely denied any such role
  • Similarities found between WannaCry and code used by Lazarus Group

Cyber-security firm Symantec said on Monday it was "highly likely" a hacking group affiliated with North Korea was behind the WannaCry cyber-attack this month that infected more than 300,000 computers worldwide and disrupted hospitals, banks and schools across the globe.

Symantec researchers said they had found multiple instances of code that had been used both in the North Korea-linked group's previous activity and in early versions of WannaCry.

In addition, the same Internet connection was used to install an early version of WannaCry on two computers and to communicate with a tool that destroyed files at Sony Pictures Entertainment. The US government and private companies have accused North Korea in the 2014 Sony attack.

Advertisement

North Korea has routinely denied any such role. On Monday, it called earlier reports that it might have been behind the WannaCry attack "a dirty and despicable smear campaign."

Advertisement

Dangerous Strain Called 'EternalRocks' Found, Researchers Say 

Lazarus is the name many security companies have given to the hacking group behind the Sony attack and others. By custom, Symantec does not attribute cyber campaigns directly to governments, but its researchers did not dispute the common belief that Lazarus works for North Korea.

Advertisement

In a blog post, Symantec listed numerous links between Lazarus and software the group had left behind after launching an earlier, less virulent, version of the malware in February. One was a variant of software used to wipe disks during the Sony Pictures attack, while another tool used the same internet addresses as two other pieces of malware linked to Lazarus.

At the same time, flaws in the WannaCry code, its wide spread, and its demands for payment in the electronic bitcoin before files are decrypted suggest that the hackers were not working for North Korean government objectives in this case, said Vikram Thakur, Symantec's security response technical director.

Advertisement

"Our confidence is very high that this is the work of people associated with the Lazarus Group, because they had to have source code access," Thakur said in an interview.

But he added: "We don't think that this is an operation run by a nation-state."

With WannaCry, Thakur said, Lazarus Group members could have been moonlighting to make extra money, or they could have left government service, or they could have been contractors without direct obligations to serve only the government.

The most effective version of WannaCry spread by using a flaw in Microsoft's Windows and a programme that took advantage of it that had been used by the US National Security Agency, officials said privately.

That program was among a batch leaked or stolen and then dumped online by a group calling itself The Shadow Brokers, who some in US intelligence believe to be affiliated with Russia.

Analysts have been weighing in with various theories on the identity of those behind WannaCry, and some early evidence had pointed to North Korea. The Shadow Brokers endorsed that theory, perhaps to take heat off their own government backers for the disaster.

Cyber-security company Kaspersky has said it had found several similarities between the WannaCry malware from the earlier attack and those used by Lazarus. But in an interview last week, its Asia research director, Vitaly Kamluk, said it was not conclusive evidence. "It's unusual," he said.

Beau Woods, deputy director of the Cyber Statecraft Initiative at the Atlantic Council, said that the Korean language used in some versions of the WannaCry ransom note was not that of a native speaker, making a Lazarus connection unlikely.

But Thakur said that some hackers deliberately obfuscate their language to make tracing them harder. It is also possible that the writer in question was a contractor in another country, he said.

Thakur said a less likely scenario is that Lazarus' main aim was to create chaos by distributing WannaCry.

If the hackers' main objective was to earn money on the side, that would suggest an undisciplined hacking operation run by North Korea, one that could be exploited and weakened by the country's many foes.

"The intelligence community will probably take away from this that there is a possibility of splinters in the Lazarus Group, or members who are interested in filling their own pockets, and that could help," Thakur said.

Lazarus has also been linked to attacks on banks using their SWIFT messaging network. Last year, hackers stole $81 million from Bangladesh's central bank. Symantec said malware used in that attack was linked to Lazarus.

© Thomson Reuters 2017

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Lava Bold N2 Launched in India With a 5,000mAh Battery at This Price
  2. Nothing CEO Carl Pei Announces March 5 Event
  3. Samsung Galaxy S26 Ultra Could Launch With This Selfie Camera Upgrade
  4. Apple Reportedly Announces 'Special Experience' on March 4
  5. Samsung Galaxy S26+ Reportedly Listed for Sale Online Ahead of Launch
  6. Galaxy S26 Series Benchmarks Highlight Snapdragon-Exynos Performance Gap
  7. Vivo X300 FE Reportedly Bags IMDA and TUV Certifications Ahead of Launch
  8. Lava Bold N2 Will Be Launched in India on This Date: See Expected Specs
  9. Vivo V60 Lite 4G (2026) Debuts With Updated Snapdragon Chipset
  10. Xiaomi 17 Series Leak Hints at Imminent Launch Ahead of MWC at These Prices
  1. Crimson Desert a 'Premium' Experience, Will Not Have Microtransactions, Pearl Abyss Confirms
  2. Lava Bold N2 Launched in India With 5,000mAh Battery, 13-Megapixel Rear Camera: Price, Specifications
  3. Huawei Band 11 Pro Launch Timeline, Price, Colour Options and Key Features Leaked
  4. Nothing CEO Carl Pei Announces March 5 Event; Nothing Phone 4a, Phone 4a Pro Expected
  5. Google Reportedly Expands Gemini Split-Screen Feature to Non-Foldable Smartphones
  6. Samsung Galaxy S26 Ultra Tipped to Launch With Upgraded 12-Megapixel Selfie Camera
  7. Samsung Galaxy S26 Ultra's 'Zero-Peeking’ Privacy Feature Teased Days Ahead of Galaxy Unpacked Event
  8. Vivo V60 Lite 4G (2026) Launched With Snapdragon 6s Gen 2 Chip and 6,500mAh Battery
  9. Snapdragon-Powered Galaxy S26 Ultra Leads Exynos-Powered S26 in Early Benchmarks: Report
  10. Apple Reportedly Announces ‘Special Experience’ on March 4; May Launch iPhone 17e, Low-Cost MacBook
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.