By custom, Symantec does not attribute cyber campaigns directly to governments, but its researchers did not dispute the common belief that Lazarus works for North Korea. The Lazarus Group, known by many other names, including Hidden Cobra, WhoIs Team, or ZINC, is a Korea-based APT and cybercrime organization. Lazarus is the name many security companies have given to the hacking group behind the Sony attack and others. On Monday, it called earlier reports that it might have been behind the WannaCry attack “a dirty and despicable smear campaign.” North Korea has routinely denied any such role. government and private companies have accused North Korea in the 2014 Sony attack. In addition, the same Internet connection was used to install an early version of WannaCry on two computers and to communicate with a tool that destroyed files at Sony Pictures Entertainment. (See WannaCry ransomware has links to North Korea, cybersecurity experts say. In May 2017, Lazarus spread the WannaCry ransomware, encrypting victims files and demanding a ransom between 300 and 600 in bitcoin to unlock their data. Symantec researchers said they had found multiple instances of code that had been used both in the North Korea-linked group’s previous activity and in early versions of WannaCry. When the Lazarus Group, a North Korean state-controlled hacking group. A screenshot shows a WannaCry ransomware demand, provided by cyber security firm Symantec, in Mountain View, California, U.S. Security researchers say the possible link between WannaCry and the Lazarus Group is traced back to a February 2017 WannaCry cryptor sample that very.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |