N. Korean Hacker Fingered For Wannacry Attacks

Park Jin Hyok, 34, is charged by US officials over 2017 WannaCry ransomware attack that affected more than 150 countries

The US justice department has charged an alleged North Korean spy for helping to perpetrate cyberattacks against the British National Health Service that saw operations cancelled, ambulances diverted and patient records made unavailable following a worldwide hack in 2017 which affected computers in more than 150 countries.

Park Jin Hyok, 34, was also involved in an attack against the Sony Corporation in 2014 and an $81m theft from the Bank of Bangladesh in 2016, a criminal complaint released on Thursday 6th Sept claimed.

It was not immediately clear if North Korea, which authorities said the operative was working on behalf of during the WannaCry cyber-attack, would make Park available to US law enforcement authorities.

Park was thought to have operated from China, but prosecutors said they now believe he is in North Korea.

US officials believe the hackers struck in retribution for The Interview, a Hollywood spoof film that lampooned the isolated nation to such an extent that its state media warned it would wage “merciless retaliation”. The 2017 attack, the largest to have ever hit the health service, hit computers at hospitals and GP surgeries across 48 NHS trusts.

At least 6,900 NHS appointments were cancelled, and up to 19,000 affected in total, after staff were forced to resort to using pen and paper when they were locked out of computerised systems. A subsequent government report found that NHS trusts had been left vulnerable because basic cybersecurity recommendations were not followed. None of 88 out of 236 trusts assessed by NHS Digital before the attack were found to have satisfied the necessary cybersecurity standards.

It had been reported that nearly all NHS trusts were using an obsolete version of Windows for which Microsoft had stopped providing security updates three years previously, while it was also suggested that 90% of trusts were using Windows XP, then a 15-year-old system. In the immediate aftermath of the hack the then-home secretary Amber Rudd was not able to confirm whether patient data had previously been backed up.

NHS workers at the time told the Guardian that the computers were affected after email attachments were opened, with the computers going down shortly after. Staff were swiftly told to “shut down, take out network cables and unplug the phones”, an NHS worker from an Essex hospital said.

The malware demanded ransoms of $300 (£230) in Bitcoin to users on the infected computers. Although there was no evidence any NHS organisation paid, according to NAO, the financial cost of the crippling episode remains unclear.
The National Crime Agency’s director general of operations paid tribute to the collaboration between UK and US law enforcement and warned that the distinction between nation states and criminal groups in cases of cybercrime has become increasingly blurred.

 “The ransomware attacks that affected the UK appear to be part of a series, and it’s right that they are prosecuted together to show the full scale of offending,” Steve Rodhouse said.

 “The WannaCry attack highlighted that cybercrime affects not just the country’s prosperity and security, but also affects our everyday way of life.

“The distinction between nation states and criminal groups in terms of cybercrime is becoming frequently more blurred and today’s charges are a significant step forward in our investigation.”

Home Office minister Ben Wallace said in October 2017 that the government was “as sure as possible” that North Korea was responsible for the attack. The US justice department confirmed that the WannaCry investigation, one of the most complex cybercriminal investigations it has ever conducted, is ongoing, and includes activity ranging through 2018. 

The December 2014 cyber-attack against Sony’s film-making studio saw five of its upcoming movies, including the big-budget musical remake Annie, released online to file-sharing sites by a group calling itself Guardians of Peace.

Amid threats to moviegoers, Sony cancelled the theatrical release of The Interview and instead released it online.
Bloomberg reported that a Sony internal report linked the attack to a group associated with Pyongyang known as DarkSeoul, which wiped out the computers of South Korean banks and broadcasters in March 2013.

A North Korean official denied the country was responsible for cyber-attacks on Sony in an interview with Voice of America.

“Linking the DPRK to the Sony hacking is another fabrication targeting the country,” said the unidentified diplomat. “My country publicly declared that it would follow international norms banning hacking and piracy.”

Guardian:

You Might Also Read: 

Healthcare Cyber-Attacks Still Going Up:

Preventing Another Wannacry:
 

« The App That Lets You Sell Your Personal Healthcare Data
British Airways Faces £Multimillion Fine »

Directory of Suppliers

Landry Consulting

Landry Consulting

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Orion Cyber Consultancy

Orion Cyber Consultancy

Orion is the UK's leading provider of Mobile Security Encryption, Biometric Authentication & Access Control, and Anti-Phishing solutions.

Cyber Security Research Alliance (CSRA)

Cyber Security Research Alliance (CSRA)

A non-profit consortium founded by industry stakeholders as a forum to develop R&D strategy to address challenges in cyber security

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

ZingBox

ZingBox

ZingBox IoT Guardian provides visibility into the security of your IoT infrastructure.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Payment Express

Payment Express

Payment Express is a global leader in payment technology delivering a range of secure solutions to major corporate, banking and SME clients globally.

7Safe

7Safe

7Safe provide​s cyber security consultancy, digital investigation advice, training and technical services.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

RazorSecure

RazorSecure

RazorSecure provides cyber security solutions for Aviation, Rail & Automotive transport systems.