{"id":32013,"date":"2017-05-24T12:42:10","date_gmt":"2017-05-24T02:42:10","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=32013"},"modified":"2017-05-24T12:42:10","modified_gmt":"2017-05-24T02:42:10","slug":"cyber-wrap-165","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-165\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/p>\n
The fallout from the WannaCry ransomware incident continued this week. ShadowBrokers, who released the Eternal Blue exploit<\/a> used by the WannaCry ransomware, have announced a new program<\/a> where members will gain access to new vulnerabilities and tools, as well as information supposedly stolen from Iranian, Chinese and North Korean missile programs. While ShadowBrokers have been linked to Russian intelligence services<\/a>, it\u2019s noteworthy that Russia itself was significantly affected by the incident<\/a>. As expected, additional uses of the EternalBlue exploit have been uncovered, including to install software that mines the cryptocurrency Monero<\/a>.<\/p>\n Speculation over whether the Hermit Kingdom is behind WannaCry has also continued this week. Cybersecurity firm Symantec\u2019s Security Response team have released further evidence<\/a> which they claim more closely ties WannaCry to the North Korean-linked Lazarus Group of hackers. Symantec notes that similarities in the tools used in last week\u2019s attack link the ransomware to the tools used in other cyber incidents linked to North Korea<\/a>\u2014including the 2014 Sony hack<\/a> and last year\u2019s attack on Bangladesh\u2019s Central bank<\/a>. However, the difference between previous incidents and WannaCry is the nature of the malware\u2019s autonomous propagation through networks<\/a> using the EternalBlue exploit, whereas previous Lazarus Group linked malware required greater intervention by the hackers, limiting the extent of its spread.<\/p>\n WannaCry has also focused international attention<\/a> on North Korea\u2019s<\/a> cyber capabilities<\/a>. Jim Lewis from CSIS noted that the Sony hack marked a steep change in the nature of North Korean cyber espionage and hacking activity. Lewis notes that before Sony North Korea focused on espionage and harassment of South Korean political targets<\/a>, but afterwards they\u2019ve increasingly used their skills for criminal activity to generate hard currency for the regime.<\/p>\n Various North Korean People\u2019s Army units<\/a> have been identified as being involved in cyber operations, but Unit 180 in the Reconnaissance General Bureau<\/a> has been most closely linked to WannaCry. Greg Austin from UNSW told a seminar in Canberra last week<\/a> that over 6,000 North Koreans are involved in various aspects of cyber operations including disrupting the South\u2019s military critical infrastructure and command and control systems. And over at the UN, the North Korean Sanctions Committee has warned members to be alert to North Korean hacking after one of its panel of experts was hacked<\/a>. The warning ominously noted that the hackers had gained \u2018very detailed insight\u2019 into the work of the committee.<\/p>\n Another infamous hacking group\u2014variously known as APT3, Gothic Panda and UPS\u2014has been linked to the Chinese Ministry of State Security (MSS) in a blog published by Intrusion Truth<\/em><\/a>, an anonymous cybersecurity blogging group. The post notes the links between two directors of the Guangzhou Boyu Information Technology Group (Boyusec)<\/a>, and the domains used by APT3 for their activities. Boyusec is also linked with Chinese technology firm Huawei, and the US Defense Department reportedly noted in an internal investigation in 2016<\/a> that Boyusec and Huawei had been cooperating to develop products with \u201cbackdoors\u201d installed<\/a> to enable future espionage activity. Intrusion Truth<\/em> believes that Boyusec is contracted to MSS through various intermediary state organs,<\/a> keeping with that agency\u2019s \u00a0conventional intelligence collection methods by utilising \u00a0commercial organisations as cover for intelligence collection. APT3 has previously been linked with cyber operations targeting both the US and Hong Kong<\/a>.<\/p>\n