US Fingers North Korea for Wanna Cry Epidemic
US Fingers North Korea for WannaCry Epidemic
The United States on Tuesday accused North Korea of responsibility
for a global ransomware attack that locked down more than 300,000 computers in
150 countries earlier this year.
The U.S. now has enough evidence to support its assertion that
Pyongyang was behind the WannaCry attack in May, Homeland Security Advisor Tom
Bossert told reporters at a White House press briefing.
Bossert made the same accusation in an op-ed published Monday
in The Wall Street
Journal.
If the United States has new evidence linking North Korea to
WannaCry, however, it hasn't released any of it to the public, which could pose
problems.
"Accurate attribution for cyberattacks is almost always a
difficult task, and it's doubly so when the evidence leading to the conclusion
can't be shared," noted Tim Erlin, vice president of product management
and strategy at Tripwire.
"If we're going to have national security organizations
delivering these types of conclusions on attribution to the public, we need to
find a way to develop trusted output. The mantra of 'trust us' doesn't cut it
here," he told TechNewsWorld.
The Problem With Attribution
Speculation has connected North Korea to WannaCry since June, when
the NSA said it believed Pyongyang was behind the attack. The British
government reached the same conclusion in October, and the CIA concurred in
November.
While there is evidence indicating that North Korea launched the
ransomware virus, that evidence isn't definitive, maintained James Scott, a
senior fellow at theInstitute for Critical Infrastructure Technology.
"It is important to understand that attribution is rarely
definitive because adversaries can easily obfuscate their actions using
technical anti-analysis maneuvers," he told TechNewsWorld.
"They plant false indicators to mislead attribution," he
continued. "They leap-frog through multiple foreign networks and systems,
they outsource layers or the entirety of their attacks to cyber mercenaries,
and they utilize malware available to multiple adversaries from Deep Web
markets and forums."
Lazarus Connection
One strong indicator of North Korea's involvement with WannaCry is
the malware's connection to the Lazarus Group, which has been tied to
Pyongyang, observed Chris Doman, a threat engineer at AlienVault.
There are two data points that link Lazarus to WannaCry, he told
TechNewsWorld: a number of rare code overlaps exist in the programs; and
Lazarus planted an early version of WannaCry on a Symantec customer.
"The U.S. government may have additional information, but the
evidence provided at the time by the private sector was pretty strong,"
Doman said.
The evidence linking Lazarus to Pyongyang is equally strong, he
added. "There are a very small number of publicly assigned Internet
addresses assigned to North Korea, and they pop up in Lazarus attacks. The
attacks have dated back to at least 2007, and often contain other clues, such
as North Korean fonts."
The Gang That Couldn't Code Straight
Although the evidence is circumstantial, the case that North Korea
was behind WannaCry is a good one, said Scott Borg, CEO of the U.S.
Cyber Consequences Unit.
"WannaCry was incompetently written and managed -- so we're
attributing to North Korea something that's well within its capabilities,
because it didn't demonstrate a lot of capabilities," he told
TechNewsWorld. "Unlike some of the other things that have been attributed
to North Korea, this is plausible and highly likely."
A number of recent reports have touted North Korea as a rising
cyberpower, but Borg disputes that.
"WannaCry is an example of North Korea's limitations. This
was not a competently written piece of ransomware. The whole thing was badly
bungled," he said.
"I'm sure the criminal organizations making money off of
ransomware were furious with the creators of WannaCry because they undermined
the credibility of the whole racket," Borg added.
Why Now?
Since there was strong public evidence of North Korea's connection
to WannaCry for months, the timing of the U.S. condemnation may be tied to
other concerns.
For example, the United States may want to shine a spotlight on
Lazarus.
"Lazarus has been particularly active recently,"
AlienVault's Doman said. "I'm seeing numerous new malware samples from
them daily. A lot of their current activity involves stealing bitcoin and
credit card numbers."
The condemnation also comes on the heels of the administration's
announcement of a new security policy.
"They may have felt this was an appropriate time because they
were going to be reaching out to other countries to do something about the
cybersecurity threat and bad actors like North Korea," James Barnett, a
former Navy Rear Admiral and head of the cybersecurity practice at Venable,
told TechNewsWorld.
Locked Armory
The timing of the condemnation also could be part of the White
House's campaign to paint Pyongyang as a global threat.
"It's more about the administration's message that North
Korea is a dangerous actor than it is about cybersecurity," said Ross
Rustici, senior director of intelligence services for Cybereason.
"They're trying to lay the groundwork for people to feel like
North Korea is a threat to the homeland," he told TechNewsWorld.
Whatever response the administration decides to make to North
Korea's cyberattacks remains to be seen, but financial problems could render it
a hollow one, according to Kris Lovejoy, president of BluVector.
"The U.S. government's ability to procure technology to
protect public sector institutions and private sector infrastructure is
hampered because there's no ability to execute on its procurement
processes," she told TechNewsWorld. "It's ironic that we're rattling
our sabers while we've locked the cabinet and not allowed ourselves to get to
the armor."
No comments: