Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Symantec Suggests Close Ties Between Lazarus Group and WannaCry Havoc


Symantec a company renowned for technical security has released new research which greatly indicates that the WannaCry ransomware assault was the making of Lazarus Group.


Symantec a cyber-security firm opines that the recent cyber attacks have certain close link with Lazarus Group of hackers who were responsible for the online assaults against Bangladesh's apex bank and Sony Pictures, owing to similarities of code, tools as well as infrastructure the hackers utilized.


Lazarus is condemned for one assault in 2014 against Sony as well as stealing USD 81m (6.2m pounds) out of the central bank of Bangladesh.


Symantec posts on its blog that considerable similarities within the methodologies, tools as also infrastructure the attackers employed have prompted it to reach the conclusion that Lazarus was responsible for instigating the WannaCry assault. Bbc.com posted this, May 23, 2017.


Specialist on North Korea and based in USA, Michael Madden states that Unit 180 is among the several elite collectives for cyber warfare within the intelligence community of Kim the dictatorial leader of North Korea. He says that recruitment of the personnel is from students belonging to senior-middle schools while they are given advanced training.


In the week of 15th, Symantec presented clues that indicated that Lazarus had connection with the NHS assaults as well as the worldwide cyber-emergency thereafter which the WannaCry ransom software caused. Currently, the security company strongly indicates that there's a great possibility that Lazarus was responsible for WannaCry's dissemination.


Symantec did one thorough examination of WannaCry followed with making its comparison with earlier digital weapons that the Group employed. The company's researchers discovered close commonalities within WannaCry and those earlier malicious programs Lazarus used in its assaults.


According to technical director Vikram Thakur for Symantec Security Response, while the certainty level was very high about the attackers employing identical tools that Lazarus Group employed, the failed campaign definitely tells that no nation state was behind the job that would have been more sophisticated.


Additionally according to Symantec, the assault's nature indicated that it hadn't been executed at the behest of North Korea, while the country has said it wasn't involved with WannaCry.

» SPAMfighter News - 5/29/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page