Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

It’s Official: North Korea Is Behind WannaCry
Wall Street Journal ^ | Dec. 17, 2017 | Thomas P. Bossert

Posted on 12/18/2017 7:22:58 PM PST by Innovative

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-37 last
To: Innovative

North Korean nuclear weapons programs, with funding made possible by your most popular operating system.


21 posted on 12/18/2017 9:54:51 PM PST by familyop ("Welcome to Costco. I love you." --Costco greeter in the movie, "Idiocracy")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Innovative

https://www.washingtonpost.com/world/national-security/us-set-to-declare-north-korea-carried-out-massive-wannacry-cyber-attack/2017/12/18/509deb1c-e446-11e7-a65d-1ac0fd7f097e_story.html?utm_term=.8b21ae50afe9


22 posted on 12/18/2017 9:56:21 PM PST by Innovative ("Winning isn't everything, it's the only thing." -- Vince Lombardi)
[ Post Reply | Private Reply | To 2 | View Replies]

To: RetiredTexasVet

That’s what I was thinking also.

Our intelligence agencies are amoral and have screwed the pooch.


23 posted on 12/18/2017 10:28:35 PM PST by bkopto
[ Post Reply | Private Reply | To 11 | View Replies]

To: zeestephen

I receive on average one suspicious email a week that makes it through our corporate filter. One week though, I had one or two daily.

I contacted our I.T. dept for every one of them, had I.T. access my terminal to see its path etc, and then deleted the emails.

It’s a no-brainer that if you get ANY email from an unknown source, you NEVER EVER EVER click on any link inside unless you are in contact with your I.T. folks. Even then, you let THEM do the actual clicking so that you are NOT responsible for the potential consequences.

When in doubt, delete.


24 posted on 12/19/2017 1:47:43 AM PST by Don W (When blacks riot, neighbourhoods and cities burn. When whites riot, nations and continents burn.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: fishtank
Is that a real photo of those traitors in North Korea?


25 posted on 12/19/2017 1:56:52 AM PST by newfreep ("INSIDE EVERY PROGRESSIVE IS A TOTALITARIAN SCREAMING TO GET OUT" @HOROWITZ39, DAVID HOROWITZ)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Don W

I think half or so of all the infections is greenies/environmentalists seeing and clicking on emails using words like Green, Environmental, Planet, Trump, Climate, and so on in their excitement to be abreast of the latest aspects of their religion. Telling them not to open those emails just makes them angry ...


26 posted on 12/19/2017 3:47:55 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 24 | View Replies]

To: newfreep

Yes, if you search on Eric Schmidt (Google) and Bill Richardson , they went over there a few years ago.

Google is tutoring NK about how to run a police state.


27 posted on 12/19/2017 4:07:56 AM PST by fishtank (The denial of original sin is the root of liberalism.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Don W
It’s a no-brainer that if you get ANY email from an unknown source, you NEVER EVER EVER click on any link inside unless you are in contact with your I.T. folks. Even then, you let THEM do the actual clicking so that you are NOT responsible for the potential consequences….When in doubt, delete.

Very good advice. But you have to also be careful with “known” sources as well.

Just this morning I got an email that was from someone I know, FWIW gmail did put it in the spam folder and are very good about filtering these out of my inbox, but it contained a strange subject line and nothing but a link. I deleted without opening. It’s not the first time I’ve gotten suspicious emails appearing to be from this person I know.

At my previous job at a small payroll service provider, some years ago they got hacked and the resulting data breach nearly put them out of business.

As a result, they are super vigilant regarding emails. For one thing we have an add on to our Outlook to report suspicious emails to IT – a phishing alert button. We also have monthly IT security training. As to the emails, we can only send and receive emails containing confidential client information and attachments via a secure encrypted email service.

They also used a security service who will send out fake phishing emails to random employees to see whether they open and click on any links or report it to IT.

But even with that, hackers have gotten more and more sophisticated.

We would sometimes get suspicious emails from a client’s email addresses with attachments and or links and fortunately most of the time someone reported it, but once or twice, even with all the training, someone would fall for it, and soon, sometimes within minutes we were notified by IT not to open it if we received it and also confirming that they had contacted the client to tell them that their email had been hacked or was being spoofed.

About a month ago at work I got an email from what looked like Pizza Hut, very convincing looking, logos looked real and the email address came from what appeared to be from Pizza Hut, and with the subject line of something like, “Company Name” Loyalty Reward and a picture of a coupon for a free pizza, but inviting you to click on it to redeem. I reported as phishing and it was a phishing email.

At another job, I would occasionally get an email from someone internally, typically the CEO or company president, instructing me to initiate an emergency wire transfer to some vendor or open a link to a vendor’s unpaid invoice. Of course I knew right away it was a scam because I worked in PR/HR and not in AP. But a couple of times I got emails that looked very much like they came from our payroll provider ADP, sometimes saying “Urgent Action Required” or “Unpaid Invoice Attached”.

One thing that can be helpful is to look at the sender’s email address, while it may look legit and even contain the company’s name, it is often not the real company’s email. So an email from Pizza Hut might be pizzzahut.@pizsa.co. Note the extra z and the fake domain name.

You can also hover over a link without clicking on it to see that it is a fake link. But when in doubt, delete it and call the sender.

Also be aware of phishing phone calls. I’ve been getting a lot of these lately, including from utility slammers. And in the last two days a phone call purporting to be from my bank saying there was a problem with my account and asking me for the last 4 digits of my SSN and my date of birth for security purposes. I said no and hung up and called the legitimate 1-800 number of my bank and they confirmed there was no problem with my account and that it was a phishing scheme.

28 posted on 12/19/2017 4:51:16 AM PST by MD Expat in PA
[ Post Reply | Private Reply | To 24 | View Replies]

To: zeestephen
My impression is that 95% of these breaches are caused by idiot users who click on attachments or links in their personal email.

The human interface is ALWAYS the most vulnerable. That will never change.

29 posted on 12/19/2017 5:40:37 AM PST by paulcissa (Democrats want you unarmed so they can kill you.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Innovative

Maybe if we get enough MAGA congressits/$inators in office for President Trump.

They can declare cyber attacks like this, as acts of war similar to the attack on Pearl Harbor!

Then, President Trump can ask the new CIA and his military to to take out the cyber criminals regardless of where they are located.


30 posted on 12/19/2017 7:01:20 AM PST by Grampa Dave (Build Kate's wall! Keep illegals and illegal murderers/criminals out of America! MAGA! SLAP ACT!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeestephen

>>My impression is that 95% of these breaches are caused by idiot users who click on attachments or links in their personal email.

That, plus web sites. The malware and the delivery systems are very sophisticated. They use our own patterns of use against us and there is a balance of security and useability. People want easy access to the internet and connectivity across all their platforms. Easy access goes both ways.

Almost everyone is an “idiot” when it comes to information security. Back in my early IT days in the 80s, we had a saying that “User is a computer term that means idiot.” I used to have a coffee mug that said that.


31 posted on 12/19/2017 7:25:52 AM PST by Bryanw92 (Asking a pro athlete for political advice is like asking a cavalry horse for tactical advice.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Innovative
WannaCry?

Crying Mugshot Girl is upset.


32 posted on 12/19/2017 5:24:35 PM PST by SkyPilot ("I am the way and the truth and the life. No one comes to the Father except through me." John 14:6)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SkyPilot

But WAIT!

There’s MORE!!!

https://www.google.com/search?q=Crying+Mugshot+Girl&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiXq5jXvpfYAhWq54MKHV6NDnoQ_AUIDCgD&biw=1366&bih=652


33 posted on 12/19/2017 5:59:41 PM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 32 | View Replies]

To: Elsie
Invasion of the Bodysnatchers: I
 
 
 
 
 
 
Invasion of the Bodysnatchers: II
 
 
 
 
 
Invasion of the Bodysnatchers: III
 

34 posted on 12/19/2017 6:13:57 PM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 33 | View Replies]

To: RetiredTexasVet

Yup—way past time we can trust anything from .gov sources on this topic..way too easy to fake..and NK isn’t the only one who knows how to lie..


35 posted on 12/21/2017 9:16:49 AM PST by cgbg (Hidden behind the social justice warrior mask is corruption and sexual deviance.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: TigerLikesRooster; SunkenCiv; ETL
They work through Chinese Internet. Many are based in China. I don't know if they are still there after China started to implement ‘some’ part of international sanction.

Yes, China is preventing it nowadays, but Kim has an accomplice:

On October 1st, 38North and Dyn Research reported that Russia began providing an internet connection to North Korea. The Russian-provided infrastructure gives Pyongyang 60% more bandwidth and a second connection to the outside world ; China’s Unicom company had been North Korea’s sole internet provider since 2010.

The construction of the new internet connection follows a September 27th meeting between DPRK and Russian foreign ministry officials in Moscow. Russia’s extension of an internet connection to North Korea, as well as its reopening of a ferry route between the two, may indicate that Russia will seek sanction loopholes to strengthen their partnership.

https://www.forbes.com/sites/outofasia/2017/12/01/russia-is-now-providing-north-korea-with-internet-what-that-could-mean-for-cyber-warfare/

36 posted on 12/23/2017 12:44:51 AM PST by AdmSmith (GCTGATATGTCTATGATTACTCAT)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Innovative

This info is used to put pressure on NK. The info was in the public domain already in June:

British security officials believe that hackers in North Korea were behind the cyber-attack that crippled parts of the NHS and other organisations around the world last month, the BBC has learned.

Britain’s National Cyber Security Centre (NCSC) led the international investigation.
Security sources have told the BBC that the NCSC believes that a hacking group known as Lazarus launched the attack

http://www.bbc.com/news/technology-40297493


37 posted on 12/23/2017 12:47:55 AM PST by AdmSmith (GCTGATATGTCTATGATTACTCAT)
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-37 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson