Hi folks,
This is quite interesting. I’ve published several longer posts on ransomware through my Vocal posts on this blog, and while I’d love to write about this one, it is definitely something that can speak for itself. We’ve definitely learned quite a lot since last week’s publishing of my longer piece on Vocal. Like I’ve said before, we’ve got to use our heads, as this has to start somewhere, probably with a phish. I don’t believe this was started by someone using Shodan from that location, and spewing the net with port 445 scans and infecting all of that. Luckily, very little was spent on notes although $110,000 is nothing to sneeze at. The article also continues to say that only 250,000 machines and 150 countries. This thing could’ve been worse.
Before I give you the article, Security Now reported that someone was looking to take the domain offline, unleashing this thing to cause more havoc. Not sure if it was successful, but something to keep in mind.
Now, to the article and its link.
But a Chinese-language link doesn’t shoot down theories of the North Korean Lazarus Group’s involvement in the ransomware worm attacks, say language experts at Flashpoint.
Source: WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows