Thank North Korea for WannaCry Cyber Attack

 

WannaCry-ransomeware-crimeshop

 

Cyber Attack to be Blamed on North Korea

us-vs-north-korea-crimeshop

On Tuesday it is expected that Trump Administration is in fact going to go ahead and blame North Korea for the cyber attack WannaCry that crippled the countries around the globe earlier this year.

wannacry-ransomware-lazarus-group-north-korea-crimeshop.jpeg

The Trump administration has asserted that the Lazarus Group, the group that carried out the global attack, actually works for the North Korean Government.

The news has caused global worry as tensions between the US and North Korea have been steadily increasing the past few months.

The North Korean government does also deny that they were behind any such attack let alone do they pay off or employ anyone within the Lazarus Group to carry out any type of cyber attacks.

Of course the popular belief is that the Lazarus Group is also responsible for the 2014 attack on Sony Pictures in what is suspected as retaliation because of the upcoming release of the movie “The Interview” which depicted Kim Jong-un in less than favorable light.

Some have suggested as well that WannaCry was released as nothing more than pure accident as hackers were simply developing code however, the suggestion still points a very clear finger in the direction of North Korea.

The announcement tomorrow will not please North Korea as most of us already know and it could very well lead to more threats or worse yet an actual attack of some sort.

us-is-considering-a-direct-strike-against-north-korea--crimeshop

What could be worse than pissing off a nation that has nuclearized weapons and pretty good cyber weapon capabilities?

us-war-china-russia-crimeshop

As luck would have it, hitting the wires today came the announcement that both China and Russia are training together should the US invade North Korea.

Oh and they are not training to fight with the US or her allies by the way.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

New Ransomware Attack Strikes – Russia and Ukraine

 

bad-rabbit-attack-Crimeshop

 

Bad Rabbit Ransomware – Coming to a Country Near You Soon!

 

First can I just ask who in God’s name is naming some of this ransomware because dubbing the newest attack “Bad Rabbit” gives me nightmares about a horror movie I once saw as a child from 1972 entitled “Night of the Lepus.”

 

night-of-the-lepus-CrimeShop

 

This newest attack has already hit Russia and Ukraine and according to US officials, this newest attack has hit several other countries in addition to Russia and Ukraine, they have seen it hit Germany, Poland, South Korea and Turkey as well, so far.

News reports from the US are currently filtering in, slowly but the attack has in fact hit the United States, no word yet on how many have been affected.

Since the majority of the victims from this attack as it stands as of right now have been in Russia, it is fair to assume that Russia may have been the intended target here.

 

WannaCry-ransomeware-crimeshop

 

It does actually bare some pretty eerie similarities to WannaCry and Peyta, Malware analyst Amit Serper, principal security researcher of Cybereason,  did happen to release a tweet with instructions for stopping the attack from happening.

 

kim-jong-un survives-US assassination-plot-crimeshop

 

I almost hate to say it here, I have just one very small suspicion that this might be the work of some government somewhere in the world that simply wants to prove a point.

Bad Rabbit is for sure coming to a country near you sooner rather than later, but I bet you won’t be seeing it hit North Korea, any time in the near future.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

 

 

 

North Korea Launched WannaCry Ransomeware?

 

WannaCry-ransomeware-crimeshop

 

Ransomeware – Cyberwarfare

According to newly released intel by the UK’s National Cyber Security Centre it was discovered that recent cyber attacks, namely WannaCry was tied to the North Korean-affiliated hacking team Lazarus Group.

This is the team by the way that launched huge cyber attacks on Sony Pictures as revenge over the movie The Interview.

What’s more is that the President of Microsoft has confirmed to the media that the government of North Korea was responsible for the WannaCry attack.

Oddly, no one seems shocked by this news but they should be because North Korea has also been blamed rather recently for attempting to launch a cyber attack on power grids here in the US.

 

us-vs-north-korea-crimeshop

 

I believe that I have mentioned this before, North Korea has been pretty quiet, sitting in the corner and building its army pretty relentlessly for quite a few years here and they are about to get a new friend in Iran if Trump continues on his ill advised back out of the Iran Nuclear deal.

 

us-election-russia-hack-crimeshop

 

We can’t forget Russia either, Putin does get around and he tends to play all of the sides that he can. Russia bed’s with the best possible partner that could be of a benefit to Russia.

So Pyongyang was behind the WannaCry hack, that utilized cyber weapons that were in fact stolen from the National Security Agency here in the US and our government is still going on and on about Russian sponsored fake news, ads, social media accounts.

Forgive me here but isn’t that pretty much child’s play compared to the likes of WannaCry, nuclear war and North Korea showing the world just how powerful they really are?

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Marcus Hutchins – Discovers Killswitch for WannaCry, Gets Arrested by the FBI

Surfer Who Saved World From WannaCry Attack Prepares For Next Wave

WannaCry Hero Who Stopped the Global Cyber Attack – Arrested?

Marcus Hutchins who was responsible for stopping WannaCry from its global cyber attack, was found to be a wanted individual and by wanted I mean by the FBI of course.

petya-wannacry-goldeneye-ransomware-Crime-Shop

Marcus who is 23, hailed as a hero for saving the NHS from cyber criminals, was at a hacking conference in Las Vegas when he was arrested by the FBI.

In an indictment that was released by the US Department of Justice it was revealed that dear old Marcus faces at least 6 counts of helping to create, spread and maintain the banking Trojan Kronos between 2014 and 2015.

The banking Trojan Kronos was spread through emails that contained malicious attachments which victims would click on and install onto the user’s computer, once installed it allowed thieves to steal money using credentials such as internet banking passwords.

In the 8 page indictment that was filed in Wisconsin, a U.S. Attorney accuses Marcus of creating the app and at least one unnamed other person of conspiring to sell the app on AlphaBay, an underground website that was seized by law enforcement in early July.

That “other” person? Well they have yet to be named.

The indictment also happens to charge Marcus and the mystery co-defendant with using a device to intercept communications in violation of the Wiretap Act.

It does not however, specify the nature of the device, but recent court cases suggest utilizing such a “device” can also refer to software and apps.

After having discovered the “killswitch” for WannaCry Marcus did attempt to keep a low profile and stay out of the media spotlight and as it turns out, for good reason.

And as for the mystery co-defendant? Well everyone is wondering why the FBI has made the decision to redact that individual’s name from the indictment, the only real good reason they would have were if that individual were actually cooperating with them.

As for Marcus, well he should have stayed out of the whole WannaCry situation but even sometimes cybercriminals are super competitive and perhaps he wanted to one up those behind WannaCry.

Of course, being that he may have been behind the banking Trojan Kronos, his playing around and actually finding the killswitch to WannaCry would cause concern for the FBI, while he may have released the info about discovering the killswtich, he might have found something else that, for him would have been more of a benefit to aid in committing future cybercrimes.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Global ransomware epidemics – Are Here to Stay

Computer security and hacking concept. Ransomware virus has encrypted data in laptop. Hacker is offering key to unlock encrypted data for money.

WannaCry, Petya, GoldenEye – With More to Follow Any Day Now

Someone mentioned to me today that a news outlet published an article today or yesterday that suggested that the global ransomware epidemic was pretty much here to stay.

I almost spit out my coffee laughing because many security experts, writers and other major news outlets, myself included, have been warning the world about this issue for well over a year now.

News Flash: This is Not Surprising, it’s hardly even new news these days.

Ransomware has been around for years however it was used to only target individual networks, such as a single business, hospital or person.

After the infamous Shadow Brokers hacker group leaked the National Security Agency exploits back in April, cyber-criminals were able to learn about a more dangerous weapon.

petya-wannacry-goldeneye-ransomware-Crime-Shop

The kind that can strike on a global level.

But is that really all that true? I mean, I love poking fun at the NSA for losing the intel in the first place but…

Anytime you see that someone, anyone is capable of widespread hacking, you should automatically assume they or another someone or group is capable or nearly capable of global hacking, ransomware, the ability to steal data on a global level and gain access to major networks including those that are tasked with running things like banking systems, power grids and governments just to name a few.

It is not like these guys are stupid, we make the mistake of assuming that no one else in the entire world other than the NSA or any government for that matter is capable of and working on developing cyber weapons like WannaCry, Petya or GoldenEye.

NSA-Ransomware-Crime_Shop

That is so far from the truth it is not even remotely funny. Just because a cyber-criminal hasn’t used a cyber weapon such as this before does not necessarily mean they haven’t developed it or are not working on it.

These guys could have very well been waiting for some type of leak, before moving forward with unleashing the weapon that they created so that they could tweak for instance the NSA’s weapon so that it would be more difficult to trace back to the point of origin.

Usually eventually one can figure out who created what cyber weapon by pouring through the code after all, so in an attempt to disguise that, so if it were me, I would use someone else’s cyber-weapon with that someone else’s code and tweak it just slightly enough to change it without giving away from what country I am in, or what group I am part of and so on.

The point is, without a doubt, cyber-criminals were already moving in this direction believe it or not. Criminals on any level who do not want to become upstanding citizens spend a good majority of their time thinking of new and improved ways around the laws, and that includes new and improved ways of breaking the law, ways that are less detectable by law enforcement.  

Those in the business of committing cyber-crimes are no different than any other type of criminal in that respect.

So no, global epidemics of ransomware being unleashed is not going anywhere soon, new and improved weapons are already being made and developed so as to unleash.

We’ll all have to find better security measures, but a word of caution, much like the flu virus every year, the one we get flu shots for,  we will not truly know how to protect ourselves or whether or not our newest security measures will actually work, until we know what kind of virus we are facing as each new attack is released.

Last but not lease, some of these attacks may also be disguised as mere ransomware, they could actually end up being something much worse that we have yet to learn about.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

 

 

New and Improved Cyber Attack Spreading Across the Globe 

massive-global-cyber-attack-crime-Shop.jpg

U.S. National Security Agency – The World Thanks You!

 

Once again we are seeing a global cyber attack spreading today and, the attack is causing massive disruptions around the world today.

Pharmaceutical company Merck became the first more well known U.S. company impacted by the ransomware. They made an announcement sometime around the middle of the day stating that it’s computer network had been compromised.

The Ukraine so far has been hit the hardest, its government and company officials have reported serious intrusions across the Ukrainian power grid, banks and government offices.

Rosneft which is Russia’s top oil producer and Danish shipping giant A.P. Moller-Maersk were hit hard as well as the the largest advertising company in the world, Britian’s W.P.P.

While no one is quite sure who might be responsible for today’s attacks, security experts are saying that the attack’s are similar to ransomware and even more curious or maybe not so much, the attacks are eerily similar to last month’s WannaCry.

-nsa-crimeshop.jpg

Ironically, both are utilizing tools that were created by, you guessed it, none other than the U.S. National Security Agency.

This particular piece of ransomware is deeply concerning because some suspect that it is a worm, meaning it is self-spreading software, which can in turn spread rapidly, without human intervention. It runs on it’s own once inside.

It is akin to having the flu and coughing inside an elevator without covering one’s mouth while the virus inside of that person is still contagious. Everyone on the elevator is at risk at becoming ill.

It never ceases to amaze that while the U.S. National Security Agency loves to play with fire, they have yet to learn how to put the fires out.

Bravo U.S. National Security Agency, you’ve really outdone yourselves this time, by creating a cyber weapon that is full of loopholes and flaws, that somehow managed to escape the confines of the NSA and fall into the hands of those who just want to watch the world burn.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

U.S. National Security Agency Shuts down Honda Factory

U.S.-National-Security-Agency-Crime-Shop

NSA – WannaCry/Wcry ransome worm

Well folks in the gift that just keeps on giving, the NSA has managed to shut down a Honda Factory after they found the WannaCry/Wcry ransome worm in its networks.

WannaCry-Wcry-Crime-Shop

Not that the NSA directly shut the factory down, it was however indirect because WannaCry/Wcry was derived after all at and by the NSA.

According to a report released today by Reuters, the automaker had to shut down its Sayama plant northwest of Tokyo on Monday after finding that WCry had affected networks across Japan, North America, Europe, China, and other regions.

the-shadow-brokers-crime-Shop

Forget Russian hacking, look at all the damage the NSA has managed to cause. Which we would not have known about had it not been for the Shadow Brokers, who obtained the code for this beauty and released it to the public back in April.

WannaCry/Wcry is basically a weaponized exploit developed, used, by the NSA. It was also in shocking news, stolen from the NSA.

Honda officials for some odd reason did  explain how or why engineers found WCry in their networks 37 days after the kill switch was activated although, it is highly possible that engineers had mistakenly blocked access to the kill-switch domain.

That kill switch by the way was created by sheer luck. A security researcher who had been playing around and acting out of curiosity just so happened to register a mysterious domain name contained in the WCry code that subsequently acted as a global kill switch which immediately halted the self-replicating attack.

I’m more than sure someone is developing ways around that sort of kill switch, I mean if you are in the business of stealing data, and shutting the internet down, power grids, hospitals and the like, you wouldn’t want to be stopped, so advertising the fact that some guy was able to create a kill switch by accident, only entices new developers to create ways around any type of kill switch.

At any rate, here’s to the NSA for not managing to keep it’s top secret weaponized exploits from falling into the the wrong hands or rather from falling out of it’s very own front door.

Does the NSA even know about all the of intel has left it’s facility or will we have to wait on someone like Shadow Brokers to inform us, the hard way…again?

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

 

 

 

 

 

 

 

U.S. – National Security Agency – Special thanks to you

donald-trump-poison-crimeshop

Cyberattack hit 99 countries

The NSA’s stolen goods

internet-of-things-the-crime-shop

Personally, I would not trust the NSA with the password to my junk email account much less my grocery list.

This week we saw one of the worst cyberattacks in history, one that utilized some goods that walked out the door of the NSA. Europe and Russia were hit the worst by the way.

What makes it worse is that the NSA and the United States just sat by in painful silence as the attack was underway. The true hero’s came from the cyber security community.

To those that created the attack, my hats off to you, kudos for pointing out the most obvious flaw of all.

The NSA designed the program that was used to cause the attack and did absolutely nothing to help those that were affected which leads me to believe that while they may be able to create Frankenstein, they have very little idea as to how to stop it once it’s on a roll which is a pretty important detail to miss.

I’d be more impressed once I see power grids, the banking system, governments shut completely down, unlimited funds in my Starbucks account, etc. Thus far however all we have is enough to create some media fluff and 99 countries who are all lined up to thank the NSA for creating the bug, yet who seemingly couldn’t fix the monster that which they created.

Way to take a back seat guys.

To those that caused the attack, do something to impress next time. I mean really impress instead of create just some fluff. 

Wow me.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop