{"id":3086,"date":"2017-06-19T13:37:42","date_gmt":"2017-06-19T20:37:42","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=3086"},"modified":"2019-08-19T13:42:06","modified_gmt":"2019-08-19T20:42:06","slug":"nation-states-in-the-ransomware-business","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/brief\/nation-states-in-the-ransomware-business\/","title":{"rendered":"Nation-states in the ransomware business"},"content":{"rendered":"
06\/19\/2017 Nation-states in the ransomware business<\/h5>\n
\n

Issue<\/strong><\/p>\n

Nation states are now confirmed to be using ransomware campaigns to fund state coffers. \u00a0 British National Cyber Security Center (NCSC) reported this week that the WannaCry ransomware attack was launched from North Korea.\u00a0 This follows the United States National Security Agency (NSA) assessment with the same conclusion.\u00a0 Security experts believe that the attack was launched by the Lazurus Group tied to the government in Pyongyang.
\nImpact
\nThis revelation further emphasizes the need for full backup, recovery and continuity plans to be tested and refreshed. \u00a0While most of our customers have a robust patching, backup and recovery processes in place, we see from news reports the impact WannaCry had on critical production networks. \u00a0Many organizations have lost their data, or access to critical systems while being locked out during a ransomware attack. \u00a0E.G. British National Health Service systems were crippled during the WannaCry attack
\nRecommendations<\/p>\n

InGuardians recommends reviewing, testing and validating your patching, and backup\/recovery processes. \u00a0Incident response\u00a0capabilities should be tested as well, guided by an internal Red Team exercise designed to emulate the\u00a0ransomware attack threat model. \u00a0InGuardians does not recommend paying for the return of your data. \u00a0See link below for new regulations that might impact the practice of paying your way out of ransomware.<\/p>\n

 <\/p>\n

Articles related to this issue:<\/strong><\/p>\n