Another Malware Attack

The hackers of wantacry are behind another malicious malware attack.
Call Us at I do I.T. to examine your computer and network security.
If it isn’t cybersecurity alerts of malware from one despotic regime, it’s warnings relating to another. Just as the world settles down post the Iranian cyber-hype in the aftermath of Suleimani, now multiple U.S. government agencies have warned of a newly intensifying threat from North Korea. Some of the malware is new and some of it is updated. And this particular state-sponsored threat group has pretty terrifying form—remember WannaCry?
As almost always these days, the hackers have mounted a phishing campaign to exploit weaknesses in non-hardened, non-governmental sectors. Defensive holes, lack of patching, network and IoT vulnerabilities and poor user training come to the fore. The objective is not political, it’s financial. The Pyongyang regime remains convinced that cyber attacks on commercial targets can help replenish the funds of the sanctions-stricken country.
“This malware,” says the U.S. government, “is currently used for phishing and remote access by [North Korean] cyber actors to conduct illegal activity, steal funds and evade sanctions.” The warning comes as a result “of analytic efforts between the U.S. Department of Homeland Security, the U.S. Department of Defense, and the FBI to provide technical details on the tools and infrastructure used by cyber actors of the North Korean government.”
Get In Touch
Share On Social Media
Other Recent Blog Articles
Phishing Scams: The Sneaky Threat Lurking in Portland’s Small Businesses – How PDX IT Services Can Help
In the bustling small business landscape of Portland, Oregon, every entrepreneur is focused on growth, innovation, and serving their community. But lurking in the shadows, a persistent and increasingly sophisticated…
Read MoreFrom “Oh No!” to “We Got This!”: Navigating Business Continuity & Disaster Recovery
Business Continuity vs. Disaster Recovery: A Holistic View At its core, Disaster Recovery (DR) is a subset of Business Continuity (BC). Think of BC as the overarching strategy that ensures…
Read More5 Cybersecurity Tips for Small Businesses
In today’s digital age, cyber threats are a constant concern for businesses of all sizes. Small businesses, often with limited resources, can be particularly vulnerable. A single data breach can…
Read More