In this 2015 photo, Stijn Vanveerdeghem (left), an engineer with Cisco, shows graphics with live wireless traffic to FedEx employee Barry Poole during the RSA Conference in San Francisco, where threat analysts, security vendors and corporate IT administrators gathered to talk about malicious software, spear-phishing and other attacks that can steal money or secrets from companies and consumers. (AP Photo/Marcio Jose Sanchez, File)

In this 2015 photo, Stijn Vanveerdeghem (left), an engineer with Cisco, shows graphics with live wireless traffic to FedEx employee Barry Poole during the RSA Conference in San Francisco, where threat analysts, security vendors and corporate IT administrators gathered to talk about malicious software, spear-phishing and other attacks that can steal money or secrets from companies and consumers. (AP Photo/Marcio Jose Sanchez, File)

Experts see possible North Korea links to global cyberattack

By YOUKYUNG LEE / Associated Press

SEOUL, South Korea — Cybersecurity experts are pointing to circumstantial evidence that North Korea may be behind the global “ransomware” attack: the way the hackers took hostage computers and servers across the world was similar to previous cyberattacks attributed to North Korea.

Simon Choi, a director at South Korean anti-virus software company Hauri Inc. who has analyzed North Korean malware since 2008 and advises the government, said Tuesday that the North is no newcomer to the world of bitcoins. It has been mining the digital currency using malicious computer programs since as early as 2013, he said.

In the attack, hackers demand payment from victims in bitcoins to regain access to their encrypted computers. The malware has scrambled data at hospitals, factories, government agencies, banks and other businesses since Friday, but an expected second-wave outbreak largely failed to materialize after the weekend, in part because security researchers had already defanged it .

Choi is one of a number of researchers around the world who have suggested a possible link between the “ransomware” known as WannaCry and hackers linked to North Korea. Researchers at Symantec and Kaspersky Lab have found similarities between WannaCry and previous attacks blamed on North Korea.

The evidence is still far from conclusive, however. Authorities are working to catch the extortionists behind the global cyberattack, searching for digital clues and following the money.

“We are talking about a possibility, not that this was done by North Korea,” Choi said.

HOW IT WORKED

WannaCry paralyzed computers running mostly older versions of Microsoft Windows in some 150 countries. It encrypted users’ computer files and displayed a message demanding $300 to $600 worth of the digital currency bitcoin to release them; failure to pay would leave the data scrambled and likely beyond repair .

The hackers appeared to have taken control of computers and servers around the world by sending a type of malicious code known as a worm. The worms quickly scanned computers with vulnerability, in this case the older versions of Microsoft Windows, and used those computers as hackers’ command and control centers.

Experts say that the rapid spread of the worm globally suggests it did not rely on phishing, a method whereby an email is sent to people with the aim of having them click on infected documents or links.

Rather, analysts at the European Union cybersecurity agency say the hackers likely scanned the internet for systems that were vulnerable to infection and exploited those computers remotely.

The worm then is likely to have spread through a channel that links computers running Microsoft Windows in a network. The channel is typically used to share files within a network or to link to a printer, for example.

THE NORTH KOREA LINK

This method has been found in previously known North Korean cyberattacks, including the Sony hack in 2014 blamed on North Korea.

“Since a July 2009 cyberattack by North Korea, they used the same method,” Choi said. “It’s not unique in North Korea but it’s also not a very common method.”

Choi also cited an accidental communication he had last year with a hacker traced to a North Korean internet address who admitted development of ransomware.

The Russian security firm Kaspersky Lab has said portions of the WannaCry program use the same code as malware previously distributed by the Lazarus Group, a hacker collective behind the 2014 Sony hack. Another security company, Symantec, has also found similarities between WannaCry and Lazarus tools.

But it’s possible the code was simply copied from the Lazarus malware without any other direct connection.

If North Korea, believed to be training cyber warriors at schools, is indeed responsible for the latest attack, Choi said the world should stop underestimating its capabilities and work together to think of a new way to respond to cyber threats, such as having China pull the plug on North Korea’s internet.

“We have underestimated North Korea so far that since North Korea is poor, it wouldn’t have any technologies. But North Korea has been preparing cyber skills for more than 10 years and its skill is significant. We should never underestimate it,” Choi said.

FOLLOW THE MONEY

Researchers might find some additional clues in the bitcoin accounts accepting the ransom payments. There have been three accounts identified so far, and there’s no indication yet that the criminals have touched the funds.

Although bitcoin is anonymized, researchers can watch it flow from user to user. So investigators can follow the transactions until an anonymous account matches with a real person, said Steve Grobman, chief technology officer with the California security company McAfee.

But that technique is no sure bet. There are ways to convert bitcoins into cash on the sly through third parties. And even finding a real person might be no help if they’re in a jurisdiction that won’t cooperate.

TELL-TALE SIGNS

James Lewis, a cybersecurity expert at the Center for Strategic and International Studies in Washington, said U.S. investigators are collecting forensic information — such as internet addresses, samples of malware or information the culprits might have inadvertently left on computers — that could be matched with the handiwork of known hackers.

Investigators might also be able to extract some information about the attacker from a previously hidden internet address connected to WannaCry’s “kill switch.” That switch was essentially a beacon sending the message “hey, I’m infected” to the hidden address, Weaver said.

That means the very first attempts to reach that address, which might have been recorded by spy agencies such as the NSA or Russian intelligence, could lead to “patient zero” — the first computer infected with WannaCry. That, in turn, might further narrow the focus on possible suspects.

THE PLAYERS

Forensics, though, will only get investigators so far. One challenge will be sharing intelligence in real time to move as quickly as the criminals — a tricky feat when some of the major nations involved, such as the U.S. and Russia, distrust each other.

Even if the perpetrators can be identified, bringing them to justice could be another matter. They might be hiding out in countries that wouldn’t be willing to extradite suspects for prosecution.

“It can take months or even years to gather all the evidence and build a case,” said Costin Raiu, head of Kaspersky’s global research and analysis.

Anick Jesdanun and Barbary Ortutay in New York, Lori Hinnant in Paris and Deb Riechmann in Washington contributed to this story.

Talk to us

> Give us your news tips.

> Send us a letter to the editor.

> More Herald contact information.

More in Local News

Bothell
Bothell man charged with the murder of his wife after Shoreline shooting

On Tuesday, the 43-year-old pleaded not guilty in King County Superior Court.

Five Snohomish County men named in drug and gun trafficking indictments

On Tuesday, federal and local law enforcement arrested 10 individuals in connection with three interrelated drug and gun trafficking conspiracies.

Snohomish County Sheriff Susanna Johnson speaks at a press conference outside of the new Snohomish County 911 building on Wednesday, April 30, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
County sheriff working to fix $15M in overspending

In a presentation to the County Council, Sheriff Johnson said she’s reducing overtime hours and working to boost revenue with a new 0.1% sales tax.

A Sound Transit bus at it's new stop in the shadow of the newly opened Northgate Lightrail Station in Seattle. (Kevin Clark / The Herald)
Sound Transit may add overnight bus service between Everett, Seattle

The regional transit agency is seeking feedback on the proposed service changes, set to go into effect in fall 2026.

The Edmonds School District building on Friday, Feb. 14, 2025 in Lynnwood, Washington. (Olivia Vanni / The Herald)
Mother sues Edmonds School District after her son’s fingertip was allegedly severed

The complaint alleges the boy’s special education teacher at Cedar Way Elementary closed the door on his finger in 2023.

Pedal-free electric bikes are considered motorcycles under Washington State law (Black Press Media file photo)
Stanwood Police: Pedal-free e-bikes are motorcycles

Unlike electric-assisted bikes, they need to be registered and operated by a properly endorsed driver.

The aftermath of a vandalism incident to the Irwin family's "skeleton army" display outside their Everett, Washington home. (Paul Irwin)
Despite vandalism spree, Everett light display owners vow to press on

Four attacks since September have taken a toll on Everett family’s Halloween and Christmas cheer.

Students, teachers, parents and first responders mill about during a pancake breakfast at Lowell Elementary School in 2023 in Everett. If approved, a proposed bond would pay for a complete replacement of Lowell Elementary as well as several other projects across the district. (Ryan Berry / The Herald)
Everett school board sends bond, levy measures to Feb. ballot

The $400 million bond would pay for a new school and building upgrades, while the levy would pay for locally funded expenses like extra-curriculars and athletics.

Edgewater Bridge construction workers talk as demolition continues on the bridge on Friday, May 9, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Edgewater Bridge construction may impact parking on Everett street

As construction crews bring in large concrete beams necessary for construction, trucks could impact parking and slow traffic along Glenwood Avenue.

Customers walk in and out of Fred Meyer along Evergreen Way on Monday, Oct. 31, 2022 in Everett, Washington. (Olivia Vanni / The Herald)
Closure of Fred Meyer leads Everett to consider solutions for vacant retail properties

One proposal would penalize landlords who don’t rent to new tenants after a store closes.

People enjoy Cavalero Hill Park that is now under the ownership and management of the City of Lake Stevens on Oct. 21, 2025 in Lake Stevens, Washington. (Olivia Vanni / The Herald)
Lake Stevens is requesting designs for Cavalero Hill Park development

Firms have until Dec. 10 to submit proposals to plan, construct and manage a multi-use recreation complex.

People walk through Explorer Middle School’s new gymnasium during an open house on Oct. 7, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Everett middle school celebrates opening of new gym

The celebration came as the Mukilteo School District seeks the approval of another bond measure to finish rebuilding Explorer Middle School.

Support local journalism

If you value local news, make a gift now to support the trusted journalism you get in The Daily Herald. Donations processed in this system are not tax deductible.