N. Korean Hackers Plan to Devastate UK

Hacking groups linked to North Korea will continue to devastate the UK with major cyberattacks over the next year, former GCHQ director Robert Hannigan has warned.

Referencing WannaCry, a malware outbreak which has been linked to the rogue state, the ex-spy chief said there will be "more collateral damage and more unintended consequences."
"The technical sophistication of the threats is going to get worse, without question," Hannigan said during a recent FT cybersecurity summit in the heart of London. "We'll see more ransomware, we'll see a greater scale of attacks," he added.

WannaCry, a rapidly-spreading form of ransomware, emerged back in May and eventually affected hundreds of thousands of computers in 150 countries.

In the UK, the National Health Service (NHS) was hit in the cyber-assault. It was not specifically targeted, but instead was a victim of what Hannigan branded "collateral damage."

According to data released by the National Audit Office (NAO), nearly 20,000 appointments were disrupted by the incident. An independent audit found "basic IT procedures" could have halted the hack. 

Hannigan voiced concern about the overlap of state and crime in cyberspace. He noted: "The critical thing is that there are players out there now behaving badly enough not really to care.
"Either because they don't have a stake in the international system, or they have a stake but actually, that's a threshold of damage that they can live with in order to deliver whatever effect they want to deliver. And they would expect the rest of the world just to live with that.

"I think we will see more of that - more collateral damage and more unintended consequences."

While attribution will never be 100% concrete, a clandestine unit known as "Lazarus Group" was linked to the WannaCry outbreak by similarities in hacking tools spotted in other incidents.

UK security minister, Ben Wallace, told the BBC in October the government "quite strongly" believed North Korea was responsible for the cyberattack on the healthcare system.
"I obviously can't go into the detail of intelligence, but it is widely believed in the community and across a number of countries that North Korea had taken this role," he said.
Hannigan quit as GCHQ chief in January this year, citing personal reasons. In September, it emerged he had been appointed as cybersecurity advisor to insurance firm Hiscox UK and Ireland. However, his stance on hacking has been echoed by those still working for the government.

In late October, National Cyber Security Centre (NCSC) chief Ciaran Martin warned that he expected a "significant scale attack" on the UK is likely to take place in the coming years.
"WannaCry was really a reasonably sophisticated tool, used rather ineptly," he commented.
"They will learn from that. People always do. They will get better at using those tools, and there are far more sophisticated tools out there, and they will start to use them." 

He added: "If you look at the NHS, nobody would seriously believe that the North Koreans wanted to attack the NHS, and not least because they were never going to pay a ransom."

IBTimes:

You Might Also Read: 

N.Korea Will Target UK Financial Services:

Former Spy Chief Takes Top Cybersecurity Job:

Director's Departure Leaves A Big Hole At GCHQ:

Spying On You In Britain:
 

« When Guns And AI Work Together
Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.