Japan to beef up missile defense system against N Korea
WASHINGTON: The Trump administration has publicly blamed North Korea for unleashing the so-called WannaCry cyber attack that crippled hospitals, banks and other companies across the globe earlier this year. “The attack was widespread and cost billions, and North Korea is directly responsible,” Tom Bossert, homeland security adviser to President Donald Trump, wrote in a piece published on Monday night in the Wall Street Journal.
“North Korea has acted especially badly, largely unchecked, for more than a decade, and its malicious behavior is growing more egregious,” Bossert wrote. “WannaCry was indiscriminately reckless.” The White House was expected to follow up with a more formal statement blaming Pyongyang, according to a senior administration official. The US government has assessed with a “very high level of confidence” that a hacking entity known as Lazarus Group, which works on behalf of the North Korean government, carried out the WannaCry attack, said the official, who spoke on condition of anonymity to discuss details of the government’s investigation.
Lazarus Group is widely believed by security researchers and US officials to have been responsible for the 2014 hack of Sony Pictures Entertainment that destroyed files, leaked corporate communications online and led to the departure of several top studio executives. North Korean government representatives could not be immediately reached for comment. The country has repeatedly denied responsibility for WannaCry and called other allegations about cyber attacks a smear campaign.
Washington’s public condemnation does not include any indictments or name specific individuals, the administration official said, adding the shaming was designed to hold Pyongyang accountable for its actions and “erode and undercut their ability to launch attacks.” The accusation comes as worries mount about North Korea’s hacking capabilities and its nuclear weapons program.
‘Pattern of misbehaving’
Many security researchers, including the cyber firm Symantec, as well as the British government, have already concluded that North Korea was likely behind the WannaCry attack, which quickly unfurled across the globe in May to infect more than 300,000 computers in 150 countries. Considered unprecedented in scale at the time, WannaCry knocked British hospitals offline, forcing thousands of patients to reschedule appointments and disrupted infrastructure and businesses around the world.
The attack originally looked like a ransomware campaign, where hackers encrypt a targeted computer and demand payment to recover files. Some experts later concluded the ransom threat may have been a distraction intended to disguise a more destructive intent. FedEx’s computer networks were among the most heavily hit. The international shipper said in September it expected to sustain a $300 million profit hit as a result of the attack.
Some researchers have said they believed WannaCry was deployed accidentally by North Korea as hackers were developing the code. The senior administration official declined to comment about whether US intelligence was able to discern if the attack was deliberate. “What we see is a continued pattern of North Korea misbehaving, whether destructive cyber attacks, hacking for financial gain, or targeting infrastructure around the globe,” the official said.
WannaCry was made possible by a flaw in Microsoft’s Windows software, which was discovered by the US National Security Agency and then used by the NSA to build a hacking tool for its own use. In a devastating NSA security breach, that hacking tool and others were published online by the Shadow Brokers, a mysterious group that regularly posts cryptic taunts toward the US government. The fact that WannaCry was made possible by the NSA led to sharp criticism from Microsoft President Brad Smith and others who believe the NSA should disclose vulnerabilities it finds so that they can be fixed, rather then hoarding that knowledge to carry out attacks.
Smith said WannaCry provided “yet another example of why the stockpiling of vulnerabilities by governments is such a problem.” US officials have pushed back on those assertions, saying the administration discloses most computer flaws that government agencies detect. Last month, the White House published its rules for deciding whether to disclose cyber security flaws or keep them secret as part of an effort to be more transparent about the inter-agency process involved in weighing disclosure.
Missile defense system
Meanwhile, Japan’s government yesterday approved the introduction of the US military’s land-based Aegis missile interceptor system, beefing up its defense against “serious” and “imminent” North Korea threats. The regime in Pyongyang has fired two missiles over Japan this year and has threatened to “sink” the country into the sea. Last month, North Korea test-fired an intercontinental ballistic missile (ICBM) that plunged into the waters of Japan’s exclusive economic zone. “North Korea’s nuclear and missile development has entered a new stage of threat that is more serious and imminent to our country’s security,” the government said as it endorsed the introduction of Aegis Ashore at a cabinet meeting.
Japan needs to drastically improve its missile defense, Tokyo added. Japan plans to introduce the Aegis Ashore system at two locations, covering the entire nation with powerful radars. The deployment will hand the US ally another layer of defense in addition to SM-3 guided missiles launched by Aegis destroyer vessels and Patriot Advanced Capability-3 (PAC-3) missiles. However, it will take years before the Aegis Ashore system is operational, according to Japanese officials. The contract is yet to be signed with the United States and deployment at two locations could cost a total of 200 billion yen ($1.8 billion), including the cost of building new facilities.
However, officials insisted the new system would boost Japan’s missile defense. “Naval vessels need to return to their ports regularly for rest and refuelling, but if it’s ground deployment, we will be able to operate almost 24-7,” an official said. “We can be on permanent vigilance even when signs (of missile firing) are hard to detect,” he said.- Agencies