WannaCry Ransomware Explained, How North Korea Hacked the World

Table of Contents
Summery
  • North Korean hackers utilized stolen NSA cyberweapons to create WannaCry, a ransomware worm that caused global chaos in 2017.
  • The attack was likely released prematurely and was stopped accidentally when a British researcher registered a specific "kill switch" domain.
  • The incident highlighted the severe risks of government intelligence agencies hoarding software vulnerabilities instead of fixing them.

WannaCry Ransomware
Photo by Markus Spiske on Unsplash

The story begins in a dimly lit hotel room in Dalian, China. A North Korean programmer named Park Jin Hyok sat hunched over a glowing screen for days on end. He was not a typical soldier. He fought his wars with code rather than rifles. Park was part of an elite unit operating outside the hermit kingdom to generate revenue and chaos for the regime. He was under immense pressure to deliver a weapon that could bring the world to its knees. The problem was that his code was not working. He needed a missing piece to complete his digital monster. He found his answer not in North Korean innovation but in a stolen American cyberweapon.

North Korea had spent decades cultivating a reputation for bizarre criminal enterprises. The regime turned to crime after the collapse of the Soviet Union left them economically isolated and starving. They started with physical counterfeiting of US currency and pharmaceuticals. As the world moved online, Pyongyang recognized a new frontier. They realized that cybercrime offered high rewards with low risks. It was the perfect asymmetric weapon for a small nation to strike at superpowers.

Their capabilities grew at an alarming rate. The world first took notice during the "Dark Seoul" attacks in 2013 which paralyzed South Korean banks and broadcasters. The attacks were crude but effective. Then came the 2014 Sony Pictures hack. This was a targeted strike against a Hollywood studio for mocking Kim Jong Un. It proved that North Korean hackers could breach American soil and destroy reputations. These events were merely practice runs for a much larger ambition.

The turning point came from an unlikely source. A mysterious group known as The Shadow Brokers emerged in 2016. They claimed to have hacked the Equation Group, a sophisticated cyber espionage unit linked to the United States National Security Agency. The Shadow Brokers dumped a trove of cyberweapons onto the open internet. The leak included a powerful exploit called EternalBlue. This tool took advantage of a vulnerability in Microsoft Windows that the NSA had kept secret for years.

Park Jin Hyok and his team at the Lazarus Group saw an opportunity. They took the EternalBlue exploit and combined it with another NSA tool called DoublePulsar. EternalBlue acted as the battering ram to break into computers. DoublePulsar served as the hidden door that allowed them to plant malicious software. They wrapped these military grade weapons around a piece of ransomware. The result was a program that could spread automatically without any human interaction.

The release of this malware on May 12, 2017 appears to have been a mistake. The code was riddled with errors and lacked a functional payment system. It seems the hackers launched a prototype rather than the finished product. Yet this unfinished monster known as WannaCry spread with terrifying speed. It infected over 200,000 computers in 150 countries within hours. It did not just steal data. It locked machines and demanded a ransom in Bitcoin.

The impact was felt most acutely in the United Kingdom. The National Health Service saw its digital infrastructure collapse. Doctors could not access patient records. Emergency rooms had to turn away ambulances. Critical surgeries were cancelled. The attack transitioned from a financial nuisance to a genuine threat to human life. Hospital staff reverted to whiteboards and paper notes to keep their patients alive while their screens displayed red ransom demands.

The attack was halted by an accidental hero. Marcus Hutchins was a young British researcher who was analyzing the malware code from his bedroom. He noticed the virus tried to connect to a specific gibberish web domain before activating. He registered the domain for a few dollars simply to track the infection. He did not realize that the domain acted as a kill switch. The malware was designed to stop spreading if it successfully connected to that address.

The aftermath revealed the fingerprints of the Lazarus Group. Investigators found that the code shared distinct similarities with the software used in the Sony and Bangladesh bank heists. They traced the digital breadcrumbs back to a front company called Chosun Expo. This entity served as a cover for North Korean operations. The FBI eventually identified Park Jin Hyok through a slip up involving a resume sent to a Chinese employer.

The WannaCry incident exposed a dangerous reality about modern cyberwarfare. The attack was perpetrated by North Korea but it was enabled by the United States. Microsoft executives heavily criticized the NSA for hoarding vulnerabilities like EternalBlue instead of reporting them. They compared the situation to the US military having its Tomahawk missiles stolen. The government refused to accept responsibility but the facts remained clear. American tax dollars funded the development of the weapon that North Korea used to attack the world.

The financial gain for the hackers was negligible. The ransomware generated less than $200,000 because the payment mechanism was broken. This reinforces the theory that the launch was premature or perhaps intended purely for disruption. The Lazarus Group did not get rich from WannaCry. However, they succeeded in demonstrating that a small team of hackers could cause billions of dollars in damage.

North Korea continues to be a formidable cyber threat today. They have shifted their focus toward stealing cryptocurrency to fund their nuclear weapons program. The lessons of WannaCry have largely been ignored. Governments still hoard software exploits. Corporations still fail to update their systems. The next monster is likely already being built in a dark room somewhere. The only question is who will release it first.