The UK's Foreign Office has said it too blames North Korea for the WannaCry ransomware campaign that brought the majority of the NHS and other public sector organisations to their knees back in May. "The UK's National Cyber Security Centre assesses it is highly likely that North Korean actors known as the Lazarus Group were behind the WannaCry ransomware campaign one of the most significant to hit the UK in terms of scale and disruption," Foreign Office Minister Lord Ahmad of Wimbledon said in a statement. The official announcement follows comments by Security Minister Ben Wallace in October that suggested the government believed a nation-state was responsible for WannaCry campaign, and that it was "as sure as possible" that state was North Korea. He said, like the US authorities, the UK government would "identify, pursue and respond" to malicious activity and wants to make it clear it will not tolerate malicious cyber activity of any kind, wherever it may originate and however severe the impact. It will impose costs on the responsible parties, preventing them from launching further attacks and using them as an example to deter other potential criminals. "We condemn these actions and commit ourselves to working with all responsible states to combat destructive criminal use of cyber space," he added. "The indiscriminate use of the WannaCry ransomware demonstrates North Korean actors using their cyber programme to circumvent sanctions."

Lord Ahmad added that the UK authorities will work closely with other organisations around the world to "uphold a free, open, peaceful and secure cyberspace." The WannaCry attacks affected 300,000 computers in 150 countries, including 48 NHS trusts, the government said. Users were told they needed to pay a ransom to get their machines unlocked and data restored. 19/12/2017: NHS ransomware: US blames North Korea for "cowardly" WannaCry attack The US government has officially blamed North Korea for the devastating WannaCry ransomware campaign that crippled public services and infrastructure in more than 35 countries in May. The announcement, made by Homeland Security Advisor Thomas Bossert in the New York Times, is the first time the US has formally blamed a nation-state for the attack which hit the NHS, Spain's Telefonica, FedEx and German rail company Deutsche Bahn. "After careful investigation, the US today publicly attributes the massive 'WannaCry' cyber attack to North Korea," said Bossert. "It encrypted and rendered useless hundreds of thousands of computers in hospitals, schools, businesses and homes. While victims received ransom demands, paying did not unlock their computers." "It was cowardly, costly and careless," added Bossert. "The attack was widespread and cost billions, and North Korea is directly responsible." North Korea became a suspect almost immediately following an initial investigation into the attack, particularly as the malware shared a number of similarities with the attack on Sony Pictures, widely thought to have been carried out by the North Korean-based "Lazarus Group". The WannaCry campaign is thought to have affected around 300,000 computer systems across the world, propagated through a vulnerability in Windows XP and Windows Server 2003. The attack was eventually halted when security researcher Marcus Hutchins discovered a 'kill switch' in the malware that shut down the malware before it delivered its payload.

The US stance comes almost three months after the UK government and Microsoft officially blamed North Korea for the attack. "North Korea was the state that we believe was involved in this worldwide attack on our systems," said security minister Ben Wallace, speaking to BBC Radio 4. "It is widely believed across the community and in a number of countries that North Korea had taken this role." As well as officially blaming Pyongyang for the attack, Bossert took the opportunity to highlight recent bolstering of IT defences by the Trump administration. "(Trump's) continued sanctions on Russian hackers and directed the most transparent and effective government effort in the world to find and share vulnerabilities in important software," said Bossert, almost certainly referring to the recent ban on Kaspersky products from all government departments. Bossert added that the US was now calling on the private sector to "increase its accountability in the cyber realm by taking actions that deny North Korea and other bad actors the ability to launch reckless and destructive cyber attacks." North Korea has always denied its involvement in the WannaCry attack, and labelled the UK's accusation as a "wicked attempt" to enact tougher sanctions against the country. Speaking to the Korean Central News Agency, a spokesperson for the Korea-Europe Association said at the time: "It does not make any sense that the DPRK, which gives the highest priority to the life and health of its people, would carry out a cyber attack on the UK health service." 28/11/2017: NHS to hire ethical hackers in 20m cyber security boost The NHS has set aside 20 million to establish a new security centre designed to constantly probe the organisation's cyber defences using ethical hackers. The Security Operations Centre (SOC) will operate throughout all NHS sites across the UK, providing monitoring services and guidance on how to handle cyber security incidents to local departments.

Part of its remit will be to employ 'white-hat' hackers to test the NHS' ability to prevent a data breach or a repeat of the style of attacks seen during the WannaCry ransomware campaign, which hit over one-third of health trusts earlier this year. Dan Taylor, head of the Digital Security Centre at NHS Digital, said that the new centre will provide a "near-real-time monitoring and alerting service that covers the whole health and care system" "The Security Operations Centre will enhance NHS Digital's current data security services that support the health and care system in protecting sensitive patient information," he added. "The partnership will provide access to extra specialist resources during peak periods and enable the team to proactively monitor the web for security threats and emerging vulnerabilities. "It will also allow us to improve our current capabilities in ethical hacking, vulnerability testing and the forensic analysis of malicious software, and will improve our ability to anticipate future vulnerabilities while supporting health and care in remediating current known threats." Taylor said the centre would "drive economies of scale, giving health and care organisations additional intelligence and support services that they might not otherwise be able to access". NHS Digital also said it's seeking a partner to provide advice and help run the project, a contract for which is tendered to run for three to five years. It's not the first time a public body has turned to ethical hacking to probe its defences. In July, it was revealed that the Met Office had previously asked cloud security firm Cloudreach to purposefully break its systems in an effort to test how well its teams were able to deal with major outages. The move is the latest attempt to try and overhaul the NHS' outdated IT systems, which were considered to have been a soft target for the WannaCry malware. A recent report by the National Audit Office found that "basic IT security" could have prevented the spread of the ransomware, and that the NHS had been warned previously about its reliance on the outdated Windows XP operating system.

"Given the impact of the WannaCry attack, one must ask why it has taken them so long to create an SOC," said Matt Lock, director of sales engineers at Varonis, in a statement to IT Pro. "The new centre must be a part of an ongoing effort to keep up with the latest attacks from extremely well-funded and experienced criminals intent on compromising the NHS system. "An SOC is an important piece of the overall security posture for large organizations, but continuous improvement and advancements are critical parts of the equation." 31/10/2017: North Korea denies it created the WannaCry ransomware North Korea yesterday denied being behind the devastating WannaCry attack, after the UK government identified the nation as the creator of the ransomware. Home Office Minister Ben Wallace told the BBC last week that the government was "as sure as possible" that North Korea was behind the cyber attack in May, which caused chaos among NHS hospitals, dozens of which had to suspend and postpone appointments and operations. But a spokesperson for the North's Korea-Europe Association denounced this as a "wicked attempt" to toughen sanctions against the country, which is currently embroiled in a war of words with the US over its nuclear tests. In the statement, published on the Korean Central News Agency, the spokesperson said: "It does not make any sense that the DPRK, which gives the highest priority to the life and health of its people, would carry out a cyber attack on the UK health service. "The moves of the UK government to doggedly associate the DPRK with the cyber attack cannot be interpreted in any other way than a wicked attempt to lure the international community into harbouring greater mistrust of the DPRK and further tighten sanctions and pressure against the latter."

The spokesperson added: "This is an act beyond the limit of our tolerance and it makes us question the real purpose behind the UK's move." Along with the UK government, Microsoft also said it believed North Korea was behind the WannaCry attack. Brad Smith, Microsoft's president and chief legal officer, said that the attack was carried out by the country using cyber tools stolen from the NSA in the US. An investigation into the ransomware attack found that the NHS failed to follow basic IT security principles that could have prevented the malware from taking effect, such as upgrading from the unsupported Windows XP operating system. 27/10/2017: NHS ransomware: "Basic IT security" could've prevented WannaCry A report conducted by the National Audit Office found that the NHS was informed by the Department of Health and the Cabinet as early as 2014 about the dangers of cyber attacks and were encouraged to make plans to move away from old software like Windows XP by April 2015. Despite the NHS's critical alerts telling organisations to patch their system to prevent the spread of WannaCry ransomware, the department had "no formal mechanism for assessing whether local NHS organisations had complied with their advice and guidance and whether they were prepared for a cyber attack". "The WannaCry cyber attack had potentially serious implications for the NHS and its ability to provide care to patients. It was a relatively unsophisticated attack and could have been prevented by the NHS following basic IT security best practice. There are more sophisticated cyber threats out there than WannaCry so the department and the NHS need to get their act together to ensure the NHS is better protected against future attacks," said Amyas Morse, head of the National Audit Office. The attack, which occurred on 12 May 2017, affected 81 out of 236 NHS organisations in England. It also lead to the cancellation of 19,500 medical appointments, the locking of 600 GP surgeries, and the diversion of ambulances from five hospitals, according to the report.

Although the department, NHS England, and the National Crime Agency said that no NHS organisation paid the ransom, the report found that the department does not know how much the attacks cost the NHS when considering costs such as the cancelled appointments, IT support and consultants, along with the restoration of data. "What the NHS needed was the ability to detect and put a stop to malicious behaviour as early as possible in the kill chain," Nick Pollard, security intelligence and analytics director at Nuix said. He suggested the use of next-generation endpoint security, which "can analyse unknown processes and terminates those that exhibit bad behaviours, keeping end users from clicking on unusual and potentially harmful attachments and applications even before they knew you were in danger". The report said that the NHS has learned from WannaCry and is taking action to secure local firewalls by asking hospital trust boards to make sure they have implemented measures outlined in all alerts issued between March and May 2017. 16/10/17: Microsoft says North Korea was behind WannaCry attack Microsoft's president and chief legal officer has said that North Korea was behind the WannaCry attack that affected companies worldwide. Brad Smith told ITV News: "I think at this point that all observers in the know have concluded that WannaCry was caused by North Korea using cyber tools or weapons that were stolen from the National Security Agency in the United States." Smith also said cyber-attacks conducted by nation-states have become more frequent and more severe. He added that governments around the world should do more to protect people from harm. "We need governments to come together as they did in Geneva in 1949 and adopt a new digital Geneva Convention that makes clear that these cyber-attacks against civilians, especially in times of peace, are off-limits and a violation of international law," said Smith.