WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows

  /     /     /  
Publicated : 22/11/2024   Category : security


WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows


But a Chinese-language link doesnt shoot down theories of the North Korean Lazarus Groups involvement in the ransomware worm attacks, say language experts at Flashpoint.



A linguistic analysis of the ransom notes used in the WannaCry ransomware attacks shows a Chinese-speaking author was behind the original blackmail message.
Language experts at Flashpoint who conducted the analysis say these findings do not, however, contradict research findings by Symantec, Kaspersky Lab, BAE, and others, that WannaCry ransomware worm is the handiwork of the infamous North Korean Lazarus Group hackers.
Our findings dont necessarily contradict a link to Lazarus. This is just an added data point in the attribution bubble. We dont know a helluva lot about the Lazarus Group so its entirely possible, if our analysis is correct, there are Chinese speakers in that group involved in WannaCry, says Jon Condra, director of Asia Pacific research for Flashpoint. That means they could be native speakers or people who speak Chinese as well as their native tongue.
Symantec this week
doubled down on its theory
that the epic WannaCry ransomware worm was the handiwork of hackers out of North Korea, but with the caveat that it was not a state-sponsored campaign. WannaCry infected some 230,000 machines in 150 countries yet generated only about $110,000 in ransom since its launch on May 12. Other researchers, including from Google, Kaspersky Lab, and BAE Systems, also suspect Lazarus Group connections, while other security firms say its too soon for any attribution.
Getting a view into North Koreas cyber machine is difficult since the nation is so isolated and cloaked, especially online, but experts long have theorized that North Korea has hackers operating out of other countries such as China to mask their activities or to throw off investigators.
Condra says its known that North Koreans often travel abroad, including to China, and speak the language there as well. North Korean hackers are believed to operate out of China, especially in the northeast region of the country, he says, as well as now increasingly in Malaysia and Southeast Asia. Its very likely somebody within Lazarus or an affiliate who knows somebody [in Lazarus] worked on WannaCry, he says.
Other security experts have noted that North Koreas cyber operations spread beyond its borders. John Bambenek, manager of threat intelligence systems for Fidelis Cybersecurity, says North Koreas state-sponsored cyber operations are effective because they dont operate in North Korea.
One twist that has Flashpoints Condra and his team baffled, however, is that the Korean-language ransom note is poorly written syntactically, with very basic errors and incorrect grammar structure. Why is the Korean [language] so butchered? Thats a question in itself. Why would they go to such lengths to obfuscate Korean and make it look non-native, but not change the infrastructure [Lazarus Group] behind the attack?
Flashpoint studied the 28 different ransom notes found in the WannaCry attacks, which were written in 27 different languages. There were two notes in Chinese, one in so-called simplified characters and the other, so-called traditional characters. They found that the two Chinese ransom notes were more detailed and appeared to be handcrafted, while the others likely had been generated from an English-language written note to the other languages, which include Bulgarian, French, German, Italian, Japanese, Korean, Russian, Spanish, Vietnamese, and others.
Flashpoint assesses with high confidence that the author(s) of WannaCry’s ransomware notes are fluent in Chinese, as the language used is consistent with that of Southern China, Hong Kong, Taiwan, or Singapore. Flashpoint also assesses with high confidence that the author(s) are familiar with the English language, though not native. This alone is not enough to determine the nationality of the author(s), the researchers wrote in
a report published today
.
Condra explains the clues they found as compelling. The Chinese ransom notes were substantially different, he says. They had five or six different colloquial sayings that dont show up in the other notes, for example, he adds.
The clauses, Right, I forgot to tell you, and Even the coming of God cant restore these documents, were unique to those notes, he says. These are little minor things in there that add flavor or color that doesnt exist in the other languages notes, he says.
He believes the Chinese ransom notes were hand-typed rather than translated via Google Translator or another application. They made a typo that a machine translator would not have made, he says.
The English version of the ransom note, meanwhile, also read smoothly, as if someone crafting it spoke the language and it wasnt generated via a translator program. Flashpoint says that note was likely used as the base for auto-translating to the other languages (with the exception of the Chinese notes). Flashpoint found a 96%-plus overlap between the English ransom note and all other ransom notes, with the exception of the Chinese-language ones.
The English ransom note used correct spelling and capitalization, for example, but there were clues it wasnt written by a native speaker, according to the study. The author incorrectly used the word couldnt instead of cant, in a sentence, for example, and used a clause with the incorrect word order: You have not so enough time. Condra says these patterns could have been intentional as a false flag, for example.
Flashpoint says it has moderate confidence the authors have English-language familiarity and are likely to have based the English ransomware note off of the Chinese one, and subsequently used it as the basis for machine translation of the ransom notes into all other languages.
Meantime, Flashpoints linguistic analysis doesnt really confirm or deny the North Korean Lazarus Groups involvement. Unfortunately, we dont know enough about the Lazarus Group. Maybe its a combination of North Korea and Chinese members, Condra says.
The Lazarus Group also could have employed subcontractors for the ransom notes, for example, he says. But the researchers concluded that the notes were generated for the WannaCry attacks and not recycled from some previous ransomware attacks. 
Related Content:
WannaCry: The North Korea Debate
5 Security Lessons WannaCry Taught Us the Hard Way
WannaCry Hit Windows 7 Machines Most
WannaCrys Kill Switch May Have Been a Sandbox-Evasion Tool
 

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows