U.S. officials say they were able to disrupt a ransomware campaign from North Korean state sponsored hackers that targeted hospitals - and were even able to claw back some of the ransom that had already been paid in cryptocurrency. WSJ reporter Dustin Volz joins host Zoe Thomas to discuss the strategy U.S. law enforcement used and why they say the new approach could better protect Americans.
Photo: Ed Jones/Agence France-Presse/Getty Images
For more episodes of WSJ’s Tech News Briefing: link.chtbl.com/WSJTechNewsBriefing
Visit the WSJ Podcast Center: on.wsj.com/3zTcL89
More from the Wall Street Journal:
Visit WSJ.com: wsj.com
Visit the WSJ Video Center: wsj.com/video
On Facebook: facebook.com/pg/wsj/videos/
On Twitter: twitter.com/WSJ
On Snapchat: on.wsj.com/2ratjSM
#CyberWarfare #NorthKorea #WSJ
- New U.S. Cyber Strategy Disrupts North Korean Ransomware | WSJ Tech News Briefing ( Download)
- North Korea’s Cyber Operations: Strategy and Responses ( Download)
- Evolution of North Korea’s Cyberthreat ( Download)
- How North Korea Conducts Cyber Operations ( Download)
- North Korean Cyber Strategy ( Download)
- Was North Korea Behind Sony’s Cyber Attack | Cyberwar ( Download)
- Financing Pyongyang’s Provocations - Kim Jong Un’s Cyber Strategy | Jean Lee ( Download)
- North Korea: 'Framed' for Sony cyber-attack ( Download)
- N. Korea possesses high cyber attack capabilities 북한 사이버 공격 능력은 ( Download)
- North Korean Cyber Operations: At the Nexus of Geopolitics, Technology, and Policy ( Download)
- Financing Pyongyang’s Provocations Kim Jong Un’s Cyber Strategy | Jean Lee ( Download)
- Elite South Korean cyber warriors train for battle with North ( Download)
- North Korean cyber attack targets Ontario transit agency ( Download)
- North Korean charged in cyberattacks on US hospitals, NASA and military bases ( Download)
- Korea’s Cyber War Vortex: Seminar by Professor Greg Austin ( Download)