A researcher from Google posted on Twitter that an early version of WannaCrypt from February shared some of the same programming code as malicious software used by the Lazarus Group, the alleged North Korean government hackers behind the destructive attack on Sony in 2014 and the theft of $81m from a Bangladesh central bank account at the New York Fed a year ago.
"This is an emerging pattern in 2017", continued Smith.
Even before the WannaCrypt disaster, Smith said he and his colleagues had already seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks.
He warned governments against stockpiling such vulnerabilities and said instead they should report them to manufacturers - not sell, store or exploit them, lest they fall into the wrong hands.
He likened the situation to what would happen - hypothetically - if the USA military had some of its Tomahawk missiles stolen. They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world.
Microsoft has issued an advisory while releasing a patch for Windows XP. There are actually legitimate reasons to wait to patch your systems. The WannaCry malware is shaping up to be one of the largest of its kind, infecting almost a quarter-million computers in 150 nations since it was launched on Friday.
Last Friday's massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom?
This decision to keep ATMs closed stems from a directive from the Reserve Bank of India, who has been taking steps to counter the damage from the effect of WannaCry ransomware.
On affected computers running Windows, the WannaCrypt software encrypts files and displays a ransom message demanding $300 in the online currency bitcoin. In Indonesia, the ransomware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays.
Avi Rubin, professor of computer science at The Johns Hopkins University and director of the school's Health and Medical Security Lab, which was established with funding from the Office of the National Coordinator for Health Information Technology, has been closely following the WannaCry cyberattack. The Twitter account @actual_ransom says that as of 2 p.m. Monday, the hackers behind WannaCry had made just over $55,000. It's a good idea to back up files to a drive that remains entirely disconnected from your network.
The virus spread quickly because the culprits used a digital code believed to have been developed by the NSA and subsequently leaked as part of a document dump, according to the Moscow-based computer security firm Kaspersky Lab.
In the Sunday blog post, Smith stated that the cyber attack is further evidence that cybersecurity has become a shared responsibility between tech companies and customers.
"We have to be vigilant every day with security, so making sure you're running the latest version of your operating system and making sure that you ran all the updates that are available for your computer, using an appropriate firewall or updated router for your home computer that can block these types of things or attempt to filter them".
Five South Korean companies reported that they had been affected by the ransomware attack.