Coincidentally (?), Pyongyang has been in the sights of the US administration for a while, with President Donald Trump even floating the idea of a nuclear strike on the country during a telephone call last month with Philippine President Rodrigo Duterte.
Both Symantec and Kaspersky Lab have floated the theory that a group named Lazarus, which is linked to North Korea, may be behind WannaCry. At least one prominent US newspaper has repeated these claims, without asking any questions.
As iTWire has reported, quoting an analyst from the not-for-profit Institute for Critical Infrastructure Technology, there is little evidence for coming to such a conclusion.
It must be borne in mind that Kaspersky is under pressure in the US, will allegations of Russian ties being levelled against the company and the danger of its software being disallowed for use in US government a likely possibility. In such a climate, if it did provide some "proof" against an enemy (in this case, Pyongyang) of the US, it certainly wouldn't hurt.
The company has also gained a foothold in the Trump regime, with a former executive, Joshua Wright, being put in charge of transition efforts at the Federal Trade Commission.
Hence there is reason for Google to advance ideas that are favourable to the Trump team. Lest one forget, there were plenty of people who aided the push to invade Iraq in 2003 by the George W. Bush administration, not least among them being the New York Times' staffer Judith Miller.
This time, it looks like the cyber security firms are leading the push to blackball the bête noire of the moment.
This is not the first time that companies in this sector have sought to push theories that would find favour with one side of politics on Capitol Hill.
In April, the company SecureWorks sent over a media release, claiming it had uncovered a link between a hacking group called Iron Twilight (aka APT28, Pawn Storm, Sofacy, Tsar Team, Strontium, and Fancy Bear) and the Russian government. The claim went further to say that the group was linked to the hacking of the Democrat National Committee's email servers, among other hacks.
When asked for evidence, SecureWorks engaged up to a point; but when asked why the security company CrowdStrike, which was handling security for the Democrats, had cleaned up the alleged hacked server on its own instead of calling in the FBI, there was silence.
More recently, Trend Micro, another big security company, sent over its theories as to why Pawn Storm (another name for the group claimed to have Russian links by SecureWorks) was involved in hacking the DNC. The findings, while initially tentative, seemed to morph into certainty without any rational basis.
But again, when asked about the role of CrowdStrike, the people at Trend Micro went silent. A month has gone by since they were asked a few questions about their claims.
My email to Trend Micro ended this way: "You see my argument is that you can't add up 'possibly', 'allegedly','supposedly' and 'probably' and come up with 'definitely'."
When CrowdStrike was contacted — after the company sent in some unsolicited comments about the WannaCry outbreak — it kept silent after being asked for comment about the DNC events.
No matter how this plays out, it is interesting to see how these firms position themselves.