{"id":219518,"date":"2017-06-14T17:08:26","date_gmt":"2017-06-14T21:08:26","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/leaked-nsa-malware-is-helping-hijack-computers-around-the-world.php"},"modified":"2017-06-14T17:08:26","modified_gmt":"2017-06-14T21:08:26","slug":"leaked-nsa-malware-is-helping-hijack-computers-around-the-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/leaked-nsa-malware-is-helping-hijack-computers-around-the-world.php","title":{"rendered":"Leaked NSA Malware Is Helping Hijack Computers Around the World"},"content":{"rendered":"<p><p>      In mid-April,an arsenal of powerful software      tools apparently designed by the NSA to infect and control      Windows computers was       leaked by an entity known only as the Shadow Brokers.      Not even a whole month later, the hypothetical threat that      criminals would use the tools against the general public has      become real, and tens of thousands of computers worldwide are      now crippled by an unknown party demanding ransom.    <\/p>\n<p>        An infected NHS computer in Britain      <\/p>\n<p>        Gillian Hann      <\/p>\n<p>      The malware worm taking over the computers goes by the names      WannaCry orWanna Decryptor. It spreads from machine      to machine silently and remains invisible to users until it      unveils itself as so-called ransomware, telling users that      all their files have been encrypted with a key known only to      the attacker and that they will be locked out until they pay      $300 to an anonymous party using the cryptocurrency Bitcoin.      At this point, ones computer would be rendered useless for      anything other than paying said ransom. The pricerises      to $600 after a few days; after seven days, if no ransom is      paid, the hacker (or hackers) willmake the data      permanently inaccessible (WannaCry victims will have a handy      countdown clocktosee exactly how much time they      have left).    <\/p>\n<p>      Ransomware is not new; for victims, such an attack is      normally a colossal headache. But todays vicious outbreak      has spread ransomware on a massive scale, hitting not just      home computers but reportedly health care, communications      infrastructure, logistics, and government entities.    <\/p>\n<p>      Reuters saidthathospitals across England      reported the cyberattack was causing huge problems to their      services and the public in areas affected were being advised      to only seek medical care for emergencies, and that the      attack had affected X-ray imaging systems, pathology test      results, phone systems and patient administration systems.    <\/p>\n<p>      The worm has also reportedly reached universities, a major      Spanish telecom, FedEx, and      the Russian      Interior Ministry. In total, researchers have detected      WannaCry infections       in over 57,000 computersacross       over 70 countries(and counting  these things move      extremely quickly).    <\/p>\n<p>      According to experts tracking and analyzing the worm and its      spread, this could be one of the worst-ever recorded attacks      of its kind. The security researcher who tweets and blogs      asMalwareTech told The Intercept, Ive never seen      anything like this with ransomware, and the last worm of      this degree I can remember is Conficker. Conficker was a      notorious Windows worm first spotted in 2008; it went on to            infect over 9million computers in nearly 200      countries.    <\/p>\n<p>      Most importantly, unlike previous massively replicating      computer worms and ransomware infections, todays ongoing      WannaCry attack appears to be based onan attack      developed by the NSA, code-named ETERNALBLUE. The U.S.      software weapon would have allowed the spy agencys hackers      to break into potentially millions of Windows computers by      exploiting a       flaw in how certain versions of Windows implemented a      network protocol commonly used to share files and to print.      Even though Microsoft fixedthe ETERNALBLUE      vulnerability in a March software update, the safety provided      there relied on computer users keeping their systems current      with the most recent updates. Clearly, as has always been the      case, many people (including in government) are not      installing updates. Before, there would have been some solace      in knowing that only enemies of the NSA would have to fear      having ETERNALBLUE used against them  but from the moment      the agency lost control of its own exploit last summer,      theres been no such assurance. Today shows exactly whats at      stake when government hackers cant keep their virtual      weapons locked up. As security researcher Matthew Hickey, who      tracked the leaked NSA tools last month, put it, I am      actually surprised that a weaponized malware of this nature      didnt spread sooner.    <\/p>\n<p>        Screenshot of an infected computer via         Avast.      <\/p>\n<p>      The infection will surely reignite arguments over whats      known as the Vulnerabilities Equity Process, the      decision-making procedure used to decide whether the NSA      should use a security weakness it discovers (or creates) for      itself and keep it secret, or share it with the affected      companies so that they can protect their customers.      Christopher Parsons, a researcher at the University of      Torontos Citizen Lab, told The Intercept plainly: Todays      ransomware attack is being made possible because of past work      undertaken by the NSA, and that ideally it would lead to      more disclosures that would improve the security of devices      globally.    <\/p>\n<p>      But even if the NSA were more willing to divulge its exploits      rather than hoarding them, wed still be facing the problem      that too many people really dont seem to care about updating      their software. Malicious actors exploit years old      vulnerabilities on a routine basis when undertaking their      operations, Parsons pointed out. Theres no reason that      more aggressive disclose of vulnerabilities through the VEP      would change such activities.    <\/p>\n<p>      A Microsoft spokesperson provided the following comment:    <\/p>\n<p>        Today our engineers added detection and protection against        new malicious software known as Ransom:Win32.WannaCrypt. In        March, we provided a security update which provides        additional protections against this potential attack. Those        who are running our free antivirus software and have        Windows updates enabled, are protected. We are working with        customers to provide additional assistance.      <\/p>\n<p>      Update: May 12, 2017, 3:45 p.m.      This post was updated with a comment from Microsoft.    <\/p>\n<p>      Update: May 12, 2017, 4:10 p.m.      This post was updated with a more current count of the      number ofaffected countries.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/theintercept.com\/2017\/05\/12\/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world\/\" title=\"Leaked NSA Malware Is Helping Hijack Computers Around the World\">Leaked NSA Malware Is Helping Hijack Computers Around the World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In mid-April,an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the Shadow Brokers.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/leaked-nsa-malware-is-helping-hijack-computers-around-the-world.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-219518","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219518"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=219518"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219518\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=219518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=219518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=219518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}