{"id":188130,"date":"2017-04-17T12:34:40","date_gmt":"2017-04-17T16:34:40","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/released-docs-on-alleged-nsa-malware-provide-instructions-for-criminals-rt\/"},"modified":"2017-04-17T12:34:40","modified_gmt":"2017-04-17T16:34:40","slug":"released-docs-on-alleged-nsa-malware-provide-instructions-for-criminals-rt","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/released-docs-on-alleged-nsa-malware-provide-instructions-for-criminals-rt\/","title":{"rendered":"&#8216;Released docs on alleged NSA malware provide instructions for criminals&#8217; &#8211; RT"},"content":{"rendered":"<p><p>  Alleged NSA cyber-infiltration tools empower criminals and  intelligence agencies to develop more in this direction, and  could be used by anyone able to reproduce and modify the code,  software developer and co-founder of Dyne.org Denis Roio says.<\/p>\n<p>    A hacking group named Shadow Brokers has published what it    claims are some of the cyber-infiltration tools used by the    NSA, alleging that the American spy agency used them to break    into banking systems.  <\/p>\n<p>    The leaked NSA malware is said to be capable of breaking into    more than half of computers using a Microsoft Windows operating    system.  <\/p>\n<p>    The hacking group behind the revelation also says the NSA may    have penetrated several banking services, including SWIFT.  <\/p>\n<p>    RT:It is quite a staggering thought    that 65 percent of Windows users could now be at risk. Is this    as big a deal as it seems?  <\/p>\n<p>      Read more    <\/p>\n<p>    Denis Roio: The last release that was indeed    published to the world is a big deal. It is one of the biggest    leaks of actual malware, source code, and documentation on how    to do this sort of malware. So, basically, it empowers even    more criminals and intelligence agencies to develop more in    this direction. Most of the news is reporting that Windows is    affected, but unfortunately it is not the only operating system    affected. The malware that the National Security Agency of the    US has been using to intrude in other organizations also    includes EFI (Extensible Firmware Interface) which is a BIOS    extension, includes instructions and examples on how to    actually build software that will reside on any computer, and    not only on computers running on certain version of Windows.    The EFI extension is a BIOS extension, it is in every PC,    laptop, and desktop computer. And it is basically the small    code that runs the operating system. Sometimes you can see on    some computers the screen that says BIOS and make some checks    of the computer and of the peripherals connected to it.    Actually, it includes even code that can run in that phase of    the booting and that can address all memory of the computers.    So, I would say that the amount of people that are affected is    huge, pretty massive.  <\/p>\n<p>    RT:In what ways has peoples    security been compromised exactly?  <\/p>\n<p>    DR: The way in which the security is    compromised is very fussy, is very hard to define. Obviously,    this is something that runs attacks on several targets around    the world. What is clear is that there is a network, almost    like a botnet that is run to control the quantity of computers    that are affected by this sort of malware. It resulted from    this leak really that there is a fairly sophisticated network    of computers that can connect to all the victims and that can    report and act on their computers. So, how this is being used     there is not only one way. Nowadays, a lot of very delicate    operations in different states and organizations around the    world are run on top of computers. I would say that most    operating systems and computers that are being produced in the    last ten years are basically affected. On this leak, there are    less details about objects, as of Internet of Things objects,    that connect to the network. But the result is that    specifically, desktop usage is being addressed, is being    targeted and can be manipulated. And you can imagine how many    things we keep on our desktop, how much information on our hard    disks that we access every day. This information can be    changed, can be retrieved by these third party users of the    malware, in this case the NSA, but not only. Of course, now    that the software is out there, it can be used by anyone that    can be able to study, reproduce, and even modify this sort of    code.  <\/p>\n<p>      When we speak about intelligence agencies we have      to consider that these guys have huge cyber capabilities, so      they are able to hit systems that are not updated. In many      cases, these systems have not been designed to be resilient      to cyber-attacks They [NSA] are trying to hit systems      worldwide probably in order to get information. We have to      consider that today almost every intelligence agency may get      sensitive information trying to hack computers      worldwide.  Pierluigi Paganini, head of      Cybersecurity Services at Grant Thornton Consultants    <\/p>\n<p>    RT:What was the NSA doing with this    malware, do you think?  <\/p>\n<p>    DR: Clearly, the malware was developed to    intrude in desktop computers and servers, control them and    basically counterfeit the information that is on them. There    are different users that can be applied to this. And I hear the    news that most targets were in the eastern part of the world    It is pretty bad that they targeted SWIFT, because financial    networks should be neutral. And now it is clear they are not.  <\/p>\n<p>  The statements, views and opinions expressed in this column are  solely those of the author and do not necessarily represent those  of RT.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.rt.com\/op-edge\/384949-nsa-malware-tool-swift\/\" title=\"'Released docs on alleged NSA malware provide instructions for criminals' - RT\">'Released docs on alleged NSA malware provide instructions for criminals' - RT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Alleged NSA cyber-infiltration tools empower criminals and intelligence agencies to develop more in this direction, and could be used by anyone able to reproduce and modify the code, software developer and co-founder of Dyne.org Denis Roio says.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/released-docs-on-alleged-nsa-malware-provide-instructions-for-criminals-rt\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-188130","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188130"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=188130"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188130\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=188130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=188130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=188130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}