{"id":192687,"date":"2017-05-13T05:31:48","date_gmt":"2017-05-13T09:31:48","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/hackers-hit-dozens-of-countries-exploiting-stolen-nsa-tool-new-york-times\/"},"modified":"2017-05-13T05:31:48","modified_gmt":"2017-05-13T09:31:48","slug":"hackers-hit-dozens-of-countries-exploiting-stolen-nsa-tool-new-york-times","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/hackers-hit-dozens-of-countries-exploiting-stolen-nsa-tool-new-york-times\/","title":{"rendered":"Hackers Hit Dozens of Countries Exploiting Stolen NSA Tool &#8211; New York Times"},"content":{"rendered":"<table border=\"0\" cellpadding=\"2\" cellspacing=\"7\" style=\"vertical-align:top;\"><tr><td width=\"80\" align=\"center\" valign=\"top\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGsbVoqOgFbCbGrTLLCm6S-z7DsaA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html\"><img loading=\"lazy\" decoding=\"async\" src=\"\/\/t3.gstatic.com\/images?q=tbn:ANd9GcTuW2t2-UwqSSwimGMGY7RgGI2ErSYv_m5fZYIpaadk2iElEuiaS73tsubQmVJRdKT2-lJtKE85\" alt=\"\" border=\"1\" width=\"80\" height=\"80\" style=\"padding-left:10px; padding-right: 10px;\"><br><font size=\"-2\">New York Times<\/font><\/a><\/font><\/td><td valign=\"top\" class=\"j\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><div style=\"padding-top:0.8em;\"><img alt=\"\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/div><div class=\"lh\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGsbVoqOgFbCbGrTLLCm6S-z7DsaA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html\"><b>Hackers Hit Dozens of Countries Exploiting Stolen <b>NSA<\/b> Tool<\/b><\/a><br><font size=\"-1\"><b><font color=\"#6f6f6f\">New York Times<\/font><\/b><\/font><br><font size=\"-1\">They then quickly spread through victims' systems using a hacking method that the <b>N.S.A.<\/b> is believed to have developed as part of its arsenal of cyberweapons. And finally they encrypted the computer systems of the victims, locking them out of critical <b>...<\/b><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGasMYUmBhpC6SJqntVja8hlro34g&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=http:\/\/www.politico.com\/story\/2017\/05\/12\/nsa-hacking-tools-hospital-ransomware-attacks-wannacryptor-238328\"><b>NSA<\/b>-created cyber tool spawns global attacks<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>Politico<\/nobr><\/font><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGBlLyX5u4H13v6WYwWzVEAAH1FUg&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=https:\/\/www.washingtonpost.com\/news\/monkey-cage\/wp\/2017\/05\/12\/cyber-criminals-have-just-mounted-a-massive-worldwide-attack-heres-how-nsa-secrets-helped-them\/\">Cybercriminals have just mounted a massive worldwide attack. Here's how <b>NSA<\/b> secrets helped them<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>Washington Post<\/nobr><\/font><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNE3fG58-CsqxZ4tv7BkPe1IZsszig&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=https:\/\/techcrunch.com\/2017\/05\/12\/ransomware-based-on-leaked-nsa-tools-spreads-to-dozens-of-countries\/\">Ransomware based on leaked <b>NSA<\/b> tools spreads to dozens of countries<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>TechCrunch<\/nobr><\/font><\/font><br><font size=\"-1\" class=\"p\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGooStgiuhnKRrDx5p9PntC0wW5Tg&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/05\/12\/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion\/\"><nobr>Forbes<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFqSKxxfdR62Cdd2Y0xME8uNHeqlw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=http:\/\/www.providencejournal.com\/news\/20170512\/hack-of-computers-in-74-nations-using-nsa-bug-is-largest-cyberattack-ever\"><nobr>The Providence Journal<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNE2EGT1QKj3c4WazZ5iJf4cSD9pyA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=http:\/\/www.sacbee.com\/latest-news\/article150201632.html\"><nobr>Sacramento Bee<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNF6TxihYJxkneFHVeWWuT45es4LMg&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779491799069&amp;ei=v9IWWdibCcXi3QHC_5qYCw&amp;url=https:\/\/digital.nhs.uk\/article\/1491\/Statement-on-reported-NHS-cyber-attack\"><nobr>NHS Digital<\/nobr><\/a><\/font><br><font class=\"p\" size=\"-1\"><a class=\"p\" href=\"http:\/\/news.google.com\/news\/more?ncl=dGIs9ULqRUE7PhMSLQeQo3tLRz2hM&amp;authuser=0&amp;ned=us\"><nobr><b>all 947 news articles&nbsp;&raquo;<\/b><\/nobr><\/a><\/font><\/div><p><\/p><\/font><\/td><\/tr><\/table><p><!-- Auto Generated --><\/p><p>See the original post:<br><a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html\" title=\"Hackers Hit Dozens of Countries Exploiting Stolen NSA Tool - New York Times\">Hackers Hit Dozens of Countries Exploiting Stolen NSA Tool - New York Times<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p> New York Times Hackers Hit Dozens of Countries Exploiting Stolen NSA Tool New York Times They then quickly spread through victims&#39; systems using a hacking method that the N.S.A.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/hackers-hit-dozens-of-countries-exploiting-stolen-nsa-tool-new-york-times\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-192687","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192687"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=192687"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192687\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=192687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=192687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=192687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}