{"id":193565,"date":"2017-05-18T14:03:29","date_gmt":"2017-05-18T18:03:29","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-hacking-group-that-leaked-nsa-secrets-claims-it-has-data-on-foreign-nuclear-programs-washington-post\/"},"modified":"2017-05-18T14:03:29","modified_gmt":"2017-05-18T18:03:29","slug":"the-hacking-group-that-leaked-nsa-secrets-claims-it-has-data-on-foreign-nuclear-programs-washington-post","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-hacking-group-that-leaked-nsa-secrets-claims-it-has-data-on-foreign-nuclear-programs-washington-post\/","title":{"rendered":"The hacking group that leaked NSA secrets claims it has data on foreign nuclear programs &#8211; Washington Post"},"content":{"rendered":"<p><p>      A massive cyberattack hit tens of      thousands of computers in dozens of nations. Reports of the      attack first surfaced in Britain, where the National Health      Service described serious problems. (Sarah Parnass\/The      Washington Post)    <\/p>\n<p>    The hacking group that leaked the bugs that enabled last week's        global ransomware attack is threatening to make public even    more computer vulnerabilities in the coming weeks  potentially    including compromised network data pertaining to the nuclear    or missile programs of China, Iran, North Korea and Russia, as    well as vulnerabilities affecting Windows 10, which is run by    millions of computers worldwide.  <\/p>\n<p>    A spokesperson for the group, which calls itself the Shadow    Brokers, claimed in     a blog postTuesdaythat some of    those computer bugs may be released on a monthly basis as part    of a new subscription-based business model that attempts to    mimic what has proved successful for companies such as Spotify,    Netflix, Blue Apron and many more.  <\/p>\n<p>    [Clues    point to possible North Korean involvement in massive    cyberattack]  <\/p>\n<p>    Is being like wine of month club, readthe blog post,    which is written in broken English. \"Each month peoples can be    paying membership fee, then getting members only data dump each    month.\"  <\/p>\n<p>    The moveshows the growing commercial sophistication of    groups such as the Shadow Brokers, which already has    demonstrateda fearsome technical ability to compromise    the world's top intelligence agencies. And it    underscoresthe waymuch of theunderground    trade forcomputer bugs resembles a real-world commercial    market.  <\/p>\n<p>    Security experts have been analyzing the blog post for clues    aboutthe Shadow Brokers' intentions and capabilities.  <\/p>\n<p>    [How    to protect yourself from the global ransomware attack]  <\/p>\n<p>    Marcy Wheeler, a longtime independent researcher, said in a        blog post Tuesday that the Shadow Brokers'    postbrings the hammer down both on Microsoft, whose    products could be affected by any further leaks, and the U.S.    National Security Agency, whose information the Shadow Brokers    leaked in April. That leakled indirectly to the creation    of WannaCry and the subsequent crisis,security experts    say.  <\/p>\n<p>    Simply by threatening another leak after leaking two sets of    Microsoft exploits, Shadow Brokers will ratchet up the    hostility between Microsoft and the government, Wheeler wrote.  <\/p>\n<p>    Microsoft didn't immediately respond to a request for comment.        On Sunday, the company criticized the NSA for stockpiling    digital weapons. The tech industry opposes efforts by the    government to weaken the security of its products, while    national security advocates say it could help combat terrorism.  <\/p>\n<p>    [Russia    warns against intimidating North Korea after its latest    missile launch]  <\/p>\n<p>    Although experts say the Shadow Brokers do not appear to have    been directly involved in the WannaCry attack, leaking the    exploitin the first place was a major step toward    facilitating the cyberattack.  <\/p>\n<p>    The group's new claim that it possesses information on the    nuclear programs of state governments is extremely worrisome,    said Joseph Lorenzo Hall, chief technologist for the Center for    Democracy and Technology, a Washington think tank.\"While    they don't seem to have the most amazing PR department,\" he    said, \"they've already proved that they had some pretty serious    access. The nuke facility stuff is particularly concerning,    [speaking] as a former physicist.  <\/p>\n<p>    Previously, the group had sought to sell its hacking tools to    the highest bidder. Few buyers came forward, the group said in    its blog post. But now, the monthly subscription model might    mean the bugs will find their way into the hands of more    people, spreading far and wide, Hall said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2017\/05\/16\/the-hacking-group-that-leaked-the-nsas-secrets-claims-it-has-data-on-foreign-nuclear-programs\/\" title=\"The hacking group that leaked NSA secrets claims it has data on foreign nuclear programs - Washington Post\">The hacking group that leaked NSA secrets claims it has data on foreign nuclear programs - Washington Post<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A massive cyberattack hit tens of thousands of computers in dozens of nations. Reports of the attack first surfaced in Britain, where the National Health Service described serious problems <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-hacking-group-that-leaked-nsa-secrets-claims-it-has-data-on-foreign-nuclear-programs-washington-post\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193565","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193565"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193565"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193565\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}