{"id":201922,"date":"2017-06-28T05:57:25","date_gmt":"2017-06-28T09:57:25","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/new-cyberattack-uses-same-nsa-developed-exploit-whsv-com-whsv\/"},"modified":"2017-06-28T05:57:25","modified_gmt":"2017-06-28T09:57:25","slug":"new-cyberattack-uses-same-nsa-developed-exploit-whsv-com-whsv","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/new-cyberattack-uses-same-nsa-developed-exploit-whsv-com-whsv\/","title":{"rendered":"New cyberattack uses same NSA-developed exploit &#8211; WHSV.com &#8211; WHSV"},"content":{"rendered":"<p><p>    PARIS (AP)     UPDATE (1:30 p.m.):  <\/p>\n<p>    Security experts say Tuesday's cyberattack shares something in    common with last month's WannaCry attack: Both spread by using    digital break-in tools purportedly created by the U.S. National    Security Agency and recently leaked to the web.  <\/p>\n<p>    Security vendors Bitdefender Labs and Kaspersky Labs say the    NSA exploit, known as EternalBlue, is allowing the malware to    spread inside an organization's network. Other than that, the    latest malware is different from WannaCry.  <\/p>\n<p>    Organizations should be protected if they had installed a fix    that Microsoft issued in March.  <\/p>\n<p>    But Chris Wysopal, chief technology officer at the security    firm Veracode, says that's only the case if 100 percent of    computers were patched. He says that if one computer gets    infected, the new malware has a backup mechanism to spread to    patched computers within the network as well.  <\/p>\n<p>    Wysopal says the attack seems to be hitting large industrial    companies that \"typically have a hard time patching all of    their machines because so many systems simply cannot have down    time.\"  <\/p>\n<p>    Organizations hit include the Russian oil company Rosneft and    the Danish oil and shipping company AP Moller-Maersk.  <\/p>\n<p>    _____  <\/p>\n<p>    UPDATE (12:10 p.m.):  <\/p>\n<p>    The second-largest drugmaker in the United States is confirming    it's been affected by a cyberattack.  <\/p>\n<p>    In a message sent using its verified Twitter account, Merck    confirmed Tuesday that its computer network was \"compromised\"    as part of a global attack.  <\/p>\n<p>    Officials said the Kenilworth, New Jersey-based company was    investigating the incident but provided no further details.  <\/p>\n<p>    Merck has global locations including in Ukraine, where a new    and highly virulent outbreak of malicious data-scrambling    software causing mass disruption across Europe appeared to be    hitting especially hard.  <\/p>\n<p>    Company and government officials reported serious intrusions at    the Ukrainian power grid, banks and government offices, where    one senior official posted a photo of a darkened computer    screen and the words, \"the whole network is down.\"  <\/p>\n<p>    Dutch-based transport company TNT Express, which was taken over    last year by FedEx, also said Tuesday that it is suffering    computer disruptions. Spokesman Cyrille Gibot says that \"like    many other companies and institutions around the world, we are    experiencing interference with some of our systems within the    TNT network. We are assessing the situation and are    implementing remediation steps as quickly as possible and we    regret any inconvenience to our customers.\" He declined further    comment.  <\/p>\n<p>    _____  <\/p>\n<p>    A new and highly virulent outbreak of malicious data-scrambling    software appears to be causing mass disruption across Europe,    hitting Ukraine especially hard.  <\/p>\n<p>    Company and government officials reported serious intrusions at    the Ukrainian power grid, banks and government offices, where    one senior official posted a photo of a darkened computer    screen and the words, \"the whole network is down.\" Ukraine's    prime minister said the attack was unprecedented but that    \"vital systems haven't been affected.\"  <\/p>\n<p>    Russia's Rosneft oil company also reported falling victim to    hacking, as did Danish shipping giant A.P. Moller-Maersk.  <\/p>\n<p>    \"We are talking about a cyberattack,\" said Anders Rosendahl, a    spokesman for the Copenhagen-based group. \"It has affected all    branches of our business, at home and abroad.\"  <\/p>\n<p>    The number of companies and agencies reportedly affected by the    ransomware campaign was piling up fast, and the electronic    rampage appeared to be rapidly snowballing into a real-world    crisis. Dutch daily Algemeen Dagblaad says that container ship    terminals in Rotterdam run by a unit of Maersk were also    affected. Rosneft said that the company narrowly avoided major    damage.  <\/p>\n<p>    \"The hacking attack could have led to serious consequences but    neither the oil production nor the processing has been affected    thanks to the fact that the company has switched to a reserve    control system,\" the company said.  <\/p>\n<p>    There's very little information about what might be behind the    disruption at each specific company, but cybersecurity experts    rapidly zeroed in on a form of ransomware, the name given to    programs that hold data hostage by scrambling it until a    payment is made.  <\/p>\n<p>    \"A massive ransomware campaign is currently unfolding    worldwide,\" said Romanian cybersecurity company Bitdefender. In    a telephone interview, Bitdefender analyst Bogdan Botezatu said    that he had examined samples of the program and that it    appeared to be nearly identical to GoldenEye, one of a family    of hostage-taking programs that has been circulating for    months.  <\/p>\n<p>    It's not clear whether or why the ransomware has suddenly    become so much more potent, but Botezatu said that it was    likely spreading automatically across a network, without the    need for human interaction. Self-spreading software, often    described as \"worms,\" are particularly feared because they can    spread rapidly, like a contagious disease.  <\/p>\n<p>    \"It's like somebody sneezing into a train full of people,\" said    Botezatu. \"You just have to exist there and you're vulnerable.\"  <\/p>\n<p>    The world is still recovering from a previous outbreak of    ransomware, called WannaCry or WannaCrypt, which spread rapidly    using digital break-in tools originally created by the U.S.    National Security Agency and recently leaked to the web.  <\/p>\n<p>    This particular variant of ransomware leaves a message with a    contact email; several messages sent to the address were not    immediately returned.  <\/p>\n<p>    ___    Vladimir Isachenkov in Moscow and Jan M. Olsen in Copenhagen,    Denmark contributed to this report.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.whsv.com\/content\/news\/New-cyberattack-causes-mass-disruption-in-Europe-431099253.html\" title=\"New cyberattack uses same NSA-developed exploit - WHSV.com - WHSV\">New cyberattack uses same NSA-developed exploit - WHSV.com - WHSV<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> PARIS (AP) UPDATE (1:30 p.m.): Security experts say Tuesday's cyberattack shares something in common with last month's WannaCry attack: Both spread by using digital break-in tools purportedly created by the U.S. National Security Agency and recently leaked to the web. Security vendors Bitdefender Labs and Kaspersky Labs say the NSA exploit, known as EternalBlue, is allowing the malware to spread inside an organization's network <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/new-cyberattack-uses-same-nsa-developed-exploit-whsv-com-whsv\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-201922","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/201922"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=201922"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/201922\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=201922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=201922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=201922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}