{"id":201924,"date":"2017-06-28T05:57:27","date_gmt":"2017-06-28T09:57:27","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-linked-tools-help-power-second-global-ransomware-outbreak-politico\/"},"modified":"2017-06-28T05:57:27","modified_gmt":"2017-06-28T09:57:27","slug":"nsa-linked-tools-help-power-second-global-ransomware-outbreak-politico","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-linked-tools-help-power-second-global-ransomware-outbreak-politico\/","title":{"rendered":"NSA-linked tools help power second global ransomware outbreak &#8211; Politico"},"content":{"rendered":"<p><p>      The seals of the U.S. Cyber Command, the National Security      Agency and the Central Security Service are pictured outside      the campus the three organizations share in Fort Meade,      Maryland. | Getty    <\/p>\n<p>        By Eric        Geller      <\/p>\n<p>        06\/27\/2017 12:16 PM EDT      <\/p>\n<p>        Updated 06\/27\/2017 05:49 PM EDT      <\/p>\n<p>    A potent ransomware attack has gripped organizations around the    world for the second time in less than two months.  <\/p>\n<p>    And like the first outbreak in mid-May  which claimed    hundreds of thousands victims in a game-changing cyberattack     Tuesday's outburst is spreading via a Microsoft flaw originally    exposed in a leak of apparent NSA hacking tools.  <\/p>\n<p>    Story Continued Below  <\/p>\n<p>    The latest malicious software battered companies in Russia,    Ukraine and many other countries in Europe, according to    cybersecurity researchers, sending law enforcement officials    scrambling and sparking fears about how the world would contain    the outbreak of the malware, which locks up computer systems    and demands ransom payments.  <\/p>\n<p>    While the U.S. has been largely unscathed to this point, major    multinational energy, shipping, banking, pharmaceutical and law    firms, as well as government agencies, have confirmed they are    fighting off cyberattacks.  <\/p>\n<p>    Security firm Kaspersky Lab estimated it had seen 2,000    victims, and counting, throughout the day. While the estimate    is significantly lower than the massive numbers tied to May's    attack  which relied on malware dubbed WannaCry  some    researchers noted technical details of the new malware that    might make it harder to kill.  <\/p>\n<p>    Researchers have also not yet linked the latest attack to any    specific hacking group or nation-state, unlike May's digital    ambush, which technical specialists and reportedly intelligence    officials in the U.S. and U.K. traced to North Korean-backed    hackers.  <\/p>\n<p>    But security specialists have been warning for weeks that the    recent WannaCry ransomware virus was only the beginning of    these fast-spreading digital sieges.  <\/p>\n<p>    WannaCry was powered by a variant of apparent NSA cyber weapons    that were dumped online, raising questions about whether the    secretive hacking agency should sit on such powerful tools    instead of alerting companies like Microsoft to the    deficiencies in their software.  <\/p>\n<p>    Experts say hackers have likely been working to tweak the    WannaCry malware, potentially allowing new versions to skirt    the digital defenses that helped stall the first global    assault.  <\/p>\n<p>          Sign up for POLITICO Playbook and get the latest news,          every morning  in your inbox.        <\/p>\n<p>          By signing up you agree to receive email newsletters or          alerts from POLITICO. You can unsubscribe at any time.        <\/p>\n<p>    Indeed, the virus that proliferated Tuesday shares many    similarities with WannaCry, but contains some striking    differences.  <\/p>\n<p>    For starters, Tuesday's virus proliferated using the same    Microsoft Windows flaw as WannaCry, according to digital    security firms Symantec and Bitdefender Labs. But researchers noted the malware is also capable of    hopping around using multiple Microsoft flaws, not just the    most famous one exposed in the online dump of the purported NSA    cyber weapons.  <\/p>\n<p>    Additionally, like WannaCry, this new malware demands that    victims pay a ransom using the digital currency Bitcoin before    their files can be unlocked. As of Tuesday evening, 32 victims    had paid a ransom, with the number steadily    climbing.  <\/p>\n<p>    Unlike WannaCry, however, the rapidly spreading malware does    not merely encrypt files as part of its ransom scheme. Rather,    it changes critical system files so that the computer becomes    unresponsive, according to John Miller, a senior manager for    analysis at the security firm FireEye, which reviewed the    malware.  <\/p>\n<p>    Some researchers identified the infection as a novel variation    of the so-called Petya malware, which has been around since    2016. But researchers at Kaspersky believe it is a totally new    strain they are dubbing ExPetr.  <\/p>\n<p>    A sample of the malware initially went undetected by nearly all antivirus software.  <\/p>\n<p>    The digital weapon cloaks itself as a file that Microsoft has    already approved as safe, helping it avoid detection, Costin    Raiu, director of global research efforts at Kaspersky,    said on Twitter.  <\/p>\n<p>    The malware was written on June 18, according to a sample that    Kaspersky has analyzed.  <\/p>\n<p>    Most of the infections on Tuesday were in Ukraine, with Russia    the next hardest hit, according to Kasperskys analysis. Russia was also a major    victim during the WannaCry outbreak. Raiu told POLITICO that    Belarus, Brazil, Estonia, the Netherlands, Turkey and the    United States were also affected, but that those countries    accounted for less than 1 percent of all victims.  <\/p>\n<p>    A Department of Homeland Security spokesman said the agency was    \"monitoring reports\" of the ransomware campaign and    coordinating with international authorities.  <\/p>\n<p>    Researchers suspect that Ukraine became the nexus of the    outburst after companies using a popular tax program    unknowingly downloaded an update that contained the ransomware.    From there, the virus could have spread beyond those companies    using various flaws in Windows.  <\/p>\n<p>    The ransomware eruption may be responsible for several major    cyber incidents that began Tuesday.  <\/p>\n<p>    The global shipping and logistics firm Maersk  which is based    in Denmark  confirmed that it was dealing with a intrusion    affecting \"multiple sites and business units.\" And the Russian    oil company Rosneft said it was responding to \"a massive hacker    attack.\"  <\/p>\n<p>    Ukraine's central bank and its capital city's main airport also    said they were dealing with cyberattacks. The    virus appeared to be hitting the country's    government computers as well.  <\/p>\n<p>    The cyberattack also forced the Ukraine-based Chernobyl nuclear    power plant to revert to manual radiation monitoring, according to a Ukrainian journalist citing    the country's state news service.  <\/p>\n<p>    Elsewhere, the German pharmaceutical giant Merck said its network was compromised in the outbreak    and that it was still investigating the incident.  <\/p>\n<p>          A daily briefing on politics and cybersecurity  weekday          mornings, in your inbox.        <\/p>\n<p>          By signing up you agree to receive email newsletters or          alerts from POLITICO. You can unsubscribe at any time.        <\/p>\n<p>    But the U.S. has been largely spared so far.  <\/p>\n<p>    The American Gas Association said in a statement that no U.S.    natural gas utilities have reported infections.  <\/p>\n<p>    However, in Pennsylvania, the Heritage Valley Health System     which operates two hospitals and 60 physician offices  said it    was grappling with a cyberattack. The incident is widespread    and is affecting the entire health system, said spokeswoman    Suzanne Sakson.  <\/p>\n<p>    Multinational law firm DLA Piper was also experiencing computer    and phone outages in multiple offices, including in Washington,    D.C. The company did not respond to a request for comment.  <\/p>\n<p>    But a photo shared with POLITICO showed a sign outside the    firm's Washington office that read, \"All network services are    down, do not turn on your computers! Please remove all laptops    from docking stations and keep turned off. No exceptions.\"  <\/p>\n<p>    DLA Pipers secure document storage system for clients also    went down, though the firm may have done that as a precaution.    A bit stressed at moment as I am unsure if our docs there are    safe, one client told POLITICO.  <\/p>\n<p>    Tim Starks contributed to this report.  <\/p>\n<p>            Missing out on the latest scoops? Sign up for POLITICO Playbook and get the            latest news, every morning  in your inbox.          <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.politico.com\/story\/2017\/06\/27\/ransomware-virus-nsa-petya-hacking-tools-240008\" title=\"NSA-linked tools help power second global ransomware outbreak - Politico\">NSA-linked tools help power second global ransomware outbreak - Politico<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The seals of the U.S. Cyber Command, the National Security Agency and the Central Security Service are pictured outside the campus the three organizations share in Fort Meade, Maryland. | Getty By Eric Geller 06\/27\/2017 12:16 PM EDT Updated 06\/27\/2017 05:49 PM EDT A potent ransomware attack has gripped organizations around the world for the second time in less than two months <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-linked-tools-help-power-second-global-ransomware-outbreak-politico\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-201924","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/201924"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=201924"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/201924\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=201924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=201924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=201924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}