You are viewing our Forum Archives. To view or take place in current topics click here.
Hackers Hit Dozens of Countries Exploiting Stolen NSA Tool
Posted:

Hackers Hit Dozens of Countries Exploiting Stolen NSA ToolPosted:

Dream
  • Trusted Seller
Status: Offline
Joined: May 10, 201211Year Member
Posts: 4,636
Reputation Power: 549
Status: Offline
Joined: May 10, 201211Year Member
Posts: 4,636
Reputation Power: 549
Source @ [ Register or Signin to view external links. ]

SAN FRANCISCO Hackers exploiting malicious software stolen from the National Security Agency executed damaging cyberattacks on Friday that hit dozens of countries worldwide, forcing Britains public health system to send patients away, freezing computers at Russias Interior Ministry and wreaking havoc on tens of thousands of computers elsewhere.

The attacks amounted to an audacious global blackmail attempt spread by the internet and underscored the vulnerabilities of the digital age.

Transmitted via email, the malicious software locked British hospitals out of their computer systems and demanded ransom before users could be let back in with a threat that data would be destroyed if the demands were not met.

By late Friday the attacks had spread to more than 74 countries, according to security firms tracking the spread. Kaspersky Lab, a Russian cybersecurity firm, said Russia was the worst-hit, followed by Ukraine, India and Taiwan. Reports of attacks also came from Latin America and Africa.

Continue reading the main story
RELATED COVERAGE


U.K. Health Service, Targeted in Cyberattack, Ignored Warnings for Months MAY 12, 2017

Hacker Leaks Episodes From Netflix Show and Threatens Other Networks APRIL 29, 2017
Hackers Use New Tactic at Austrian Hotel: Locking the Doors JAN. 30, 2017

Los Angeles Hospital Pays Hackers $17,000 After Attack FEB. 18, 2016

Hes Bitcoins Creator, He Says, but Skeptics Pounce on His Claim MAY 2, 2016
The attacks appeared to be the largest ransomware assault on record, but the scope of the damage was hard to measure. It was not clear if victims were paying the ransom, which began at about $300 to unlock individual computers, or even if those who did pay would regain access to their data.

Security experts described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing email, similar to the one Russian hackers used in the attacks on the Democratic National Committee and other targets last year. They then quickly spread through victims systems using a hacking method that the N.S.A. is believed to have developed as part of its arsenal of cyberweapons. And finally they encrypted the computer systems of the victims, locking them out of critical data, including patient records in Britain.

The connection to the N.S.A. was particularly chilling. Starting last summer, a group calling itself the Shadow Brokers began to post software tools that came from the United States governments stockpile of hacking weapons.

The attacks on Friday appeared to be the first time a cyberweapon developed by the N.S.A., funded by American taxpayers and stolen by an adversary had been unleashed by cybercriminals against patients, hospitals, businesses, governments and ordinary citizens.

Something similar occurred with remnants of the Stuxnet worm that the United States and Israel used against Irans nuclear program nearly seven years ago. Elements of those tools frequently appear in other, less ambitious attacks.

The United States has never confirmed that the tools posted by the Shadow Brokers belonged to the N.S.A. or other intelligence agencies, but former intelligence officials have said that the tools appeared to come from the N.S.A.s Tailored Access Operations unit, which infiltrates foreign computer networks.

The attacks on Friday are likely to raise significant questions about whether the growing number of countries developing and stockpiling cyberweapons can avoid having those same tools purloined and turned against their own citizens.

They also showed how easily a cyberweapon can wreak havoc, even without shutting off a countrys power grid or its cellphone network.
#2. Posted:
8bitTit
  • Ladder Climber
Status: Offline
Joined: Aug 17, 20158Year Member
Posts: 364
Reputation Power: 62
Status: Offline
Joined: Aug 17, 20158Year Member
Posts: 364
Reputation Power: 62
Dream wrote
Source @ [ Register or Signin to view external links. ]

SAN FRANCISCO Hackers exploiting malicious software stolen from the National Security Agency executed damaging cyberattacks on Friday that hit dozens of countries worldwide, forcing Britains public health system to send patients away, freezing computers at Russias Interior Ministry and wreaking havoc on tens of thousands of computers elsewhere.

The attacks amounted to an audacious global blackmail attempt spread by the internet and underscored the vulnerabilities of the digital age.

Transmitted via email, the malicious software locked British hospitals out of their computer systems and demanded ransom before users could be let back in with a threat that data would be destroyed if the demands were not met.

By late Friday the attacks had spread to more than 74 countries, according to security firms tracking the spread. Kaspersky Lab, a Russian cybersecurity firm, said Russia was the worst-hit, followed by Ukraine, India and Taiwan. Reports of attacks also came from Latin America and Africa.

Continue reading the main story
RELATED COVERAGE


U.K. Health Service, Targeted in Cyberattack, Ignored Warnings for Months MAY 12, 2017

Hacker Leaks Episodes From Netflix Show and Threatens Other Networks APRIL 29, 2017
Hackers Use New Tactic at Austrian Hotel: Locking the Doors JAN. 30, 2017

Los Angeles Hospital Pays Hackers $17,000 After Attack FEB. 18, 2016

Hes Bitcoins Creator, He Says, but Skeptics Pounce on His Claim MAY 2, 2016
The attacks appeared to be the largest ransomware assault on record, but the scope of the damage was hard to measure. It was not clear if victims were paying the ransom, which began at about $300 to unlock individual computers, or even if those who did pay would regain access to their data.

Security experts described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing email, similar to the one Russian hackers used in the attacks on the Democratic National Committee and other targets last year. They then quickly spread through victims systems using a hacking method that the N.S.A. is believed to have developed as part of its arsenal of cyberweapons. And finally they encrypted the computer systems of the victims, locking them out of critical data, including patient records in Britain.

The connection to the N.S.A. was particularly chilling. Starting last summer, a group calling itself the Shadow Brokers began to post software tools that came from the United States governments stockpile of hacking weapons.

The attacks on Friday appeared to be the first time a cyberweapon developed by the N.S.A., funded by American taxpayers and stolen by an adversary had been unleashed by cybercriminals against patients, hospitals, businesses, governments and ordinary citizens.

Something similar occurred with remnants of the Stuxnet worm that the United States and Israel used against Irans nuclear program nearly seven years ago. Elements of those tools frequently appear in other, less ambitious attacks.

The United States has never confirmed that the tools posted by the Shadow Brokers belonged to the N.S.A. or other intelligence agencies, but former intelligence officials have said that the tools appeared to come from the N.S.A.s Tailored Access Operations unit, which infiltrates foreign computer networks.

The attacks on Friday are likely to raise significant questions about whether the growing number of countries developing and stockpiling cyberweapons can avoid having those same tools purloined and turned against their own citizens.

They also showed how easily a cyberweapon can wreak havoc, even without shutting off a countrys power grid or its cellphone network.


its so crazy what people can do
#3. Posted:
TOXIC
  • Summer 2023
Status: Offline
Joined: Jan 16, 201212Year Member
Posts: 22,328
Reputation Power: 32745
Motto: TTGS #1 SHIT POSTER!
Motto: TTGS #1 SHIT POSTER!
Status: Offline
Joined: Jan 16, 201212Year Member
Posts: 22,328
Reputation Power: 32745
Motto: TTGS #1 SHIT POSTER!
Damn those hackers can just about do anythink, quite scary if you think about it no one is save
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.