Site icon The Punching Bag Post

Snowden says NSA Could Have Prevented Ransomware Attack

<p>The biggest ransomware attack in history began last Friday&period; Since then&comma; it has infected tens of thousands of computers in over 100 countries&period;&nbsp&semi;<&sol;p>&NewLine;<p>This includes hospitals &ndash&semi; some of which were forced to cancel outpatient appointments &ndash&semi; banks&comma; government agencies&comma; universities&comma; gas stations&comma; and electronics companies&period;&nbsp&semi;<&sol;p>&NewLine;<p>The virus is called &&num;8220&semi;WannaCrypt&period;&&num;8221&semi; What is does is lock up a computer&rsquo&semi;s files and then demands a &ldquo&semi;ransom&rdquo&semi; payment in Bitcoin electronic currency in order to regain access&period;<&sol;p>&NewLine;<p>Experts call WannaCrypt the worst and most widespread form of malware they&rsquo&semi;ve ever seen&period;<&sol;p>&NewLine;<p>According to cybersecurity firm Malwarebytes&comma; the virus&nbsp&semi;spreads through a weakness in Windows software&period; In essence&comma; WannaCrypt goes through the Internet and looks for vulnerable computers &ndash&semi; which means you don&rsquo&semi;t even have to click anything to get infected&period; &nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency&comma; or NSA&comma; in the United States&comma;&rdquo&semi; writes Microsoft President Brad Smith&period;<&sol;p>&NewLine;<p>That theft was reported in April&period;&nbsp&semi;<&sol;p>&NewLine;<p>Microsoft released a patch for this weakness on March 14th&period; Users who failed to keep their operating systems up-to-date were and still are at risk of infection&period;<&sol;p>&NewLine;<p>&ldquo&semi;We take every single cyberattack on a Windows system seriously&comma; and we&rsquo&semi;ve been working around the clock since Friday to help all our customers who have been affected by this incident&comma;&rdquo&semi; said Smith&period;&nbsp&semi;<&sol;p>&NewLine;<p>&&num;8212&semi;<&sol;p>&NewLine;<p>Researchers don&&num;8217&semi;t know who&rsquo&semi;s responsible&comma; but the majority of attacks have occurred in Taiwan&comma; Ukraine&comma; and Russia&period; &nbsp&semi;<&sol;p>&NewLine;<p>Former NSA contractor Edward Snowden&comma; a whistleblower currently living in exile in Russia&comma; says the NSA could have prevented the attack&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;If &commat;NSAGov had privately disclosed the flaw used to attack hospitals when they &ast;found&ast; it&comma; not when they lost it&comma; this may not have happened&comma;&rdquo&semi; he tweeted on May 12th&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;Despite warnings&comma; &lbrack;NSA&rsqb; built dangerous attack tools that could target Western software&comma;&rdquo&semi; said Snowden&period; &ldquo&semi;Today we see the cost&period;&rdquo&semi;&nbsp&semi;<&sol;p>&NewLine;<p>Snowden urges Congress to ask the NSA if it is aware of any other vulnerabilities&period;&nbsp&semi;<&sol;p>&NewLine;<p>Microsoft&&num;8217&semi;s Smith says the attack illustrates the &ldquo&semi;degree to which cybersecurity has become a shared responsibility between tech companies and customers&rdquo&semi; and calls on governments to report vulnerabilities instead of stockpiling&comma; selling&comma; or exploiting them&period; &nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen&comma;&rdquo&semi; said Smith&period;&nbsp&semi;<&sol;p>&NewLine;<p><strong>Author&rsquo&semi;s Note&colon;<&sol;strong> The NSA may have been carless with the handling of information&comma; but Snowden&rsquo&semi;s claim that the vulnerability for the attack came from the NSA is unfair&period;&nbsp&semi;<&sol;p>&NewLine;<p>The NSA maintained a list of vulnerabilities for Microsoft products&period; This list was stolen&comma; and one of the vulnerabilities on the list was used in the attack&period;&nbsp&semi;<&sol;p>&NewLine;<p>Did Microsoft know about the list&quest; If so&comma; why were the vulnerabilities not patched before&quest;<&sol;p>&NewLine;

Exit mobile version