Sunday, May 28, 2017

HACKERS ARE USING TOOLS DEVELOPED BY THE NSA TO LAUNCH MASSIVE WORLDWIDE CYBER ATTACK

by ALEXA ERICKSON
Source: Collective Evolution

In recent hacker news, a group exploiting malicious software stolen from the National Security Agency executed damaging cyberattacks on Friday, resulting in a worldwide frenzy that froze computers at Russia’s Interior Ministry, forced Britain’s public health system to send patients away, and caused tens of thousands of computers elsewhere to malfunction.
With over 50,000 computer having been targeted, the ransomware virus infected computer files and then demanded money to unblock them.

According to Kaspersky Lab, a Russian cybersecurity firm, Russia was the worst-hit, followed by Ukraine, India, and Taiwan. Reports of attacks also came from Latin America and Africa. The attacks, believed to be the largest ransomware assault on record to date, was described by security experts as a perfect storm.



The attack began with a simple phishing email, much like the one Russian hackers used in the attacks on the Democratic National Committee and other targets last year. They then used a hacking method the NSA is believed to have developed as a cyberweapon to spread through victim’s systems. Finally, they encrypted the computer systems of the victims, which ultimately locked them out of important data.

The ransomware, called WanaCrypt0r 2.0, infected National Health Service (NHS) hospitals in the UK, as well as Spain’s biggest national telecommunications firm, Telefonica. More than 70 countries were affected.

The hacking tool was leaked by a group called the Shadow Brokers, which has claimed distribution of the stolen NSA hacking tools online since last year.

It may take months to discover who was behind the attacks, if they are found at all. Nonetheless, cybersecurity experts around the world remain alarmed, recognizing how vulnerable to internet invasions our important global systems truly are.

“When people ask what keeps you up at night, it’s this,” noted Chris Camacho, the chief strategy officer at Flashpoint, a New York security firm tracking the attacks. He went on to emphasize his concern regarding how the attacks spread like wildfire through corporate, hospital, and government networks.

And Rohyt Belani, another security expert and the chief executive of PhishMe, an email security company, called the wormlike characteristics of the malware a standout shift from prior ransom attacks. “This is almost like the atom bomb of ransomware,” Mr. Belani said. He warned that the attack “may be a sign of things to come.”

Consider contributing to this site

Hope you like this not for profit site.

We could not devote so much energy into continuing this blog if it was not for the support of readers.

We greatly appreciate any support you provide!


Fair Use of Information for ALL All data is freely available to the ALL, as an inherent inalienable right of consciousness and existence, for the use of any being in creation. No Claim of Ownership is made by MDT, for any data presented on this page or elsewhere. Any information, writing, photographs, videos or content on this page is freely available to ALL without claim of Intellectual Ownership. We advise providing attribution to this website (MakingaDifferenceToday369) when, and if, data herein presented is used elsewhere; so as to remain honest, transparent and to maintain the public trust as to where the information was found. Any and All data herein presented has been re-claimed for the collective benefit of all sentient life from any and all parties who seek to limit its dissemination. Any claims of intellectual ownership or copyright, that were once ascribed to content on this page, or elsewhere, is NULL and VOID; as a result of a misrepresentation of right of ownership and breach of trust by any party whom presumes to claim title and exclusive right of use. No requests, threats, or notices which seek to limit the sharing information for the benefit of ALL will be honored. However, a humble request to provide information in a certain way or form will be considered, up to and including, the partial removal of data, and only as an agreement between 2 honorable parties whom fully disclose and honor a moral duty to the truth. FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. It is being made available in an effort to advance the understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, and so on. It is believed that this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. In this respect we are in accordance with the statutes as well as Natural Law.  Issued pursuant to and governed by I AM, eternal essence, in body. MDT is a humble messenger of the One Infinite and Absolute Creator, in service of the Truth and the ALL.