Thursday, 16 August 2018
Latest news
Main » The Wannacry Cyber Attack Puts NSA Hacking Back Into Focus

The Wannacry Cyber Attack Puts NSA Hacking Back Into Focus

19 May 2017

Microsoft had released a patch in March to counter WannaCrypt ransomware, the company also issued a prompt update on Friday to Windows Defender to detect the WannaCrypt attack.

"Hopefully people are learning how important it is to apply these patches", said Darien Huss, a senior security research engineer for cybersecurity firm Proofpoint, who helped stem the reach of the weekend attack.

The cyber experts have warned of a huge risk in near future as most institutions and individuals in Bangladesh use pirated software.

"By failing to support older versions of its operating system, the IT company provided the hackers that stole the NSA's IT Tomahawk Missile the opportunity they needed", expressed The Independent, while The Inquirer voiced similar concerns in an article titled "Microsoft, it's not just the NSA".

When Shadow Brokers first released the NSA exploit that drives WannaCry infections three months ago, Microsoft quickly issued a patch for anyone who bothered to update Windows.

Prabir Sarkar, CEO of OfficeExtract, a local distributor of Kaspersky Lab, said, "We have so far received complaints from five types of medium enterprises in the country".

More news: Iran's re-engagement with the world at stake in Friday presidential vote

Cybercriminals appear to have used the EternalBlue exploit stolen from the NSA to develop the ransomware, which locks up computers and then moves laterally though networks to infect others.

It's the name for a prolific hacking attack known as "ransomware", that holds your computer hostage until you pay a ransom. WannaCry provides two: Big organizations, particularly in health care, must learn to prioritize safety over compliance; and while doing that, they shouldn't have to fight against American-made weaponry.

In a blog post, Smith argued governments have opted to hoard software vulnerabilities for offensive purposes but did not inform technology companies about the vulnerabilities.

They exploited a ideal storm of factors - the Windows hole, the ability to get ransom paid in digital currency, poor security practices - but it's unclear if the payoff, at least so far, was worth the trouble.

On Monday the firm said that 90% of its factories were running again.

Smith has also suggested a "Digital Geneva Convention" that would include "a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them".

More news: Trump scraps Masada visit after Israel nixes chopper landing

Telefónica: Spanish authorities confirmed the Spanish telecom company Telefónica was one of the targets, though the attack affected only some computers and did not compromise the security of clients' information. It gives incentives to hackers and pays for future attacks.

The company was the one providing security services to Britain's National Health Service, one of the organisations hit by the ransomware outbreak and possibly the one which earned the most coverage about its misfortunes.

If you have a recent backup, restore from it: Ransomware is worthless to a hacker if a user has a backup. "You've got to keep your systems updated".

"They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world", said Microsoft President and Chief Legal Officer Brad Smith.

Never open attachments in emails from someone you don't know.

More news: Chaffetz wants Comey to appear before House committee