Wednesday, 18 July 2018
Latest news
Main » Microsoft says NSA to blame for Wannacry

Microsoft says NSA to blame for Wannacry

21 May 2017

How to know if your computer is infected with WannaCry?

On Monday (May 15), private sector sleuths found a clue about potentially who's responsible for the WannaCrypt attack. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address. Consequently, the computer user will not be able to receive any data.

To ensure that you do not lose data, you have to take backup frequently.

Ransomware is not a new invention. When a user clicks on the link or attachment, the ransomware is activated on the user's device and then flows through the user's network.

More news: Four-goal Kane helps Spurs rout Leicester

"The Transmission Control Protocol port 445 of Windows system, which is widely acknowledged unsafe, is closed on many computers".

But WannaCry is unique. An unidentified group known as shadow brokers is believed to have stolen the tools from United States National Intelligence Agency. Now, another leaked NSA tool is being used by cybercriminals to create more havoc.

Firstly, given its involvement with surveillance and safety, the NSA should have a safer network. While some firms have asked employees to temporarily suspend work for a few hours, some others have declared holiday for two days, while their respective technical teams upgrade their security systems, to prevent a potential Wanna decryptor attack, said a report by a leading English news portal.

Stockpiling vulnerability involves finding and keeping hidden information regarding internet and computer vulnerabilities.

More news: Microsoft to NSA: WannaCry is your fault

Calling for a "Digital Geneva Convention", Microsoft's Smith said the widespread damage caused by the ransomware shows that governments need to treat cyber weapons the same way they treat conventional weapons.

The WannaCry ransomware is nasty and once it gets hold of your files, there's no way to decrypt them - at least not for now.

Because it's possible for the perpetrators to alter the code to use a different domain, MalwareTech and others warned the ransomware could continue spreading.

A 22-year old British security researcher who goes by the Twitter name MalwareTech is credited with slowing the spread of the ransomware by discovering a "kill switch" in the software that could disable the malware. Adylkuzz, however, is WannaCry's much quieter, much more risky cousin that could have more serious consequences for the world. Consider this map released by Malwareless.

More news: Chaffetz resignation latest twist in GOP oversight of Trump

There exists a fine line between fighting fire with fire and simply being careless of the sparks. And while Microsoft said it had already released a security update to patch the vulnerability a month earlier, it would appear that the NSA hadn't told the U.S. tech giant about the security risk until after it had been stolen.