• 支持MPN
Logo Logo
  • 调查
  • 意见与分析
  • 卡通
  • 播客
  • 视频
  • 语言
    • English
    • русский
    • Español
    • اَلْعَرَبِيَّةُ
    • Français
A screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on laptop in Beijing, Saturday, May 13, 201. (AP/Mark Schiefelbein)

Malware Built On NSA Tools Used In Massive Cyber-Attack Hitting 74 Countries

关注我们

  • Rokfin
  • Telegram
  • Rumble
  • Odysee
  • Facebook
  • Twitter
  • Instagram
  • YouTube
A screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on laptop in Beijing, Saturday, May 13, 201. (AP/Mark Schiefelbein)
A screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on laptop in Beijing, Saturday, May 13, 201. (AP/Mark Schiefelbein)

Apparent National Security Agency (NSA) malware has been used in a global cyber-attack, including on British hospitals, in what whistleblower Edward Snowden described as the repercussion of the NSA’s reckless decision to build the tools.

“Despite warnings, @NSAGov built dangerous attack tools that could target Western software. Today we see the cost,” Snowden tweeted Friday.

At least two hospitals in London were forced to shut down and stop admitting patients after being attacked by the malware, which operates by locking out the user, encrypting data, and demanding a ransom to release it. The attacks hit dozens of other hospitals, ambulance operators, and doctors’ offices as well.

The Blackpool Gazette in the northwest reported that medical staff had resorted to using pen and paper when phone and computer systems shut down. Elsewhere, journalist Ollie Cowan tweeted a photo of ambulances “backed up” at Southport Hospital as the staff attempted to cope with the crisis.

https://twitter.com/Ollie_Cowan/status/863050780538007553

Other disruptions were reported in at least 74 countries, including Russia, Spain, Turkey, and Japan, and the number is “growing fast,” according to Kaspersky Lab chief Costin Raiu. Security architect Kevin Beau said it was spreading into the U.S. as well.

The malware, which Microsoft tested briefly earlier this year, was leaked by a group calling itself the Shadow Brokers, which has been releasing NSA hacking tools online since last year, the New York Times reports.

Times journalists Dan Bilefsky and Nicole Perlroth wrote:

Microsoft rolled out a patch for the vulnerability in March, but hackers apparently took advantage of the fact that vulnerable targets—particularly hospitals—had yet to update their systems.

The malware was circulated by email. Targets were sent an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its targets.

Reuters reported that the National Health Service (NHS), England’s public health system, was warned about possible hacking earlier in the day, but that by then it was already too late.

A Twitter account with the handle @HackerFantastic, the co-founder of the cyber security company Hacker House, tweeted that the firm had “warned the NHS with Sky news about vulnerabilities they had last year, this was inevitable and bound to happen at some stage.”

“In light of today’s attack, Congress needs to be asking @NSAgov if it knows of any other vulnerabilities in software used in our hospitals,” Snowden tweeted. “If @NSAGov had privately disclosed the flaw used to attack hospitals when they *found* it, not when they lost it, this may not have happened.”

Disclosing the vulnerability when it was found would have given hospitals years, not months, to update their systems and prepare for an attack, he added.

Animated map of how tens of thousands of computers were infected with ransomware https://t.co/LDFCW9K5Ls pic.twitter.com/E5Ep9KesaV

— The New York Times (@nytimes) May 13, 2017

Twitter user @MalwareTechBlog added, “Something like this is incredibly significant, we’ve not seen P2P spreading on PC via exploits at this scale in nearly a decade.”

Patrick Toomey, a staff attorney with the American Civil Liberties Union’s (ACLU) National Security Project, said, “It would be shocking if the NSA knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen.”

“These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world,” Toomey said. “It is past time for Congress to enhance cybersecurity by passing a law that requires the government to disclose vulnerabilities to companies in a timely manner. Patching security holes immediately, not stockpiling them, is the best way to make everyone’s digital life safer.”


This work by --- is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.This work by Common Dreams is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.

 

Comments
13 5 月, 2017
Nadia Prupis

What’s Hot

国际足联筹备2025年世俱杯之际,球迷要求向以色列出示红牌

膝盖骨与以色列游说团体:一支叛军如何震撼英国

从媒体宠儿到不受欢迎的人:格蕾塔·通贝里的心路历程

揭露:欧盟国家谴责加沙种族灭绝,秘密与以色列签署数十亿美元武器交易

英国巴勒斯坦团结运动官员承认与前以色列间谍合作

  • 联系我们
  • Archives
  • About Us
  • 隐私政策
© 2025 MintPress News