• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

Cyberattacks using leaked NSA hacking tool reported in 12 countries

low-G

Member
...it was WikiLeaks that unleashed a tool of destruction without notifying journalists or governments first because they think themselves agents of chaos.

WikiLeaks wasn't involved in this. There was a cracker group who got the exploits from a NSA contractor. First, the group sold the exploits for a large amount of money. Around this time someone notified MS, probably the NSA, and MS fixed the bug. Then about a month later the cracker group released the exploit for all for free.

Obviously, the next step is for someone to 'weaponize' the exploit. Put ransomware into it or carry out some vendetta or blackmail. That's what this malware is. Someone did the next logical step and made a weapon out of the exploit.
 
They're not "agents of chaos", they're an arm of the Russian government. Hence they put something like this out in the open to get people pissed at the NSA for doing their jobs.
This wasn't WikiLeaks anyway

You are implicitly arguing for them when you say the NSA should be protecting this country. They can't do that without developing these tools, whether you like to admit it or not. Should they guard those tools better? Sure. But leaving our nation toothless in the face of attacks that will come regardless of how pure the NSA is in your eyes seems like folly.
There is some serious mental contortion necessary to think that just because I want the NSA to harden our computer infrastructure, I also want them to put backdoors in my operating system. Defense is not offense and vice versa. In fact, cyberweapons are not about protecting the country at all, they are either for threatening the civilian population of another country or for targeting individuals. The former is easily achievable with conventional weaponry and the latter is a hazardous road to go down. Limited constitutional government is the exception in human history, not the rule.

Just think of the heads up WIkileaks gave Russia of these new fun tools they had access to?
If a Russian Telecom company got hit hard by this then they obviously weren't given much notice.

WikiLeaks wasn't involved in this. There was a cracker group who got the exploits from a NSA contractor. First, the group sold the exploits for a large amount of money. Around this time someone notified MS, probably the NSA, and MS fixed the bug. Then about a month later the cracker group released the exploit for all for free.

Obviously, the next step is for someone to 'weaponize' the exploit. Put ransomware into it or carry out some vendetta or blackmail. That's what this malware is. Someone did the next logical step and made a weapon out of the exploit.
Wait. I mixed this up with the vault7 dump. My bad.
 

fuzzyset

Member
This is a perfect illustration of the hubris and misguidance of the intelligence community. The NSA knows huge swaths of IT run insecure versions of Windows. If they really wanted to 'protect America' the NSA would inform Microsoft of these issues rather hoard them in their vaults. Their hoarding assumes that 1) no one else is smart enough to figure the exploits out and/or 2) their tools/knowledge won't be leaked. Both have been proven false time and time again. They are knowingly sacrificing the security of America for a shot at exploiting foreign countries.
 

Dopus

Banned
They're not "agents of chaos", they're an arm of the Russian government. Hence they put something like this out in the open to get people pissed at the NSA for doing their jobs.

Don't need to give someone a heads up if they're who you got them from.

Hyperbole galore. You should really limit the use of it when you're attempting to show your outrage, especially when it's completely untrue.

Also, the tools have been out there for a while. Not Wikileaks related.
 

Gallbaro

Banned
Going to be a huge push to web apps after this. Client-Server software just does not get updated enough and no one patches for fear of breaking.
 
FYI: the NSA had reported the vulnerabilities to Microsoft, who issued patches well before the Shadow Brokers leaked said vulnerabilities.

The problem: people not applying the patches. It's always not applying the damn patches. Always apply the patches, fools!
 

Memory

Member
FYI: the NSA had reported the vulnerabilities to Microsoft, who issued patches well before the Shadow Brokers leaked said vulnerabilities.

The problem: people not applying the patches. It's always not applying the damn patches. Always apply the patches, fools!

This just reminded me that significant portion of GAF are against Win10 or forced updates.

Very scummy to hit the NHS, NHS funding issues have been on the news for years, blood from a damn stone.
 

Nevasleep

Member
Imagine how many conference calls are going on right now...

The options for big companies are patch for MS17-010 immediately, or shutdown/isolate. It's like MS08-067

This just reminded me that significant portion of GAF are against Win10 or forced updates.
Well they haven't been very good about it, they should only force the restarts and disruption etc for critical situations/patches like this.
 

Paganmoon

Member
FYI: the NSA had reported the vulnerabilities to Microsoft, who issued patches well before the Shadow Brokers leaked said vulnerabilities.

The problem: people not applying the patches. It's always not applying the damn patches. Always apply the patches, fools!

Yeah, about that, got linked this picture in april by a colleague, first I laughed... then I cried a bit.

J0Pqgjq.png

Imagine how many conference calls are going on right now...

The options for big companies are patch for MS17-010 immediately, or shutdown/isolate. It's like MS08-067


Well they haven't been very good about it, they should only force the restarts and disruption etc for critical situations/patches like this.

Thing is, it's only SMBv1 that's affected afaik, if you can't patch (which isn't always an option for enterprises, due to downtime), remotely shutting down SMBv1 should make them safe.
 

Kthulhu

Member
NSA is stupid for letting this get out and these organizations are stupid for not properly protecting themselves.

This just reminded me that significant portion of GAF are against Win10 or forced updates.

Very scummy to hit the NHS, NHS funding issues have been on the news for years, blood from a damn stone.

Fortunately, they have little say in the matter.
 
Saw doctors saying people are definitely going to die because of this. Some London hospitals are almost completely locked down from a tech and records standpoint.
 

LoveCake

Member
Something like this was always going to happen and I the future there will be something released that is even worse.

The Tories in the UK and many other countries are trying to get encryption weakened.

IT systems like the NHS us shouldn't even have a terminal that is connected to the external internet or have it so external storage devices can be connected to it, it should be a closed system.

Y6IhPNn.gif


Stay safe everyone.
 
IT systems like the NHS us shouldn't even have a terminal that is connected to the external internet or have it so external storage devices can be connected to it, it should be a closed system.
Easy to say, difficult to implement with all the changing contracts for maintenance of these systems.
 

AlphaDump

Gold Member
Why do I feel like, despite the US sabotaging Iran's nuclear program, widespread astroturfing and social engineering during an important US election year, and a seeming increase in high profile institutions being hit with ransomware.. nobody is really taking cyberwarfare as serious as they seem to do in their press releases?

Or is cybersecurity just a shit show in general?

You cant guard everything with a tank, and the biggest threat is the ones inside, though they do need to work with vendors more. Why do complicated espionage when you can just fool or charm the weakest links.

People, processes, technology, but it is really the people.


/Now click this link for a hilarious youtube video. Each click donates to local schools.
 

Kthulhu

Member
backups are not restored instantaneously. Depending on the amount of data, it could take hours, hell even days at worst.

I know that. But if they're saying it's gone forever then it means there are no backups.

Lots of equipment runs XP too, they don't just have backups, there's 1000s of computers on all hospitals.

Not should be running Windows IMO.

Then they need a better IT department or to listen to said department more.
 

Paganmoon

Member
I know that. But if they're saying it's gone forever then it means there are no backups.



Then they need a better IT department or to listen to said department more.

Didn't see it mentioned that they were gone forever, just that they are currently locked out? Geezes, though, the scale of this, I'm happy I don't work there, cause to restore everything holy shit.
 

Kthulhu

Member
Didn't see it mentioned that they were gone forever, just that they are currently locked out? Geezes, though, the scale of this, I'm happy I don't work there, cause to restore everything holy shit.

The NHS's IT department is probably pissed.

I'm told doing IT for the medical industry sucks as it is, but they probably never expected this to happen.
 
Why do I feel like, despite the US sabotaging Iran's nuclear program, widespread astroturfing and social engineering during an important US election year, and a seeming increase in high profile institutions being hit with ransomware.. nobody is really taking cyberwarfare as serious as they seem to do in their press releases?

Or is cybersecurity just a shit show in general?

Oh you best believe this will make the UK pay attention.

Is there any potential risk of patient files being accessed?

That would be fucking chaos if so...

Edit: Realised that this isn't the UK specific thread so I'm referencing the NHS here.
 

Kthulhu

Member
Article in the OP has been updated to 99 countries.

Oh you best believe this will make the UK pay attention.

Is there any potential risk of patient files being accessed?

That would be fucking chaos if so...

Edit: Realised that this isn't the UK specific thread so I'm referencing the NHS here.

Unlikely. Ransomware usually just holds your files hostage.
 

Syder

Member
Comment from reddit
I'm a doctor in one of the affected hospitals, a major trauma center in London. Everything has gone down. No blood results, no radiology images, there's no group specific blood available. They've declared an internal major incident, the hospital is diverting major trauma and stroke patients. All elective surgery was cancelled from about 1pm. We're not doing anything in theatre that's not life or limb threatening.
There will almost certainly be deaths as a result of this. I sincerely hope whichever cunts were responsible for this get utterly fucked by GCHQ.
 
Top Bottom