breaking news

  • 10 YEARS LATER – NO LESSONS LEARNED
  • Toronto’s Yorkdale Shopping Centre – one of the busiest malls in the country – was packed with back-to-school shoppers when gunshots rang out Thursday afternoon, sending thousands of panicked customers ducking into clothing racks and running for safety.
  • About 84 per cent of the 4.6 million people who took part in the consultation ‘do not want the clocks to change anymore’
  • Palestinian leaders do not want to see any improvement in the lives of the Arabs in Jerusalem so that they can continue to incite against Israel and accuse it of discriminating against its Arab population.
  • Economic Doom Returns: Emerging Market Currencies Collapse To Record Lows As Global Financial Chaos Accelerates
  • Who is Pope Francis? Jorge Mario Bergoglio and Argentina’s “Dirty War”
  • Apocalypse Now ? : “And I saw a beast coming up out of the sea, having ten horns and seven heads…”
  • Many in Germany believe that if ‘push comes to shove,’ the US would not have the military capability to keep the Strait of Hormuz open. And in this case, the EU’s biggest economy could face an energy crisis.

Magazine Covers

Magazine Covers
Subscribe Now

Magazine Covers

Magazine Covers

“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools

May 12th, 2017 | by Richard Paul
“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools
Business and Finance
0

Update 4: According to experts tracking and analyzing the worm and its spread, this could be one of the worst-ever recorded attacks of its kind. The security researcher who tweets and blogs as MalwareTech told The Intercept “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over nine million computers in nearly 200 countries. As The Intercept details,

Today’s WannaCry attack appears to use an NSA exploit codenamed ETERNALBLUE, a software weapon that would have allowed the spy agency’s hackers to break into any of millions of Windows computers by exploiting a flaw in how certain version of Windows implemented a network protocol commonly used to share files and to print. Even though Microsoft fixed the ETERNALBLUE vulnerability in a March software update, the safety provided there relied on computer users keeping their systems current with the most recent updates. Clearly, as has always been the case, many people (including in governments) are not installing updates. Before, there would have been some solace in knowing that only enemies of the NSA would have to fear having ETERNALBLUE used against them–but from the moment the agency lost control of its own exploit last summer, there’s been no such assurance.

Today shows exactly what’s at stake when government hackers can’t keep their virtual weapons locked up.

As security researcher Matthew Hickey, who tracked the leaked NSA tools last month, put it, “I am actually surprised that a weaponized malware of this nature didn’t spread sooner.”

Update 3: Microsoft  has issued a statement, confirming the status the vulnerability:

Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt. 

In March, we provided a security update which provides additional protections against this potential attack.

Those who are running our free antivirus software and have Windows updates enabled, are protected. We are working with customers to provide additional assistance.

Zero Hedge

Microsoft Virus affects worldwide computers Windows Computers worst-ever recorded attacks of its kind.

Leave a Reply