Stolen N.S.A. hacking tool, EternalBlue, wreaks havoc in its own backyard

Discussion in 'Lounge' started by The Pirate, May 27, 2019.

  1. The Pirate

    The Pirate Audiosexual

    Joined:
    Dec 20, 2018
    Messages:
    5,186
    Likes Received:
    4,407
    Location:
    NOYMFB
    The hackers are getting hacked.:deep_facepalm:

    For nearly three weeks, Baltimore has struggled with a cyber attack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.Since the NSA lost control of its EternalBlue exploit two years ago, the tool has been repurposed by criminals and state actors alike to wreak billions of dollars of damage, upend the lives of citizens, damage businesses and paralyze governments. As the US Government’s own weapon is increasingly used to attack US municipalities, including, according to the New York Times, the recent Baltimore ransomware attack, it raises the question of whether governments and companies should have to pay for the damages when their cyber weapons escape their enclosures.


    https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html?utm_source=pocket-newtab
     
    • Interesting Interesting x 9
    • Like Like x 2
    • Love it! Love it! x 1
    • Useful Useful x 1
    • List
  2.  
  3. dbmuzik

    dbmuzik Platinum Record

    Joined:
    Apr 15, 2013
    Messages:
    539
    Likes Received:
    294
    Very interesting indeed. Would be nice if the government could "genuinely" pay for damages. But essentially it amounts to the suggestion they reallocate money they take from "us" to pay for any damages they caused against "us".
     
    • Agree Agree x 2
    • Like Like x 1
    • List
  4. Nana Banana

    Nana Banana Guest

    No, the Government never pays. We pay. Even if the Government paid, it would be us that footed the bill for their carelessness.
     
  5. N Y Times:

    Until a decade or so ago, the most powerful cyberweapons belonged almost exclusively to intelligence agencies — N.S.A. officials used the term “NOBUS,” for “nobody but us,” for vulnerabilities only the agency had the sophistication to exploit. But that advantage has hugely eroded, not only because of the leaks, but because anyone can grab a cyberweapon’s code once it’s used in the wild.

    Should have called it NOBUTTS.

    I think it's time for R2R Keygens to stop triggering false positives.
     
Loading...
Loading...