Send a Tweet
Most Popular Choices
Share on Facebook 3 Share on Twitter 1 Printer Friendly Page More Sharing
General News    H4'ed 5/25/19

Stolen N.S.A. Tool "EternalBlue" Wreaks Havoc

Quicklink Submitted By     (# of views)   3 comments
Follow Me on Twitter     Message David Pear
Become a Fan
  (46 fans)
Error red text between blue binary data on screen
Error red text between blue binary data on screen
(Image by wuestenigel)
  Details   DMCA

Security experts say EternalBlue attacks  have reached a high , and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

EternalBlue was one of the most useful exploits in the N.S.A.’s cyberarsenal. According to three former N.S.A. operators, analysts spent almost a year finding a flaw in Microsoft’s software and writing the code to target it. Initially, they referred to it as EternalBluescreen because it often crashed computers — a risk that could tip off their targets. But it went on to become a reliable tool used in countless intelligence-gathering and counterterrorism missions.

Read the rest of the story HERE:

At www.nytimes.com

 

- Advertisement -

Rate It | View Ratings

David Pear Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

David William Pear is a Senior Editor for OpEdNews.com, and a Senior Contributing Editor for The Greanville Post. David is a journalist, columnist, and commentator for TV and radio. His articles, essays and interviews have an emphasis on U.S. (more...)
 

Related Topic(s): , Add Tags
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEdNews Newsletter
Name
Email
   (Opens new browser window)
 

Comments

The time limit for entering new comments on this quicklink has expired.

This limit can be removed. Our paid membership program is designed to give you many benefits, such as removing this time limit. To learn more, please click here.

3 people are discussing this page, with 3 comments


David Pear

Become a Fan

(Member since Nov 29, 2014), 46 fans, 73 articles, 309 quicklinks, 3299 comments
Facebook page url on login Profile not filled in Twitter page url on login Profile not filled in Linkedin page url on login Profile not filled in Instagram page url on login Profile not filled in


Add this Page to Facebook! Submit to Twitter Share on LinkedIn Submit to Reddit


  New Content

...but don't worry; the US nuclear arsenal is perfect protected against theft or accidents. (irony)

Submitted on Saturday, May 25, 2019 at 8:42:35 PM

Author 0
Add New Comment
Share Comment
Reply To This   Recommend  (3+)
Help
 

Devil's Advocate

Become a Fan
Author 500650

(Member since Nov 9, 2014), 9 fans, 2713 comments
Facebook page url on login Profile not filled in Twitter page url on login Profile not filled in Linkedin page url on login Profile not filled in Instagram page url on login Profile not filled in


Add this Page to Facebook! Submit to Twitter Share on LinkedIn Submit to Reddit


  New Content

I'm trying to remember if this was one of the tools exposed in the "Vault 7" leaks. Probably not, as the NYT would have made sure to include that fact, with an inference to how WikiLeaks "may have put us all in danger". (Just sounds like the way the NYT would have typically presented it.) At any rate...

You have to take note of how agencies like the NSA are actively working to CREATE SUBVERSIONS to our operating systems and applications, as well as the very hardware that we're using to run these things. That's bad enough, as they are undermining everyone's security and privacy.

On top of that, they're also undermining the work of those striving to protect systems from exploits, such as the producers of antivirus/firewall software. The newly-created threats are NOT REPORTED to these companies, of course, as the NSA wants the exploits to continue to work FOR THEMSELVES. Companies like Comodo, Symantec and Kapersky then have to discover the threats on their own, usually at a much, much later time.

Naturally, the NSA is not going to share this kind of data with the AV companies, as much of the NSA's work involves CIRCUMVENTING THESE VERY SOFTWARES.

You have to really wonder who's really wearing the "black hats" here. Are most of the threats that we're dealing with now actually a result of such "intelligence ops"?

Submitted on Sunday, May 26, 2019 at 5:49:22 PM

Author 0
Add New Comment
Share Comment
Reply To This   Recommend  (0+)
Help
 

Josh Mitteldorf

Become a Fan Follow Me on Twitter
(Member since Sep 14, 2006), 43 fans, 566 articles, 363 quicklinks, 908 comments, 11 diaries
Facebook page url on login Profile not filled in Twitter page url on login Profile not filled in Linkedin page url on login Profile not filled in Instagram page url on login Profile not filled in


Add this Page to Facebook! Submit to Twitter Share on LinkedIn Submit to Reddit


  New Content

My free association connects this with the story of Lyme Disease featured last week.

When our government devotes its considerable resources to the development of diabolical weapons, there is every probability it will succeed and no assurance that the weapons will remain under control of the developers. "Blowback" isn't quite the right word. "Unintended consequences" is too broad. How about "Don't be evil"?

Submitted on Sunday, May 26, 2019 at 6:42:49 PM

Author 0
Add New Comment
Share Comment
Reply To This   Recommend  (0+)
Help
 

 
Want to post your own comment on this Quicklink? Post Comment