Homepage / Technology / Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons
Machines à sous, Jeux de tables & Jackpots Gers Cassino online, Poker online e apostas esportivas Yasadışı Bahis Cezası Suçu ve Cezası 2024 Bets10 Bahis Sitesi Alt Yapı Sporları ve Site Tasarımı Hüzeyfe Travel Bets10 Site İncelemesi Yeni Adresi,Canlı Bahis ve İddaa,Casino Oyunları ve Bonuslar Bet10 com.tr Tel: +90 544 423 81 61 info@bet10.com.tr Basında bet10 Sporcular Tedavi İçin Kırşehir’e Gelecek Bet10 com tr Tel: +90 544 423 81 61 info@bet10.com.tr Hizmet Alanlarımız Experience the Thrill Top 10 Demo Slots That Will Keep You Hooked bets10 bonus Arşivleri Disfruta de toda nuestra oferta de ocio Best Free Bonuses 202 Abebet Casino Oynama Seçenekleri Türkiye’de Bet10 Koruma Sistemleri Danışmanlık Ve İnşaat İş İlanları Secretcv comda sen de hemen başvur Adana Temizlik Hizmetleri At least 18 killed in Israeli West Bank attack Hibya Haber Ajansı Sıcaklıklar artıyor! Orhangazinin havasında son durum . Adana Temizlik Hizmetleri I removed a Vanquis Financing through an evaluation webpages Understand Your options to have ten 12 months Signature loans How we rank on-line gambling enterprises: an review of the CeskeCasinoBest method Bets10 Bon Bon Slot İncelemesi ve Demosu RTP=96 26 Yaşlılarımızın Günlük Yaşamlarını Çalışmalarımızla Kolaylaştırma Gayesindeyiz « AFŞİN HABER MERKEZİ Yılın Ahisi Beşir Özkılıç Rektörlüğü Ziyaret Etti Bet10 com tr Tel: +90 544 423 81 61 info@bet10 com.tr İletişim Aviatorda Başarı İçin İpuçları Slot Uçak Oyunu Stratejileri Balkc Oyunu Big Bass Bonanza ile Büyük Ödüller Elde Etmenin Tüyoları Online Casino Iphone App Beste Apps Inside Android & Apple Iphone Casino Install Typically The Casino App For Ios And Androi Casino Siteleri Play in Turkey Likit Su Yalıtım Sistemlerinde Uzman Hukuk EA TYT-AYT Net Sihirbazı İMO’dan Belediye Meclisinin kararına destek Yaşlılarımızın Günlük Yaşamlarını Çalışmalarımızla Kolaylaştırma Gayesindeyiz « AFŞİN HABER MERKEZİ Kocaeli Rallisi 41 Kez Start Alıyor haberi Best10 Otomatik Giriş Bets10 Güncel Adresi Bet10 Kasyno Na Żywo Vulkan Vegas ️ Graj Z Krupierem Na Żyw test Netent Slotlar ile Eğlenceli ve Kazançlı Bir Yolculuğa Çıkın 2024teki En Popüler EGT Slot Oyunları İplik Üretim-3 Tekstil Klima Sistemleri Orhangazi Ziraat odası başkanı Dinçer Dimrit ‘Dolu topları için savcılığa suç duyurusunda bulunacağız’ Bet10 com.tr Tel: +90 544 423 81 61 info@bet10.com.tr Ürünlerimiz Sigortam net: Sigortada Güvenin Adresi Bets10 Casino Mobil Giriş Isparta 32 Spora deplasman yasağı Bets10 Bahis Sitesi Alt Yapı Sporları ve Site Tasarımı Hüzeyfe Travel Erdoğan: 2053 vizyonuyla ileri teknolojileri hedefliyoruz haberi bet10 casino arşivleri İstanbulu taşıyan firma 0536 384 01 34 Miedz Legnica-Kotwica Kolobrzeg Maç kadroları, Maç sonuçları, Maç hakkında detaylar 10Bet Casino Türkiye Book Of Ra Elegant Slot Kostenlos Zocken Ohne Anmeldun Mostbet букмекерская контора ⭐ вход, регистрация, бонусы, ссылка для установки приложения Pragmatic Play Slot Dünyasında En İyi Temalı Oyunlar Deneme Bonusu Veren Sitelerde Hileli Oyunlar Gerçekler ve Mitoslar The Increasing Appeal of Live Casino Online What Tablets Can You Overdose On: A Comprehensive Overview Dime Port Machines Free: Fun and Budget-friendly Gaming How to Make Your Veins Pop: A Comprehensive Guide DMSO Cream: A Flexible Service for Different Conditions Numerology Reading: Opening the Secrets of Your Life Course Numerology Calculator: Opening the Secrets of Numbers The Remarkable World of Tarot Analysis Cards Gambling Establishments Accepting PayPal: A Convenient and Secure Alternative for Online Gaming What Are 4H2 Tablets Utilized For? Dealing with Diabetic Issues: A Comprehensive Overview to Managing Your Health Why Are My Veins Bulging? Understanding the Causes and also Manifestations How to Eliminate Diabetes Mellitus: A Comprehensive Guide Roulette Free Play: A Comprehensive Overview to Online Live Roulette The World of Free Port Machines: Enjoyment at Your Fingertips Unlocking the Excitement of Free Slots Machines Ein Exklusiver Bonus Für Sie Sprawdź Najszybciej Wypłacalne Kasyna On The Web W Polsce 202 “Casinos Con Dinero True En Argentina Top Ten 2024 Şeker Patlatma Bahisinde Dikkat Edilmesi Gereken 5 Önemli Nokta Bodies finance (Virtual assistant, FHA and you will USDA) need far more documentation plus analysis Meilleur Casino Sur Internet Guidebook Français & Fiable Bonus + Fs Bets10 mobil indir Türkiye Bets10 apk Mobile uygulama Android ve iOS Bets10 mobil indir Türkiye Bets10 apk Mobile uygulama Android ve iOS Malatya’da 253 Okula 189 personel görevlendirildi haberi Malatya’da 253 Okula 189 personel görevlendirildi haberi Türkiye’deki yeni Bets10 giriş adresi Bets10’a yeni giriş adresiyle erişin Atiye Laçin İplik Üretim-3 Tekstil Klima Sistemleri Best10 Otomatik Giriş Bets10 Güncel Adresi Bet10 Benefits and drawbacks Away from A moment Mortgage Sweet Bonanza Oyununda En Yüksek Kazanç İçin Zamanı Yönetin Money You to Quicksilver Cash Benefits Charge card 1win Azerbaycan Müqəddimə Login Və Qeydiyyat Yukle 12 223 Archives Every little thing You Need to Find Out About Urgent 2k Loans Préstamos Solo disadvantage DNI al Instante: Todo lo que Necesitas Saber Microcreditos Rápidos: Una Guía Completa Recognizing the Mini Funding 10,000: Whatever You Required to Know Créditos Rápidos Online Fiables: Todo lo que Necesitas Saber Todo lo que necesitas saber sobre el crédito rápido Easy Car Loan Application: A Convenient Service for Your Economic Demands Préstamos Urgentes Hoy: Información Útil y Consejos Préstamos de 1000 euros con Asnef a plazos: Todo lo que necesitas saber Report to the Economic Rules Box C: The new Expiration of interest-just Loan Conditions Oftentimes, their lender allow you to spend your property taxes and you will homeowner’s insurance policies directly against 4. What’s the FHA Financing Approval Procedure?

Technology

Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons

Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners of the United States — Britain and Ukraine.

The N.S.A. has kept quiet, not acknowledging its role in developing the weapons. White House officials have deflected many questions, and responded to others by arguing that the focus should be on the attackers themselves, not the manufacturer of their weapons.

But the silence is wearing thin for victims of the assaults, as a series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. Now there is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands.

On Wednesday, the calls for the agency to address its role in the latest attacks grew louder, as victims and technology companies cried foul. Representative Ted Lieu, a California Democrat and a former Air Force officer who serves on the House Judiciary and Foreign Affairs Committees, urged the N.S.A. to help stop the attacks and to stop hoarding knowledge of the computer vulnerabilities upon which these weapons rely.

In an email on Wednesday evening, Michael Anton, a spokesman for the National Security Council at the White House, noted that the government “employs a disciplined, high-level interagency decision-making process for disclosure of known vulnerabilities” in software, “unlike any other country in the world.”

More from The New York Times:
Security experts scramble to contain fallout from cyberattacks
The risk in using a public phone charger
With new digital tools, even nonexperts can wage cyberattacks

Mr. Anton said the administration “is committed to responsibly balancing national security interests and public safety and security,” but declined to comment “on the origin of any of the code making up this malware.”

Beyond that, the government has blamed others. Two weeks ago, the United States — through the Department of Homeland Security — said it had evidence North Korea was responsible for a wave of attacks in May using ransomware called WannaCry that shut down hospitals, rail traffic and production lines. The attacks on Tuesday against targets in Ukraine, which spread worldwide, appeared more likely to be the work of Russian hackers, though no culprit has been formally identified.

In both cases, the attackers used hacking tools that exploited vulnerabilities in Microsoft software. The tools were stolen from the N.S.A., and a group called the Shadow Brokers made them public in April. The group first started offering N.S.A. weapons for sale in August, and recently even offered to provide N.S.A. exploits to paid monthly subscribers.

Though the identities of the Shadow Brokers remain a mystery, former intelligence officials say there is no question from where the weapons came: a unit deep within the agency that was until recently called “Tailored Access Operations.”

While the government has remained quiet, private industry has not. Brad Smith, the president of Microsoft, said outright that the National Security Agency was the source of the “vulnerabilities” now wreaking havoc and called on the agency to “consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

For the American spy agency, which has invested billions of dollars developing an arsenal of weapons that have been used against the Iranian nuclear program, North Korea’s missile launches and Islamic State militants, what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use.

Officials fret that the potential damage from the Shadow Brokers leaks could go much further, and the agency’s own weaponry could be used to destroy critical infrastructure in allied nations or in the United States.

“Whether it’s North Korea, Russia, China, Iran or ISIS, almost all of the flash points out there now involve a cyber element,” Leon E. Panetta, the former defense secretary and Central Intelligence Agency chief said in a recent interview, before the weapons were turned against American interests.

“I’m not sure we understand the full capability of what can happen, that these sophisticated viruses can suddenly mutate into other areas you didn’t intend, more and more,” Mr. Panetta said. “That’s the threat we’re going to face in the near future.”

Using the remnants of American weapons is not entirely new. Elements of Stuxnet, the computer worm that disabled the centrifuges used in Iran’s nuclear weapons program seven years ago, have been incorporated in some attacks.

In the past two months, attackers have retrofitted the agency’s more recent weapons to steal credentials from American companies. Cybercriminals have used them to pilfer digital currency. North Korean hackers are believed to have used them to obtain badly needed currency from easy hacking targets like hospitals in England and manufacturing plants in Japan.
And on Tuesday, on the eve of Ukraine’s Constitution Day — which commemorates the country’s first constitution after breaking away from the Soviet Union — attackers used N.S.A.-developed techniques to freeze computers in Ukrainian hospitals, supermarkets, and even the systems for radiation monitoring at the old Chernobyl nuclear plant.

The so-called ransomware that gained the most attention in the Ukraine attack is believed to have been a smoke screen for a deeper assault aimed at destroying victims’ computers entirely. And while WannaCry had a kill switch that was used to contain it, the attackers hitting Ukraine made sure there was no such mechanism. They also ensured that their code could infect computers that had received software patches intended to protect them.

“You’re seeing a refinement of these capabilities, and it only heads in one direction,” said Robert Silvers, the former assistant secretary of cyber policy at the Department of Homeland Security, now a partner at the law firm Paul Hastings.

Though the original targets of Tuesday’s attacks appear to have been government agencies and businesses in Ukraine, the attacks inflicted enormous collateral damage, taking down some 2,000 global targets in more than 65 countries, including Merck, the American drug giant, Maersk, the Danish shipping company, and Rosneft, the Russian state owned energy giant. The attack so crippled operations at a subsidiary of Federal Express that trading had to be briefly halted for FedEx stock.

“When these viruses fall into the wrong hands, people can use them for financial gain, or whatever incentive they have — and the greatest fear is one of miscalculation, that something unintended can happen,” Mr. Panetta said.

Mr. Panetta was among the officials warning years ago of a “cyber Pearl Harbor” that could bring down the American power grid. But he and others never imagined that those same enemies might use the N.S.A.’s own cyberweapons.

For the past six years, government officials were comforted by the fact that their

most fervent adversaries — North Korea, Iran, extremist groups — did not have the skills or digital tools to inflict major damage. The bigger cyberpowers, Russia and China in particular, seemed to exercise some restraint, though Russia’s meddling in the 2016 presidential election added a new, more subtle threat.

But armed with the N.S.A.’s own tools, the limits are gone.

“We now have actors, like North Korea and segments of the Islamic State, who have access to N.S.A. tools who don’t care about economic and other ties between nation states,” said Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission.

So long as flaws in computer code exist to create openings for digital weapons and spy tools, security experts say, the N.S.A. is not likely to stop hoarding software vulnerabilities any time soon.

Source: Tech CNBC
Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons

Comments are closed.