Homepage / Technology / Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons
Casino Güncel Giriş ile deneme bonusu veren siteleri keşfedin Kaydolun ve büyük kazançlar elde etmeye başlayın! CTS FOS-3126-PLUS-2A 24 Port Gigabit Managed Access Switch Simet Bilişim Teknolojileri A Ş. $300 Fund On the internet | Immediate On the internet Acceptance | No Credit assessment #4. Personal loans: Best Personal loans Having Poor credit Predicated on Rates Bryant Automobiles To become listed on Forces That have W-K Chevrolet Buick GMC Australia’s Online Online casino: Q7 Gambling Enterprise Just how CAIVRS Declaration Can possibly prevent You from Taking That loan “zagraj W Nowoczesnym Kasynie Onlin Manisa Gazeteciler Cemiyetinden Milletvekillerine çağrı Just how Taxation Bundle Change Inspired Domestic Collateral Financing and HELOCs to own 2018 and you can Beyond What can I take advantage of good 3000 lbs financing getting? One begs the question: is leveraged financing value including to your funding means? Exactly what do the changes Indicate having Federal Education loan Consumers? Pinup-az Online Casino Pin U Jakarta Smile: Klinik Dan Dokter Gigi Family Dental Care Pin Up Yukle Azerbaycan Android ötrü Pinup Apk Yükləyin 2023 School Of Marine Education They often in addition to use up all your adequate credit rating and you can date with the job to generally meet antique financing criteria Are you currently a seasoned Seeking Farming? USDA Can help Up until the drama, he told me, he failed to invest a penny, and you may a frequent underwriter approved ten money Branch is just one of the finest pay day loan apps such as for example Dave available for sale now 8 Software Such as for example Dave to have Quick Cash advances Benefits and drawbacks of a good 401(k) Mortgage Türkiye ve Avrupanın Online Casinosu Giriş Yap In which Do i need to See A reliable Credit card debt relief Company? 4 Reasons why you should Play with an unsecured loan to settle Credit card Personal debt How do you create a narrative article? Lisanslı kumar makineler para için: temel arama parametreleri Are you presently using your offset membership smartly? Just how much Should you Lay out to your a good $20,100 Vehicle? two hundred Buck Financing: How to get Immediate Put Exact same Date? Contrary Mortgage against. House Security Mortgage against. HELOC: That is Greatest? Expected in order to co-sign? What to know prior to co-finalizing a mortgage or financing Best Loans to have Funding a keen Camper Get Verde Casino Értékelés, Ingyen Pörgetés, Kaszinó Bónusz, Legjobb On The Internet Kaszin официального Сайт Онлайн Казин And also as in the list above, the 7a are a highly versatile sorts of financing 2 the fresh new individual-title profit supported by leases hit the market House of Jack Gambling Establishment Review Today the web based retail icon became mixed up in scholar loan sector by itself because of a collaboration that have Wells Fargo What is the Certificate From Qualifications (COE)? YourPayday is another among the many best choice to CashNetUSA to get a hold of online payday loans Searching Student education loans Remark: What you need to Understand What are the results Once you Imagine a loan? Washington FHA Lenders Washington FHA Loan Recommendations 2022 You should make sure When deciding on web site to have an online payday loan Betebet Giriş Adresi 846betebet com Casino X Официальный Сайт Играть В Казино середине Онлайн House of Jack Gambling Establishment Review ASUS Dual GeForce RTX 4070 OC 12GB GDDR6X 192 Bit Beyaz DLSS 3 Ekran Kartı Black Myth: Wukong Hediyeli Казино 1xbet Играть Онлайн бесплатно%2C Официальный Сайт%2C Скачать Клиен Efes Bet Casino: Kazanmanın Garantisiyle Eğlencenin Adresi Efescasino Güncel Giriş Sitesi Türkiye’nin En Büyük Yazlık Konut Üreticisi новые Бонусы В Онлайн-казино За Июнь 2024 Лучшие Предложения ддя Игр Pin Up 306 On Line Casino Başlanğıc Qeydiyyat, Bonuslar, Yukl เข้าร่วมทดลองเล่นสล็อตในเว็บตรงของเราและรับประสบการณ์ที่สนุกที่สุ 2024-ci Ilin Daha əla Qumar Saytları ️ Azərbaycanın Top Onlayn Qumar Veb-saytları Slottica online casino oyunları Игровые слоты в 7к: окунитесь в мир азартных развлечений Kim Гјretiyor oyun makineler: zamanla test edilmiЕџ Гјreticiler yazД±lД±m Kim Гјretiyor oyun makineler: zamanla test edilmiЕџ Гјreticiler yazД±lД±m The dashboard Diet Plan: A Comprehensive Overview How to Examine for Diabetes at Home Just How to Provide Pet Cats Pills: Easy Tips as well as Techniques Essay Writing Tips – How to Write Personal Essays How to Play Free Golf Solitaire Online How to Find the Best Mobile Casinos to Play Mobile Casino Slots Online Gambling Establishments that Approve Mastercard: A Comprehensive Overview Free Slot: A Guide to Playing and Winning Online Online Gambling Enterprise Real Money No Down Payment: A Total Guide The Enjoyment of Online Port Gamings Dealing With Varicose Veins: Efficient Strategies for Relief and also Prevention Comprehending Phase 2 High Blood Pressure: Reasons, Signs, and also Treatment Affordable Essay Writing Service Bitcoin Gambling Enterprises: The Future of Online Gambling Instant Play Online Gambling Enterprise: All You Required to Know Online Slots Real Cash No Down Payment: An Overview to Free Rotates and Perk Uses Neteller Gambling Enterprises: A Comprehensive Guide to Safe and Secure Online Betting Online Online Casinos that Approve Neteller Online Casino Real Cash No Deposit: Play and Win Without Threat Blackjack Gamings for Fun: A Comprehensive Guide Online Gambling Establishments That Approve PayPal: A Full Overview Free Online Casino Games The Safest Online Gambling Sites Sugar Pills: What Are They as well as What Are They Made use of For? Why Are My Veins So Blue? Custom Term Papers – A Great Resource For Pupils Free Online Casino Slots A Review Play Free Blackjack Gamings Online: A Comprehensive Guide The Surge of Bitcoin Online Casinos: A Comprehensive Overview Leading Gambling Enterprises that Accept Mastercard: A Comprehensive Overview Top MasterCard Online Gambling Establishments: A Comprehensive Guide Just how to Detoxification Your Underarms: A Comprehensive Guide Discover the Enjoyment of Free Online Casino Site Games Leading Ports: A Comprehensive Guide to the very best Port Gamings What to Know When Playing a Slot Machine Online The Very Best Online Lending Application in Nigeria Free Online Port Games: A Comprehensive Guide

Technology

Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons

Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners of the United States — Britain and Ukraine.

The N.S.A. has kept quiet, not acknowledging its role in developing the weapons. White House officials have deflected many questions, and responded to others by arguing that the focus should be on the attackers themselves, not the manufacturer of their weapons.

But the silence is wearing thin for victims of the assaults, as a series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. Now there is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands.

On Wednesday, the calls for the agency to address its role in the latest attacks grew louder, as victims and technology companies cried foul. Representative Ted Lieu, a California Democrat and a former Air Force officer who serves on the House Judiciary and Foreign Affairs Committees, urged the N.S.A. to help stop the attacks and to stop hoarding knowledge of the computer vulnerabilities upon which these weapons rely.

In an email on Wednesday evening, Michael Anton, a spokesman for the National Security Council at the White House, noted that the government “employs a disciplined, high-level interagency decision-making process for disclosure of known vulnerabilities” in software, “unlike any other country in the world.”

More from The New York Times:
Security experts scramble to contain fallout from cyberattacks
The risk in using a public phone charger
With new digital tools, even nonexperts can wage cyberattacks

Mr. Anton said the administration “is committed to responsibly balancing national security interests and public safety and security,” but declined to comment “on the origin of any of the code making up this malware.”

Beyond that, the government has blamed others. Two weeks ago, the United States — through the Department of Homeland Security — said it had evidence North Korea was responsible for a wave of attacks in May using ransomware called WannaCry that shut down hospitals, rail traffic and production lines. The attacks on Tuesday against targets in Ukraine, which spread worldwide, appeared more likely to be the work of Russian hackers, though no culprit has been formally identified.

In both cases, the attackers used hacking tools that exploited vulnerabilities in Microsoft software. The tools were stolen from the N.S.A., and a group called the Shadow Brokers made them public in April. The group first started offering N.S.A. weapons for sale in August, and recently even offered to provide N.S.A. exploits to paid monthly subscribers.

Though the identities of the Shadow Brokers remain a mystery, former intelligence officials say there is no question from where the weapons came: a unit deep within the agency that was until recently called “Tailored Access Operations.”

While the government has remained quiet, private industry has not. Brad Smith, the president of Microsoft, said outright that the National Security Agency was the source of the “vulnerabilities” now wreaking havoc and called on the agency to “consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

For the American spy agency, which has invested billions of dollars developing an arsenal of weapons that have been used against the Iranian nuclear program, North Korea’s missile launches and Islamic State militants, what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use.

Officials fret that the potential damage from the Shadow Brokers leaks could go much further, and the agency’s own weaponry could be used to destroy critical infrastructure in allied nations or in the United States.

“Whether it’s North Korea, Russia, China, Iran or ISIS, almost all of the flash points out there now involve a cyber element,” Leon E. Panetta, the former defense secretary and Central Intelligence Agency chief said in a recent interview, before the weapons were turned against American interests.

“I’m not sure we understand the full capability of what can happen, that these sophisticated viruses can suddenly mutate into other areas you didn’t intend, more and more,” Mr. Panetta said. “That’s the threat we’re going to face in the near future.”

Using the remnants of American weapons is not entirely new. Elements of Stuxnet, the computer worm that disabled the centrifuges used in Iran’s nuclear weapons program seven years ago, have been incorporated in some attacks.

In the past two months, attackers have retrofitted the agency’s more recent weapons to steal credentials from American companies. Cybercriminals have used them to pilfer digital currency. North Korean hackers are believed to have used them to obtain badly needed currency from easy hacking targets like hospitals in England and manufacturing plants in Japan.
And on Tuesday, on the eve of Ukraine’s Constitution Day — which commemorates the country’s first constitution after breaking away from the Soviet Union — attackers used N.S.A.-developed techniques to freeze computers in Ukrainian hospitals, supermarkets, and even the systems for radiation monitoring at the old Chernobyl nuclear plant.

The so-called ransomware that gained the most attention in the Ukraine attack is believed to have been a smoke screen for a deeper assault aimed at destroying victims’ computers entirely. And while WannaCry had a kill switch that was used to contain it, the attackers hitting Ukraine made sure there was no such mechanism. They also ensured that their code could infect computers that had received software patches intended to protect them.

“You’re seeing a refinement of these capabilities, and it only heads in one direction,” said Robert Silvers, the former assistant secretary of cyber policy at the Department of Homeland Security, now a partner at the law firm Paul Hastings.

Though the original targets of Tuesday’s attacks appear to have been government agencies and businesses in Ukraine, the attacks inflicted enormous collateral damage, taking down some 2,000 global targets in more than 65 countries, including Merck, the American drug giant, Maersk, the Danish shipping company, and Rosneft, the Russian state owned energy giant. The attack so crippled operations at a subsidiary of Federal Express that trading had to be briefly halted for FedEx stock.

“When these viruses fall into the wrong hands, people can use them for financial gain, or whatever incentive they have — and the greatest fear is one of miscalculation, that something unintended can happen,” Mr. Panetta said.

Mr. Panetta was among the officials warning years ago of a “cyber Pearl Harbor” that could bring down the American power grid. But he and others never imagined that those same enemies might use the N.S.A.’s own cyberweapons.

For the past six years, government officials were comforted by the fact that their

most fervent adversaries — North Korea, Iran, extremist groups — did not have the skills or digital tools to inflict major damage. The bigger cyberpowers, Russia and China in particular, seemed to exercise some restraint, though Russia’s meddling in the 2016 presidential election added a new, more subtle threat.

But armed with the N.S.A.’s own tools, the limits are gone.

“We now have actors, like North Korea and segments of the Islamic State, who have access to N.S.A. tools who don’t care about economic and other ties between nation states,” said Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission.

So long as flaws in computer code exist to create openings for digital weapons and spy tools, security experts say, the N.S.A. is not likely to stop hoarding software vulnerabilities any time soon.

Source: Tech CNBC
Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons

Comments are closed.