« Macron Sworn in as French PresidentNorth Korea’s Concern for Self-Defense »

Massive Global Malware Attack

May 15th, 2017

Stephen Lendman

Financial war and cyberwar can be more destructive than standing armies, able to cause enormous harm to many millions worldwide, severely damaging and halting government, commercial, and personal online activities.

A statement by US Rep. Ted Lieu (D. CA), House Judiciary and Foreign Affairs Committees member, said the following:

“The massive malware attack that hit multiple countries has caused chaos and has shut down vital institutions such as hospitals. It is deeply disturbing the National Security Agency likely wrote the original malware.”

“I have been working on legislation with industry stakeholders and partners in the Senate to address this problem.”

“Today’s worldwide ransomware attack shows what can happen when the NSA or CIA write malware instead of disclosing the vulnerability to the software manufacturer.”

“(I)t is clear to me that many of our public and private institutions are woefully unprepared for cyberattacks. We live in a brave new world. The time is now for Congress to seriously address cybersecurity issues.”

Security experts called Friday’s malware attack a digital perfect storm. Cyber-security firm Cyberreason believes the incident “is the largest (global attack) in the effect it is having, affecting nearly 100 countries worldwide.”

According to security firm Flashpoint’s Chris Camacho, “(w)hen people ask what keeps you up at night, it’s this.”

Wikipedia calls ransomware used in Friday’s attack “computer malware that installs covertly on a victim’s device (computers, smartphones, wearable devices), and that either mounts the cryptoviral extortion attack from crytovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim’s data, until a ransom is paid.”

A message is displayed demanding payment to reverse what’s been locked. “More advanced malware encrypts the victim’s files, making them inaccessible.” Computer Master File Tables and hard drives can be locked, preventing users from accessing data, risking its loss by deleting it.

Developed by the NSA for cyberattacks, the malware is now widely available, including to elements responsible for Friday’s incident - maybe a precursor for more widespread attacks against governments, businesses, and virtually any other digital targets worldwide.

Cyber technology threatens everyone connected online. Edward Snowden said Congress should demand the NSA disclose its arsenal of malware tools able to fall into the wrong hands.

According to WikiLeaks, “(o)nce a single cyber ‘weapon’ is ‘loose,’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.”

Separately, WikiLeaks tweeted, “(i)f you can’t secure it - don’t build it…US cyber weapons (pose an) extreme proliferation risk.”

According to security experts, cyber-criminals used stolen NSA malware, targeting governments, businesses, hospitals, power grids, public services, and individuals opening infected attachments or email links.

Enormous cyber vulnerabilities exist. Friday’s incident suggests more like it to come, perhaps an eventual digital equivalent of dirty nuclear bomb contamination worldwide.

-###-

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.

His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at http://www.sjlendman.blogspot.com.

No feedback yet

Voices

Voices

  • By Tracy Turner Behind the wholesome facade of your local grocery store lies a cocktail of banned chemicals, deceptive labels, and global food fraud. Safeway. Albertsons. Vons. Trader Joe's. Aldi. These household names conjure an image of bustling…
  • Bilderberg Meeting Attendees (1954–Present): Inside the Secretive Annual Gathering of World Leaders, CEOs, and Influencers Shaping Global Policy and Economic Strategy. Chapter One: The Lords of War and Waste By Ned Lud It begins not with a bang but with…
  • Ned Lud dedicates this to Mark Aurelius Netanyahu: The Prime Minister of Permanent Emergency The Godless Horseman: War Eternal, Peace Never He doesn’t ride in on a white horse—he arrives in Merkava armor, draped in Holocaust memory and wrapped in the…
  • by Janet Campbell Image via Freepik Children on the margins rarely have the luxury of being heard. Their needs are either diluted in policy debates or romanticized in feel-good campaigns that vanish as quickly as they arrive. But improving the lives of…
  • By David Swanson Late last century I figured out that I needed to work on a job dedicated to making the world a better place. I know not everyone can find such a job if they try. I appreciate all the other useful jobs that millions of people do — if not…
  • By Mark Aurelius One can feel the anger. One can feel the rage and disgust. It is a resentment severe but it is far from being some kind of blind hatred. Who could have thought Trump’s White House and Cabinet picks would be this fr..king frustrating,…
  • Robert David I. The New American Panopticon In 1971, Daniel Ellsberg leaked the Pentagon Papers, exposing the government’s lies about the Vietnam War. Today, a different kind of betrayal unfolds—not through war, but through data, algorithms, and…
  • Tracy Turner In recent years, Trader Joe's and Aldi have emerged as successful grocery store chains, with their private-label products that usually bear organic labels. But behind such appealing labels lies a disturbing reality: a significant proportion…
  • By Chris Spencer I. The New Alchemists: Turning Paranoia into Profit In the digital crucible of the 21st century, a strange alchemy has emerged: paranoia transmutes into profit, and the specter of chaos becomes a business model. Surveillance—once the…
  • By David Swanson, World BEYOND War Approaching 50 years since the end of the American War, as the Vietnamese call it, and something over 70 years since the start of it, depending when you start the clock, truth and reconciliation remain incomplete. I…
April 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
    1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30      

  XML Feeds

b2evolution CCMS
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi