

SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.


Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
Apparent National Security Agency (NSA) malware has been used in a global cyber-attack, including on British hospitals, in what whistleblower Edward Snowden described as the repercussion of the NSA's reckless decision to build the tools.
"Despite warnings, @NSAGov built dangerous attack tools that could target Western software. Today we see the cost," Snowden tweeted Friday.
At least two hospitals in London were forced to shut down and stop admitting patients after being attacked by the malware, which operates by locking out the user, encrypting data, and demanding a ransom to release it. The attacks hit dozens of other hospitals, ambulance operators, and doctors' offices as well.
The Blackpool Gazette in the northwest reported that medical staff had resorted to using pen and paper when phone and computer systems shut down. Elsewhere, journalist Ollie Cowan tweeted a photo of ambulances "backed up" at Southport Hospital as the staff attempted to cope with the crisis.
Other disruptions were reported in at least 74 countries, including Russia, Spain, Turkey, and Japan, and the number is "growing fast," according to Kaspersky Lab chief Costin Raiu. Security architect Kevin Beau said it was spreading into the U.S. as well.
The malware was stolen earlier this year by a group calling itself the Shadow Brokers, which has been releasing NSA hacking tools online since last year, the New York Times reports.
Times journalists Dan Bilefsky and Nicole Perlroth wrote:
Microsoft rolled out a patch for the vulnerability in March, but hackers apparently took advantage of the fact that vulnerable targets--particularly hospitals--had yet to update their systems.
The malware was circulated by email. Targets were sent an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its targets.
Reuters reported that the National Health Service (NHS), England's public health system, was warned about possible hacking earlier in the day, but that by then it was already too late.
A Twitter account with the handle @HackerFantastic, the co-founder of the cyber security company Hacker House, tweeted that the firm had "warned the NHS with Sky news about vulnerabilities they had last year, this was inevitable and bound to happen at some stage."
"In light of today's attack, Congress needs to be asking @NSAgov if it knows of any other vulnerabilities in software used in our hospitals," Snowden tweeted. "If @NSAGov had privately disclosed the flaw used to attack hospitals when they *found* it, not when they lost it, this may not have happened."
Disclosing the vulnerability when it was found would have given hospitals years, not months, to update their systems and prepare for an attack, he added.
Twitter user @MalwareTechBlog added, "Something like this is incredibly significant, we've not seen P2P spreading on PC via exploits at this scale in nearly a decade."
Patrick Toomey, a staff attorney with the American Civil Liberties Union's (ACLU) National Security Project, said, "It would be shocking if the NSA knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen."
"These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world," Toomey said. "It is past time for Congress to enhance cybersecurity by passing a law that requires the government to disclose vulnerabilities to companies in a timely manner. Patching security holes immediately, not stockpiling them, is the best way to make everyone's digital life safer."
Dear Common Dreams reader, It’s been nearly 30 years since I co-founded Common Dreams with my late wife, Lina Newhouser. We had the radical notion that journalism should serve the public good, not corporate profits. It was clear to us from the outset what it would take to build such a project. No paid advertisements. No corporate sponsors. No millionaire publisher telling us what to think or do. Many people said we wouldn't last a year, but we proved those doubters wrong. Together with a tremendous team of journalists and dedicated staff, we built an independent media outlet free from the constraints of profits and corporate control. Our mission has always been simple: To inform. To inspire. To ignite change for the common good. Building Common Dreams was not easy. Our survival was never guaranteed. When you take on the most powerful forces—Wall Street greed, fossil fuel industry destruction, Big Tech lobbyists, and uber-rich oligarchs who have spent billions upon billions rigging the economy and democracy in their favor—the only bulwark you have is supporters who believe in your work. But here’s the urgent message from me today. It's never been this bad out there. And it's never been this hard to keep us going. At the very moment Common Dreams is most needed, the threats we face are intensifying. We need your support now more than ever. We don't accept corporate advertising and never will. We don't have a paywall because we don't think people should be blocked from critical news based on their ability to pay. Everything we do is funded by the donations of readers like you. When everyone does the little they can afford, we are strong. But if that support retreats or dries up, so do we. Will you donate now to make sure Common Dreams not only survives but thrives? —Craig Brown, Co-founder |
Apparent National Security Agency (NSA) malware has been used in a global cyber-attack, including on British hospitals, in what whistleblower Edward Snowden described as the repercussion of the NSA's reckless decision to build the tools.
"Despite warnings, @NSAGov built dangerous attack tools that could target Western software. Today we see the cost," Snowden tweeted Friday.
At least two hospitals in London were forced to shut down and stop admitting patients after being attacked by the malware, which operates by locking out the user, encrypting data, and demanding a ransom to release it. The attacks hit dozens of other hospitals, ambulance operators, and doctors' offices as well.
The Blackpool Gazette in the northwest reported that medical staff had resorted to using pen and paper when phone and computer systems shut down. Elsewhere, journalist Ollie Cowan tweeted a photo of ambulances "backed up" at Southport Hospital as the staff attempted to cope with the crisis.
Other disruptions were reported in at least 74 countries, including Russia, Spain, Turkey, and Japan, and the number is "growing fast," according to Kaspersky Lab chief Costin Raiu. Security architect Kevin Beau said it was spreading into the U.S. as well.
The malware was stolen earlier this year by a group calling itself the Shadow Brokers, which has been releasing NSA hacking tools online since last year, the New York Times reports.
Times journalists Dan Bilefsky and Nicole Perlroth wrote:
Microsoft rolled out a patch for the vulnerability in March, but hackers apparently took advantage of the fact that vulnerable targets--particularly hospitals--had yet to update their systems.
The malware was circulated by email. Targets were sent an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its targets.
Reuters reported that the National Health Service (NHS), England's public health system, was warned about possible hacking earlier in the day, but that by then it was already too late.
A Twitter account with the handle @HackerFantastic, the co-founder of the cyber security company Hacker House, tweeted that the firm had "warned the NHS with Sky news about vulnerabilities they had last year, this was inevitable and bound to happen at some stage."
"In light of today's attack, Congress needs to be asking @NSAgov if it knows of any other vulnerabilities in software used in our hospitals," Snowden tweeted. "If @NSAGov had privately disclosed the flaw used to attack hospitals when they *found* it, not when they lost it, this may not have happened."
Disclosing the vulnerability when it was found would have given hospitals years, not months, to update their systems and prepare for an attack, he added.
Twitter user @MalwareTechBlog added, "Something like this is incredibly significant, we've not seen P2P spreading on PC via exploits at this scale in nearly a decade."
Patrick Toomey, a staff attorney with the American Civil Liberties Union's (ACLU) National Security Project, said, "It would be shocking if the NSA knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen."
"These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world," Toomey said. "It is past time for Congress to enhance cybersecurity by passing a law that requires the government to disclose vulnerabilities to companies in a timely manner. Patching security holes immediately, not stockpiling them, is the best way to make everyone's digital life safer."
Apparent National Security Agency (NSA) malware has been used in a global cyber-attack, including on British hospitals, in what whistleblower Edward Snowden described as the repercussion of the NSA's reckless decision to build the tools.
"Despite warnings, @NSAGov built dangerous attack tools that could target Western software. Today we see the cost," Snowden tweeted Friday.
At least two hospitals in London were forced to shut down and stop admitting patients after being attacked by the malware, which operates by locking out the user, encrypting data, and demanding a ransom to release it. The attacks hit dozens of other hospitals, ambulance operators, and doctors' offices as well.
The Blackpool Gazette in the northwest reported that medical staff had resorted to using pen and paper when phone and computer systems shut down. Elsewhere, journalist Ollie Cowan tweeted a photo of ambulances "backed up" at Southport Hospital as the staff attempted to cope with the crisis.
Other disruptions were reported in at least 74 countries, including Russia, Spain, Turkey, and Japan, and the number is "growing fast," according to Kaspersky Lab chief Costin Raiu. Security architect Kevin Beau said it was spreading into the U.S. as well.
The malware was stolen earlier this year by a group calling itself the Shadow Brokers, which has been releasing NSA hacking tools online since last year, the New York Times reports.
Times journalists Dan Bilefsky and Nicole Perlroth wrote:
Microsoft rolled out a patch for the vulnerability in March, but hackers apparently took advantage of the fact that vulnerable targets--particularly hospitals--had yet to update their systems.
The malware was circulated by email. Targets were sent an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its targets.
Reuters reported that the National Health Service (NHS), England's public health system, was warned about possible hacking earlier in the day, but that by then it was already too late.
A Twitter account with the handle @HackerFantastic, the co-founder of the cyber security company Hacker House, tweeted that the firm had "warned the NHS with Sky news about vulnerabilities they had last year, this was inevitable and bound to happen at some stage."
"In light of today's attack, Congress needs to be asking @NSAgov if it knows of any other vulnerabilities in software used in our hospitals," Snowden tweeted. "If @NSAGov had privately disclosed the flaw used to attack hospitals when they *found* it, not when they lost it, this may not have happened."
Disclosing the vulnerability when it was found would have given hospitals years, not months, to update their systems and prepare for an attack, he added.
Twitter user @MalwareTechBlog added, "Something like this is incredibly significant, we've not seen P2P spreading on PC via exploits at this scale in nearly a decade."
Patrick Toomey, a staff attorney with the American Civil Liberties Union's (ACLU) National Security Project, said, "It would be shocking if the NSA knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen."
"These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world," Toomey said. "It is past time for Congress to enhance cybersecurity by passing a law that requires the government to disclose vulnerabilities to companies in a timely manner. Patching security holes immediately, not stockpiling them, is the best way to make everyone's digital life safer."