« Macron Sworn in as French PresidentNorth Korea’s Concern for Self-Defense »

Massive Global Malware Attack

May 15th, 2017

Stephen Lendman

Financial war and cyberwar can be more destructive than standing armies, able to cause enormous harm to many millions worldwide, severely damaging and halting government, commercial, and personal online activities.

A statement by US Rep. Ted Lieu (D. CA), House Judiciary and Foreign Affairs Committees member, said the following:

“The massive malware attack that hit multiple countries has caused chaos and has shut down vital institutions such as hospitals. It is deeply disturbing the National Security Agency likely wrote the original malware.”

“I have been working on legislation with industry stakeholders and partners in the Senate to address this problem.”

“Today’s worldwide ransomware attack shows what can happen when the NSA or CIA write malware instead of disclosing the vulnerability to the software manufacturer.”

“(I)t is clear to me that many of our public and private institutions are woefully unprepared for cyberattacks. We live in a brave new world. The time is now for Congress to seriously address cybersecurity issues.”

Security experts called Friday’s malware attack a digital perfect storm. Cyber-security firm Cyberreason believes the incident “is the largest (global attack) in the effect it is having, affecting nearly 100 countries worldwide.”

According to security firm Flashpoint’s Chris Camacho, “(w)hen people ask what keeps you up at night, it’s this.”

Wikipedia calls ransomware used in Friday’s attack “computer malware that installs covertly on a victim’s device (computers, smartphones, wearable devices), and that either mounts the cryptoviral extortion attack from crytovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim’s data, until a ransom is paid.”

A message is displayed demanding payment to reverse what’s been locked. “More advanced malware encrypts the victim’s files, making them inaccessible.” Computer Master File Tables and hard drives can be locked, preventing users from accessing data, risking its loss by deleting it.

Developed by the NSA for cyberattacks, the malware is now widely available, including to elements responsible for Friday’s incident - maybe a precursor for more widespread attacks against governments, businesses, and virtually any other digital targets worldwide.

Cyber technology threatens everyone connected online. Edward Snowden said Congress should demand the NSA disclose its arsenal of malware tools able to fall into the wrong hands.

According to WikiLeaks, “(o)nce a single cyber ‘weapon’ is ‘loose,’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.”

Separately, WikiLeaks tweeted, “(i)f you can’t secure it - don’t build it…US cyber weapons (pose an) extreme proliferation risk.”

According to security experts, cyber-criminals used stolen NSA malware, targeting governments, businesses, hospitals, power grids, public services, and individuals opening infected attachments or email links.

Enormous cyber vulnerabilities exist. Friday’s incident suggests more like it to come, perhaps an eventual digital equivalent of dirty nuclear bomb contamination worldwide.

-###-

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.

His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at http://www.sjlendman.blogspot.com.

No feedback yet

Voices

Voices

  • Dr. Althea Mentes I. The Pressure Valve: How Rage Became a Renewable Resource All empires master the skill of domination, but America industrialized it. Our rulers discovered that rebellion, like oil or lithium, could be extracted, processed, and sold…
  • Fred Gransville Gaza was and is now a laboratory in which the shoulders of business, law, and amorality collide in ways that defy euphemism. To call what occurs “peace” is to embrace an Orwellian fiction; to call it “conflict” is to sanitize…
  • By David Swanson, World BEYOND War The Nobel Committee has frequently given the peace prize to major war makers, and frequently to do-gooders whose work in a variety of fields has been unrelated to abolishing war. It has also often given the prize to…
  • Cathy Smith The mainstream press shows its Zionist complicity plainly. Headlines like Israel awaits hostages and peace deal may be imminent ignore 77 years of Zionist bloodletting. The "press" writes about the genocidal deaths of ~67,000 Gazans as if…
  • Fred Gransville Map of families registered in Texas reporting one or more members with Morgellons Disease. Morgellons disease is one of the most perplexing and controversially shrouded conditions in modern medicine. Characterized by fibers emerging from…
  • It’s Football Season The Summer has gone and the winds have come The leaves are falling and fall is in the air But the sun shines bright and and the fields are buzzing  The bees are preparing for the long winter’s night Propaganda fills the mail  As the…
  • Robert David The Bush Controlled Demolition of Democracy The George W. Bush years (2001–2009) were less a presidency and more a controlled demolition of freedom, liberty, trust, wealth, and global credibility. Bush shattered the economic backbone of the…
  • By Mark Aurelius Part 1 was published at this link directly below (you are advised to read it as ** worthy): https://www.thepeoplesvoice.org/TPV3/Voices.php/2025/09/21/radioactive-how-the-real-radicals#more60423 Likely you agree that these times that we…
  • Chris Spencer More Dead Victims of Israel's Lavender Talpiot Artificial Intelligence Killing Machine. Worldwide, Democracy Itself Is Also a Victim The Sneaky Seizure of Power The twentieth century taught us to look for coups in uniforms and barricades.…
  • By David Swanson, World BEYOND War All those courageous United Nation delegates triumphantly walking out (gasp!) on a Netanyahu speech on Friday actually had a legal obligation to arrest him and deliver him to the International Criminal Court which has…
Censorship is not safety. It is authoritarianism in disguise. Bing is not just a search engine—it is an information gatekeeper. Click the red button to email MSN and Bing.com executives. This message challenges their censorship of ThePeoplesVoice.org and demands transparency, algorithmic fairness, and an end to suppression of free expression.
October 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

  XML Feeds

b2evolution CCMS
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi