« Macron Sworn in as French PresidentNorth Korea’s Concern for Self-Defense »

Massive Global Malware Attack

May 15th, 2017

Stephen Lendman

Financial war and cyberwar can be more destructive than standing armies, able to cause enormous harm to many millions worldwide, severely damaging and halting government, commercial, and personal online activities.

A statement by US Rep. Ted Lieu (D. CA), House Judiciary and Foreign Affairs Committees member, said the following:

“The massive malware attack that hit multiple countries has caused chaos and has shut down vital institutions such as hospitals. It is deeply disturbing the National Security Agency likely wrote the original malware.”

“I have been working on legislation with industry stakeholders and partners in the Senate to address this problem.”

“Today’s worldwide ransomware attack shows what can happen when the NSA or CIA write malware instead of disclosing the vulnerability to the software manufacturer.”

“(I)t is clear to me that many of our public and private institutions are woefully unprepared for cyberattacks. We live in a brave new world. The time is now for Congress to seriously address cybersecurity issues.”

Security experts called Friday’s malware attack a digital perfect storm. Cyber-security firm Cyberreason believes the incident “is the largest (global attack) in the effect it is having, affecting nearly 100 countries worldwide.”

According to security firm Flashpoint’s Chris Camacho, “(w)hen people ask what keeps you up at night, it’s this.”

Wikipedia calls ransomware used in Friday’s attack “computer malware that installs covertly on a victim’s device (computers, smartphones, wearable devices), and that either mounts the cryptoviral extortion attack from crytovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim’s data, until a ransom is paid.”

A message is displayed demanding payment to reverse what’s been locked. “More advanced malware encrypts the victim’s files, making them inaccessible.” Computer Master File Tables and hard drives can be locked, preventing users from accessing data, risking its loss by deleting it.

Developed by the NSA for cyberattacks, the malware is now widely available, including to elements responsible for Friday’s incident - maybe a precursor for more widespread attacks against governments, businesses, and virtually any other digital targets worldwide.

Cyber technology threatens everyone connected online. Edward Snowden said Congress should demand the NSA disclose its arsenal of malware tools able to fall into the wrong hands.

According to WikiLeaks, “(o)nce a single cyber ‘weapon’ is ‘loose,’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.”

Separately, WikiLeaks tweeted, “(i)f you can’t secure it - don’t build it…US cyber weapons (pose an) extreme proliferation risk.”

According to security experts, cyber-criminals used stolen NSA malware, targeting governments, businesses, hospitals, power grids, public services, and individuals opening infected attachments or email links.

Enormous cyber vulnerabilities exist. Friday’s incident suggests more like it to come, perhaps an eventual digital equivalent of dirty nuclear bomb contamination worldwide.

-###-

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.

His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at http://www.sjlendman.blogspot.com.

No feedback yet

Voices

Voices

  • Ned Lud Parade, Protest & Projectile We are urgently called—by custom, media, or the relentless churn of the day—to witness. Witness the parade. Witness the war. Witness the ticker inching past news of missiles, of cities ravaged, of another speech…
  • Ned Lud Israel has an unusual pastime. He likes to provoke fights in bars—specifically with bouncers. Not with patrons in general, not with pool sharks or irate drunks, but full-time bouncers, men carved out of concrete and protein powder, schooled in…
  • Paul Craig Roberts "The most significant fact of our time is that the entire Western World is a dead man walking..." Democrats for many long years have imposed race and gender privileges, which violate the 14th Amendment’s requirement of equal…
  • Fred Gransville The climb of fascism in the United States was not born from a single event, nor was it the result of some sudden, dramatic cultural shift. Rather, it emerged through a slow, relentless erosion of democratic institutions, camouflaged…
  • By David Swanson I recommend reading Charlottesville: An American Story by Deborah Baker. Itʼs an account, of course, not of all aspects of the city of Charlottesville, but principally of the Nazi-KKK-White Supremacist riot of 2017 that has taken on the…
  • By Ned Lud They don’t need jackboots when they have behavioral analytics. The war on speech has gone stealth. Once, repression was crude—clubs, tear gas, blacklists. Now, a fusion of military-grade surveillance and corporate-state platforms executes the…
  • by Tracy Turner In the besieged killing field territories of Gaza, survival has become a nightmare. The siege blockade, far from being mere policy, has morphed into an insidious engine of deliberate starvation-its mechanism fine-tuned to crush the will…
  • Paul Craig Roberts Belaya air base Russia The attack on Russian strategic forces by Ukraine, with or without President Trump’s knowledge and with or without help from Washington and the British, could have been the most dangerous event in East-West…
  • By Chris Spencer The architecture of censorship in the 21st century is not built of iron bars or smoldering books. It is invisible by design—engineered into the digital substrate of everyday life, encoded in autocomplete predictions, invisible filters,…
  • META/Facebook Shadow Protocols: Web Weaponized Against Palestinian Genocide Discourse Ned Lud Spoiler alert: Not Muslim. Not affiliated with Hamas. And definitely not an Islamophobe. Like Zuckerberg.  This information is backed by reports from…
June 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          

  XML Feeds

b2evolution CCMS
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi