« Macron Sworn in as French PresidentNorth Korea’s Concern for Self-Defense »

Massive Global Malware Attack

May 15th, 2017

Stephen Lendman

Financial war and cyberwar can be more destructive than standing armies, able to cause enormous harm to many millions worldwide, severely damaging and halting government, commercial, and personal online activities.

A statement by US Rep. Ted Lieu (D. CA), House Judiciary and Foreign Affairs Committees member, said the following:

“The massive malware attack that hit multiple countries has caused chaos and has shut down vital institutions such as hospitals. It is deeply disturbing the National Security Agency likely wrote the original malware.”

“I have been working on legislation with industry stakeholders and partners in the Senate to address this problem.”

“Today’s worldwide ransomware attack shows what can happen when the NSA or CIA write malware instead of disclosing the vulnerability to the software manufacturer.”

“(I)t is clear to me that many of our public and private institutions are woefully unprepared for cyberattacks. We live in a brave new world. The time is now for Congress to seriously address cybersecurity issues.”

Security experts called Friday’s malware attack a digital perfect storm. Cyber-security firm Cyberreason believes the incident “is the largest (global attack) in the effect it is having, affecting nearly 100 countries worldwide.”

According to security firm Flashpoint’s Chris Camacho, “(w)hen people ask what keeps you up at night, it’s this.”

Wikipedia calls ransomware used in Friday’s attack “computer malware that installs covertly on a victim’s device (computers, smartphones, wearable devices), and that either mounts the cryptoviral extortion attack from crytovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim’s data, until a ransom is paid.”

A message is displayed demanding payment to reverse what’s been locked. “More advanced malware encrypts the victim’s files, making them inaccessible.” Computer Master File Tables and hard drives can be locked, preventing users from accessing data, risking its loss by deleting it.

Developed by the NSA for cyberattacks, the malware is now widely available, including to elements responsible for Friday’s incident - maybe a precursor for more widespread attacks against governments, businesses, and virtually any other digital targets worldwide.

Cyber technology threatens everyone connected online. Edward Snowden said Congress should demand the NSA disclose its arsenal of malware tools able to fall into the wrong hands.

According to WikiLeaks, “(o)nce a single cyber ‘weapon’ is ‘loose,’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.”

Separately, WikiLeaks tweeted, “(i)f you can’t secure it - don’t build it…US cyber weapons (pose an) extreme proliferation risk.”

According to security experts, cyber-criminals used stolen NSA malware, targeting governments, businesses, hospitals, power grids, public services, and individuals opening infected attachments or email links.

Enormous cyber vulnerabilities exist. Friday’s incident suggests more like it to come, perhaps an eventual digital equivalent of dirty nuclear bomb contamination worldwide.

-###-

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.

His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at http://www.sjlendman.blogspot.com.

No feedback yet

Voices

Voices

  • Fred Gransville I. A Pill Nation: The New Face of an Old Experiment Imagine a mother at the pharmacy counter with prescription in hand, wavering under the pharmacist's gaze. Her seven-year-old has been diagnosed with Attention Deficit Hyperactivity…
  • By David Swanson, World BEYOND War photo: wrp.org.uk Have you read “The Case for Military Intervention to Stop the Gaza Genocide“? I don’t mind promoting it to you, since I agree with most of it (and also consider most of it to do absolutely nothing to…
  • By Sally Dugman ...give up conforming to “group-think”... From my angle, a not entirely true assessment exists and here is excerpted from it, from Martin Armstrong’s article: The Domestic Civil Disturbance Quick Reaction Force The people have lost all…
  • © 2025 Tracy Turner From Reagan’s smile to Trump’s pill of control, America’s descent into the hybrid dystopia is no longer fiction—it is the spectacle we live, the sedation we swallow, the surveillance we obey. America in 2025 is Orwellian, Huxleyean,…
  • By Gabriel Aguirre, World BEYOND War The presence of more than 877 military bases around the world, with at least 76 of them in Latin America, together with the presence of the Fourth Fleet, constitute a real threat to peace and stability in the world…
  • By Mark Aurelius Three momentous words: cataclysm, catastrophe and apocalypse all in one title? How to deflate all this hyperbole (if it can be done)? Well, at least this is not blatant statement about a nuclear war? Although there could be that as well…
  • © 2025 Ted Wrong A raw confession of faith from the margins—where loyalty to Christ defies politics, church labels, and “types” of Christians. From the depths of the political and spiritual wilderness, I make a…
  • Katherine Smith PhD How land reform, privatizations of strategic minerals, and Israel's balancing act reveal the economics driving the war in Ukraine The Western media have oversimplified the war in Ukraine into morality drama theater: democracy vs.…
  • By David Swanson, World BEYOND War "Lord of the Flies is a story made up by a disturbed Nazi..." Did you know that the murders and rapes and free-for-all violent chaos in New Orleans during Hurricane Katrina didn’t actually happen, and that the…
  • By Sally Dugman It, I suppose, is really easy to denigrate and castigate Jews as a whole after watching them laughingly slaughter Palestinian civilians of all ages about which I wrote here: Red Light—Green Light And Other Games Played by Children And…
Censorship is not safety. It is authoritarianism in disguise. Bing is not just a search engine—it is an information gatekeeper. Click the red button to email MSN and Bing.com executives. This message challenges their censorship of ThePeoplesVoice.org and demands transparency, algorithmic fairness, and an end to suppression of free expression.
August 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31            

  XML Feeds

b2evolution CCMS
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi