« Macron Sworn in as French PresidentNorth Korea’s Concern for Self-Defense »

Massive Global Malware Attack

May 15th, 2017

Stephen Lendman

Financial war and cyberwar can be more destructive than standing armies, able to cause enormous harm to many millions worldwide, severely damaging and halting government, commercial, and personal online activities.

A statement by US Rep. Ted Lieu (D. CA), House Judiciary and Foreign Affairs Committees member, said the following:

“The massive malware attack that hit multiple countries has caused chaos and has shut down vital institutions such as hospitals. It is deeply disturbing the National Security Agency likely wrote the original malware.”

“I have been working on legislation with industry stakeholders and partners in the Senate to address this problem.”

“Today’s worldwide ransomware attack shows what can happen when the NSA or CIA write malware instead of disclosing the vulnerability to the software manufacturer.”

“(I)t is clear to me that many of our public and private institutions are woefully unprepared for cyberattacks. We live in a brave new world. The time is now for Congress to seriously address cybersecurity issues.”

Security experts called Friday’s malware attack a digital perfect storm. Cyber-security firm Cyberreason believes the incident “is the largest (global attack) in the effect it is having, affecting nearly 100 countries worldwide.”

According to security firm Flashpoint’s Chris Camacho, “(w)hen people ask what keeps you up at night, it’s this.”

Wikipedia calls ransomware used in Friday’s attack “computer malware that installs covertly on a victim’s device (computers, smartphones, wearable devices), and that either mounts the cryptoviral extortion attack from crytovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim’s data, until a ransom is paid.”

A message is displayed demanding payment to reverse what’s been locked. “More advanced malware encrypts the victim’s files, making them inaccessible.” Computer Master File Tables and hard drives can be locked, preventing users from accessing data, risking its loss by deleting it.

Developed by the NSA for cyberattacks, the malware is now widely available, including to elements responsible for Friday’s incident - maybe a precursor for more widespread attacks against governments, businesses, and virtually any other digital targets worldwide.

Cyber technology threatens everyone connected online. Edward Snowden said Congress should demand the NSA disclose its arsenal of malware tools able to fall into the wrong hands.

According to WikiLeaks, “(o)nce a single cyber ‘weapon’ is ‘loose,’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.”

Separately, WikiLeaks tweeted, “(i)f you can’t secure it - don’t build it…US cyber weapons (pose an) extreme proliferation risk.”

According to security experts, cyber-criminals used stolen NSA malware, targeting governments, businesses, hospitals, power grids, public services, and individuals opening infected attachments or email links.

Enormous cyber vulnerabilities exist. Friday’s incident suggests more like it to come, perhaps an eventual digital equivalent of dirty nuclear bomb contamination worldwide.

-###-

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.

His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at http://www.sjlendman.blogspot.com.

No feedback yet

Voices

Voices

  • Tracy Turner Live to 100 Like Blue Zone Centenarians. Discover the 5 proven longevity secrets from the world's healthiest elders - from immune-boosting diets to stress-reducing rituals that add years to your life. Dedicated to the late Angel Kazuko…
  • By Tracy Turner Filed under: Surveillance, Empire, Technocracy and Statist Media Behind the hidden rooms of empire, where budgets are secret and acronyms speak like tongues, the real governance of the United States does not follow law but latency. The…
  • By Tracy Turner Inside the brutal rise of AI-powered empire-states—where warlords, machines, and memory collide from Gaza to Ukraine and beyond. Introduction: The Builders of the All-Seeing War Machine History’s final emperors will not ride into the…
  • Cathy Smith Act I: The Summoning The summons arrived the way it always does in the digital age: without ceremony and without soul. A little red dot. A cheerful ding. A command masquerading as a request: “We need a quick video to confirm you’re human.”…
  • A prophetic and theological critique of global surveillance systems through the lens of the Bible, Koran, and Torah. This article examines AI technologies like Project Lavender, Palantir, and predictive policing, contrasting them with the compassionate omniscience of El Roi—the God Who Sees. By invoking scripture, prophecy, and Orwellian warnings, it exposes the ethical and spiritual dangers of modern techno-authoritarianism.
  • Ned Lud Book I: The Image of the Beast “He had eyes like a flame of fire, and on his head were many crowns... And it was given unto him to make war with the saints, and to overcome them...” — Revelation 13:7, 19:12 "And he causeth all, both small and…
  • From Reddit bunkers to passport enclaves, millions of men are vanishing from marriage, dating, and civic life—not out of hatred, but exhaustion. In the age of HR authoritarianism and DEI dogma, the modern man isn’t toxic—he’s tired. This image captures…
  • Tracy Turner Fig. 1 As in 1914, tangled alliances (U.S.-NATO-Israel vs. Russia-China-Houthis), economic warfare (sanctions, Red Sea blockades), and rogue actors (Houthi missiles, AI decapitation strikes) hurtle humanity toward nuclear brinkmanship.…
  • Dr. Vladislav B. Sotirovic The unified German Empire, proclaimed in Versailles in January 1871, contemplated balancing the division of the world’s colonies, the markets, and the sources of the world’s raw material.¹ Exceptionally, the pan-Germanic…
  • By Chris Spencer Conspiracy Theory and Conspiracy Theorist are government monikers, designed to discredit, silence, obfuscate and change real government overreach and malfeasance into lunatic fringe. Victims of Directed Energy Weapons in the U.S. end up…
May 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31

  XML Feeds

b2evolution CCMS
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi