Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Russian-linked Hackers Gang Reportedly Behind NHS Hack Using ....
wccftech.com ^ | 1 hour ago May 13, 2017 | Zara Ali

Posted on 05/13/2017 8:04:39 AM PDT by Ernest_at_the_Beach

The massive cyber attack on NHS left the everyone thinking about the origin of hackers. Now, according to the latest report, the gang could have alleged links to Russia. The cyber attack is possibly a reprisal for attacks on Syria by the US.

In April, a mysterious hacker group called Shadow Brokers went on claiming that it has stolen a ‘cyber weapon’ from an American spying agency. The group claimed that the tool would give it an open access to all the systems running Microsoft Windows operating system. Thes stolen cyber weapon belonged to the National Security Agency (NSA), which is America’s most powerful military intelligence unit. NSA developed the ‘Eternal Blue’ hacking weaponry to fetch access to systems used by extremist groups and enemy states.

**************************************************CLIP***********************************************

Much more at website.


TOPICS: Crime/Corruption; Foreign Affairs; Government; News/Current Events
KEYWORDS: hackers; security
Navigation: use the links below to view more comments.
first 1-2021-26 next last

1 posted on 05/13/2017 8:04:39 AM PDT by Ernest_at_the_Beach
[ Post Reply | Private Reply | View Replies]

To: Ernest_at_the_Beach

Wikileaks: CIA can make cyberattacks look like they originate from Russia

http://www.theamericanmirror.com/wikileaks-cia-can-make-cyberattacks-look-like-originate-russia/

Hard to tell what’s the truth anymore.


2 posted on 05/13/2017 8:07:09 AM PDT by McGruff (The terrorists have elected to receive.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff; ShadowAce
True

*******************************************************************

From the bottom of the article:

***************************************

People using Microsoft computers must install MS17-010 fix right now. We would like to urge our readers to be extremely careful of all the e-mails they get, specifically the ones with attachments.

3 posted on 05/13/2017 8:13:14 AM PDT by Ernest_at_the_Beach
[ Post Reply | Private Reply | To 2 | View Replies]

To: McGruff

I read that Russia was hit especially hard by the ransom ware due to the use of potato computers and outdated OS use.


4 posted on 05/13/2017 8:18:12 AM PDT by 31R1O
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ernest_at_the_Beach

After hacking our election, this must have been a piece of cake.


5 posted on 05/13/2017 8:26:54 AM PDT by Balding_Eagle ( The Great Wall of Trump ---- 100% sealing of the border. Coming soon.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

ransomware execute as ordinary programs that need neither privileged access nor a “security hole” in order to function. They run just fine even in a limited user account that has zero privileged access. So I really don’t know what all of this “patch” nonsense is about.

For any windows system that has been “patched” or not, all one has to do is stupidly click the wrong link (or stupidly open an attachment) in an email and any ransomware program will land in the user’s temp file area and execute, accessing every user data file with designated filetypes, reading said files and then writing them back with an unbreakable encryption.

If one has file shares that said user can access and/or usb attached files, then those get encrypted as well.

This has been going on for years. I had one client where one click of one email link encrypted every file on every file share.

so-called antivirus programs basically just recognize signature patterns in the virus executable and if they haven’t seen a particular signature before then they are helpless.

microsoft systems are inherently insecure no matter how many “patches” they issue because they allow all users to execute any ordinary program from any location in the user’s file tree. even worse, by default, all users on a microsoft system are supersusers with full privileged access at all times.

microsoft systems can be secured only by making ordinary user accounts limited-privilege accounts by default, and taking all execute privilege from limited users except for programs that have been installed by the system itself into system areas of the file system that are not write-accessible by limited users, but microsoft refuses to do that.

As a consequence, almost all microsoft home systems are riddled with viruses sooner or later and most people find it cheaper to buy a new computer (with a new microsoft operating system and office program) than to have their system restored to factory state, all updates applied, all programs reinstalled and all data copied and restored. Thus, microsoft (and its oem partners) profit enormously from selling grossly unsecured systems, which means selling insecure systems is a deliberate profit-making strategy by microsoft.


6 posted on 05/13/2017 8:32:12 AM PDT by catnipman ( Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

” a day after President Trump set off the chemical attack on Syria. “

i stopped reading right there ...


7 posted on 05/13/2017 8:38:34 AM PDT by catnipman ( Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff

Anyhow, these guys were after money.


8 posted on 05/13/2017 8:39:52 AM PDT by Bogie
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ernest_at_the_Beach

This attack was stopped by a malware tech registering a website that the virus was trying to contact. Failed contact sent it into encrypt mode. The guy registered the site and let the viruses phone home and then they were defeated. Sadly this virus will be back shortly with the feature removed.


9 posted on 05/13/2017 8:40:45 AM PDT by mad_as_he$$
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

I suspect the mortality rates of those covered by the NHS will go down.


10 posted on 05/13/2017 8:41:32 AM PDT by Stentor
[ Post Reply | Private Reply | To 1 | View Replies]

To: catnipman
Thanks,...I run Ubuntu,...it has its own exposure,,,

Gonna get serious in working on putting up a virtual OS named QUBES,,,Linux based...but it's objective is security thru isolating Virtual Machines,.

May need some newer power machines.

The rumored new AMD Whitehaven 16 core workstation ought just be a nice rig,.....

11 posted on 05/13/2017 8:42:49 AM PDT by Ernest_at_the_Beach
[ Post Reply | Private Reply | To 6 | View Replies]

To: Balding_Eagle

Imagine that, making it look like Clinton and Wasserman Schultz had things rigged?


12 posted on 05/13/2017 8:42:51 AM PDT by Bogie
[ Post Reply | Private Reply | To 5 | View Replies]

To: All

I like that big map,...but I am assuming that the blue dots represent sites attackers have hit,.


13 posted on 05/13/2017 8:48:31 AM PDT by Ernest_at_the_Beach
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bogie; McGruff
Anyhow, these guys were after money.

Not even that much money either, like $300 per incident.

Cyberpunks on a joyride....

14 posted on 05/13/2017 8:55:58 AM PDT by mac_truck (aide toi et dieu t'aidera)
[ Post Reply | Private Reply | To 8 | View Replies]

To: mac_truck

Yeah, real cheap, India maybe?


15 posted on 05/13/2017 9:08:23 AM PDT by Bogie
[ Post Reply | Private Reply | To 14 | View Replies]

To: mad_as_he$$; catnipman
Qubes OS

Last Update: 2016-12-14 13:37 UTC

OS Type: Linux

Qubes OS is a security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. It attempts to combine two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimises the amount of trusted code, and how to make this isolation as seamless and easy as possible.

********************************************************

You would run windows in a Virtual Machine...

Sharing FILES across Domains would normally NOT be allowed.

16 posted on 05/13/2017 9:12:11 AM PDT by Ernest_at_the_Beach
[ Post Reply | Private Reply | To 9 | View Replies]

To: 31R1O

i read that too- hospitals were especially targetted too because they usually havent; switched over ot windows 10 aND MANY still use xp i guess-


17 posted on 05/13/2017 10:10:32 AM PDT by Bob434
[ Post Reply | Private Reply | To 4 | View Replies]

To: Ernest_at_the_Beach

Bkmrk.


18 posted on 05/13/2017 10:10:48 AM PDT by RushIsMyTeddyBear
[ Post Reply | Private Reply | To 1 | View Replies]

To: mac_truck

Not for all incidences, I know of one company that paid over $500k. Depending on the size and type of company, they will ask for more ransom.


19 posted on 05/13/2017 10:24:27 AM PDT by bar sin·is·ter
[ Post Reply | Private Reply | To 14 | View Replies]

To: Ernest_at_the_Beach

Because, as we all know, Russia is also behind those Nigerian scams, too.

This is the sole method Russia has to stay financially afloat.

/sarcasm


20 posted on 05/13/2017 10:54:29 AM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson