Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: srmanuel
I am 100% certain these tools quickly made their way around the Dark Web and have been used and enhanced since their release.

In this article, it was an employee who opened an attachment in an infected email that caused the outbreak.

Apples and oranges. Leaked NSA tool from wikipedia: "EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE-2017-0144[9][10] in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.[11]"

An employee opening an attachment, or an employee downloading malware from a hacked website, or an employee picking up a thunb lying on the ground, or an employee downloading an "app" from a fake app store, or the cleaning crew inserting malware, or a dozen similar scenarios, has nothing to do with the NSA hacking tools which use remote exploitation.

They are both problematic and can have similar consequences. But with the former you are attacked. With the latter it is happenstance enabled by stupid employees.

21 posted on 06/21/2019 4:51:31 AM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 14 | View Replies ]


To: palmer

The External Blue Exploit is just what we were told, you to think the NSA has many other hacking tools besides that one.

Plus a direct attack from someone actively penetrating the network remotely or sending malware via email is not different in my mind they are both attacks......

True a stupid employee opened the attachment but it’s still an attack which cost the city approximately $600,000

Besides in a DDOS attack hundreds if not thousands of computers become infected with malware that can all be remotely activated in a coordinated attack.

I would imagine most of those were via email attachments, which then when activate all attack another computer target acting as Bots.....

So regardless of how it happens it is still an attack.


33 posted on 06/21/2019 6:05:50 AM PDT by srmanuel
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson