Lundi, 24 Juillet 2017
Latest news
Main » Microsoft accuses NSA for 'stockpiling' software exploits regarding WannaCry ransomware outbreak

Microsoft accuses NSA for 'stockpiling' software exploits regarding WannaCry ransomware outbreak

20 Mai 2017

Nash said he's glad he insisted his few dozen area clients upgrade their respective operating systems from Windows XP, including the last to do so about a year ago.

"Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage".

Aside from $50,000 paid in BitCoin to the criminals, there were also reports of United Kingdom hospitals refusing to take all but the worst patients because their computers are suffering from the ransomware.

Holmes says that ransomware is nothing new - with his company seeing new variants of this type of malware on an nearly daily basis. "Still, the NSA can't be very proud of this".

Wallace denied that underinvestment in the NHS, a key claim of the opposition Labour Party ahead of the June 8 election, may have left health services exposed to such attacks.

The ransomware, also known as "WanaCryt0r", "WeCry", "WanaCrypt" or "WeCrypt0r", used a vulnerability in a Windows Server component to spread within corporate networks.

Windows computers on company networks are therefore at a higher risk than individuals at home for this particular attack.

Microsoft also blamed the US government, calling the attack a "wake-up call", and pleading with the government to "stop stockpiling tools to exploit digital vulnerabilities".

Smith wrote in a blog post Sunday that the attack is an excellent object lesson in why governments stockpiling such vulnerabilities is such a problem.

He argued there should be "a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them".

Even as the initial wave of attacks appears to be calming down, experts are seeing evidence that more sophisticated variants are being deployed.

The director of Europol raised fears that the cyber attack that has hit NHS services and global businesses "will continue to grow" as people return to work after the weekend.

It's hard to blame Microsoft, Litan said, since it issued fixes and generally did what it should.

Alex Abdo, a staff attorney at the Knight First Amendment Institute at Columbia University, said Microsoft and other software companies have strategically settled lawsuits that could lead to court rulings weakening their licensing agreements.

"But users of older software, such as Windows XP, have to pay hefty fees for so-called "custom" support".

Victims have been advised by security experts not to pay up. Microsoft released a security update in March to protect computers from the virus. These operating systems are well past their support cycles and had not received security patches for some time.

Summary: Bengaluru: Hundreds of ATMs across India's tech hub remained shut for the second day due to possible virus attack by WannaCry ransomware and cash crunch, said a bank official on Tuesday.

So if my computer is not updated, I can be attacked anytime?

Don't grumble when your system administrator at work takes the network down periodically to update systems, which usually includes installing new and often critical software patches.

Michael Mitchell, spokesman for Oreo cookie maker Mondelez International, said the company is not aware of any incidents from the attack, though it did alert employees.

If you don't already have a backup routine, start now: Regularly save copies of all your files. "Software updates and security patches are pushed to us as needed so that we are using the most current approved versions of software on our computers".

So far only £25,000 been paid to the attackers in the requested anonymous bitcoin currency.

Microsoft accuses NSA for 'stockpiling' software exploits regarding WannaCry ransomware outbreak