Lundi, 24 Juillet 2017
Latest news
Main » WannaCry is your fault — Microsoft to NSA

WannaCry is your fault — Microsoft to NSA

20 Mai 2017

This article is created to answer those questions.

Many workers, particularly in Asia, had logged off Friday before the malicious software, stolen from the United States government, began proliferating and attacking around the world. From there, the attack spilled across the globe.

The tool doesn't stop the worm from spreading, but it prevents files from getting encrypted.

A group of hackers known as the Shadow Brokers said earlier this year that the NSA had tools for breaching the global system that allows for the transfer of money between banks. "There is this stream of liability that flows from the ransomware attack", he said. WannaCry demonstrated how sophisticated these attacks have become. The email will include a link. The safety mechanism adds an extra layer of security by requiring users to input another personally identifiable credential along with the typical alpha-numerical password, like a PIN or phone number.

Larry Magid, a technology journalist and CEO of ConnectSafely.org, said: "There is some speculation that this code was being stored in the NSA labs, potentially as a cyber weapon that the U.S. might have used against its own adversaries".

"Our research so far puts into question the ability of WannaCry's creators to decrypt your files at all", Check Point Software said in a blog post Sunday.

Dore said: "Using outdated versions of Windows that are no longer supported raises a lot of questions". In fact, Microsoft took the highly unusual step of making a security update for platforms in custom support (such as Windows XP) available to everyone. The fix, though, did not cover Windows XP software that Microsoft no longer services.

Nemeroff cited how 85 percent of companies haven't yet upgraded to the latest Windows 10 operating system, according to Credit Suisse's corporate survey.

The WannaCrypt ransomware spreads to other Windows PCs on a network by exploiting the vulnerabilities Microsoft patched with MS17-010; the malware can also infect other systems by sniffing for vulnerable machines connected to the public Internet.

Sophos continues to update protections against the threat. It has also pushed an update to Windows Defender that will detect the malware as Ransom:Win32/WannaCrypt.

Is there anything I need to do?

However, officials said that those who have yet to apply the updates are at risk and should "immediately deploy Microsoft Security Bulletin MS17-010". However, companies that failed to download a patch issued by Microsoft in March may have trouble filing a claim with their insurance company.

WannaCry is your fault — Microsoft to NSA