USEUROPEAFRICAASIA 中文雙語Fran?ais
    China
    Home / China / World

    Cyberattack thrusts focus on spy agency

    China Daily | Updated: 2017-05-17 07:50

    NSA used flaws in Windows to build a hacking tool for own use

    WASHINGTON - An unprecedented global cyberattack that infected computers in at least 150 countries beginning on Friday has unleashed a new wave of criticism of the US National Security Agency.

    The attack was made possible by a flaw in Microsoft's Windows software that the NSA used to build a hacking tool for its own use - only to have that tool and others end up in the hands of a mysterious group called the Shadow Brokers, which then published them online.

    Microsoft President Brad Smith sharply criticized the US government on Sunday for "stockpiling" software flaws that it often cannot protect, citing recent leaks of both NSA and CIA hacking tools.

    "Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage," Smith said. "An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen."

    Some major technology companies, including Google and Facebook, declined to comment on the statement.

    But some other technology industry executives said privately that it reflected a widely held view in Silicon Valley that the US government is too willing to jeopardize internet security in order to preserve offensive cyber capabilities.

    The NSA did not respond to requests for comment.

    Espionage

    The NSA and other intelligence services generally aim to balance disclosing software flaws they unearth against keeping them secret for espionage and cyber warfare purposes.

    On Monday, senior administration officials defended the government's handling of software flaws, without confirming the NSA link to WannaCry, the tool used in the global ransomware attack.

    "The United States, more than probably any other country, is extremely careful with their processes about how they handle any vulnerabilities that they're aware of," Tom Bossert, the White House homeland security adviser, said at a news briefing on Monday.

    Other tools from the presumed NSA toolkit published by the Shadow Brokers have also been repurposed by criminals and are being sold on underground forums, researchers said. But they appear to be less damaging than WannaCry. It is not known who is behind the Shadow Brokers.

    Derek Manky, global security strategist at cybersecurity firm Fortinet, said he thinks WannaCry is probably the worst that will come from the Shadow Brokers' publicly dumped toolkit, though the group may have held back from publicly revealing everything it obtained

    "Out of that batch, it is probably a high-water mark," Manky said.

    Security experts said the NSA had engaged in responsible disclosure by informing Microsoft of the flaw at some point after learning it had been stolen and a month before the tools leaked online.

    Users who do not patch their systems and the Shadow Brokers were more directly responsible for the attack than the NSA, they said.

    The Department of Homeland Security began an "aggressive awareness campaign" to alert industry partners to the importance of installing the Microsoft patch shortly after it was released in March, an agency official working on the attack said.

    "This one, we knew it could be a problem," the official said.

    "NSA should be embarrassed - they've had a lot of damaging leaks," said James Lewis, a former US official who is now a cyber expert at the Center for Strategic and International Studies. Still, he said, "Microsoft needs to admit that the 20th century is over, it's a much more hostile environment, and that hobbling the NSA won't make us any safer."

    Reuters - Xinhua

     Cyberattack thrusts focus on spy agency

    A patient takes a nap as she waits at the registration desk in a hospital in Jakarta, Indonesia, on Monday. The hospital's information system was hit by last week's cyberattack.Dita Alangkara / Associated Press

     

    Editor's picks
    Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
    License for publishing multimedia online 0108263

    Registration Number: 130349
    FOLLOW US
    免费无码一区二区| 亚洲gv猛男gv无码男同短文| 日韩中文字幕在线播放| 亚洲AV永久无码精品水牛影视| 亚洲日本va中文字幕久久| 精品无码AV无码免费专区| 无码国产精品一区二区免费| 中文字幕无码久久久| 人妻无码一区二区三区AV| 中文自拍日本综合| 亚洲av中文无码乱人伦在线咪咕| (愛妃視頻)国产无码中文字幕| 亚洲精品无码午夜福利中文字幕| 精品久久久久久久中文字幕 | 老子午夜精品无码| 久久精品亚洲中文字幕无码麻豆| 无码不卡亚洲成?人片| 亚洲综合无码一区二区| 国产免费无码一区二区| 亚洲av永久无码精品国产精品| 无码人妻丰满熟妇啪啪网站| 最近免费中文字幕mv电影| 无码超乳爆乳中文字幕久久| 中文字幕AV影片在线手机播放| av一区二区人妻无码| 无码精品黑人一区二区三区| 亚洲国产精品无码久久一线| 精品欧洲AV无码一区二区男男| 在线天堂中文新版www| 最近中文国语字幕在线播放视频| 在线天堂中文在线资源网| 色综合久久精品中文字幕首页| 亚洲中文字幕无码久久2017| 中文字幕无码一区二区免费| 中文字幕AV中文字无码亚| 中文字幕精品一区二区精品| 亚洲精品无码鲁网中文电影| 久久亚洲精精品中文字幕| 在线播放中文字幕| 久久久久亚洲AV片无码下载蜜桃| 国产色综合久久无码有码|