The New York Times has this fascinating piece on how the stolen NSA hacking tools were used by unknowns to penetrate IDT Corporation and steal its data. In the article, IDT's global chief information officer Golan Ben-Oni, warns that the world isn’t ready for cyberattacks of this magnitude.
Both WannaCry and the IDT attack used a hacking tool the agency had code-named EternalBlue. The tool took advantage of unpatched Microsoft servers to automatically spread malware from one server to another, so that within 24 hours North Korea’s hackers had spread their ransomware to more than 200,000 servers around the globe.
The attack on IDT went a step further with another stolen N.S.A. cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to penetrate computer systems without tripping security alarms. It allowed N.S.A. spies to inject their tools into the nerve center of a target’s computer system, called the kernel, which manages communications between a computer’s hardware and its software.
|The Leopard is out|
|A Thought on the Modern Computing|
|Qubit Developed by Canadian Quantum Computing Researchers Survives a Record-Setting 39 Minutes at Room Temperature|
|New Botnet Runs on DSL Modems and Routers|
|“Session replay scripts collect can’t reasonably be expected to be kept anonymous.”|
|“Governments around the world are dramatically increasing their efforts to manipulate information on social media.”|
|“A photograph of the last male northern white rhinoceros.”|
|iotacons: Pixelated Art by Andy Rash|
|How to Avoid Jury Duty|
|“When automation starts displacing lawyers, accountants and bankers, then we might see some push-back.”|
|“Semis, not personal cars, are the smartest use of autonomous technology.”|
|“A fraudster poses as an attractive woman and encourages a man to masturbate in front of a webcam.”|
|“The homemade airplane does indeed fly!”|
|Short Story of Similar Objects|
|CaptchaTweet: Write Tweets in Captcha Form|
|“Astronomers have sent a radio message to a neighbouring star system.”|