The New York Times has this fascinating piece on how the stolen NSA hacking tools were used by unknowns to penetrate IDT Corporation and steal its data. In the article, IDT's global chief information officer Golan Ben-Oni, warns that the world isn’t ready for cyberattacks of this magnitude.
Both WannaCry and the IDT attack used a hacking tool the agency had code-named EternalBlue. The tool took advantage of unpatched Microsoft servers to automatically spread malware from one server to another, so that within 24 hours North Korea’s hackers had spread their ransomware to more than 200,000 servers around the globe.
The attack on IDT went a step further with another stolen N.S.A. cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to penetrate computer systems without tripping security alarms. It allowed N.S.A. spies to inject their tools into the nerve center of a target’s computer system, called the kernel, which manages communications between a computer’s hardware and its software.
|After Dark's Flying Toasters Done in CSS|
|Mechanical computer uses matchboxes and beans to learn Tic-Tac-Toe|
|According to IBM, the End of the PC Era is Already Here|
|The Macintosh Classic iPad Stand|
|“A machine meant to hurl rockets into space.”|
|Fake Name Generator|
|“Are the puppets coming for our jobs?”|
|“Research that could engineer dinosaurs back into existence within the next five to 10 years.”|
|Japanese Robot Serves Ice Cream From Inside a Vending Machine|
|How to Avoid Jury Duty|
|What Computers See When They Watch a Movie|
|“The only thing worse than assuming that carbon removal will save the day is assuming it will save the day.”|
|CaptchaTweet: Write Tweets in Captcha Form|
|The (Very Scary) People of Public Transit|
|Chinese warehouse organises, packs, and fulfills 200,000 orders a day with four people|
|David Reeves' Paper Cutouts Inspired by Classic Cult Movies|