As EternalBlue Racks Up Damages It Reminds Us There Is No Such Thing As A Safe Cyber Weapon [www.forbes.com]
Baltimore political leaders seek briefings after report that NSA tool was used in ransomware attack [www.baltimoresun.com]
Stolen NSA hacking tool now victimizing US cities, report says [www.cnet.com]
Ransomware Tool Causing Chaos in Baltimore Was Developed by the NSA [www.digitaltrends.com]
Ransomware attacks in US cities are using a stolen NSA tool [www.engadget.com]
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc [www.nytimes.com]
Hackers reportedly used a tool developed by the NSA to attack Baltimore’s computer systems [www.theverge.com]
As EternalBlue Racks Up Damages It Reminds Us There Is No Such Thing As A Safe Cyber Weapon [www.forbes.com]
Report: Leaked NSA tool at the center of Baltimore cyberattack [www.businessinsider.com]
Reminds me of when the US sells weapons to one friendly (in theory) country only to have them show up in the hands of the very enemy we are trying to fight.https://t.co/pvy1diJWhw https://t.co/eURUPAyglG
— Grady Booch (@Grady_Booch) May 25, 2019
Further proof we are living in a superhero movie, except there is no superhero to stop the villains. There’s only us.
— Cecillia Wang (@WangCecillia) May 26, 2019
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc https://t.co/sy7hGhRVQR
The NSA refuses to discuss the incidents or even acknowledge that the dumped tools were part of its cyber arsenal, but in an unusually candid interview, NSA former director Mike Rogers, who oversaw the agency during the leak, deflected blame.
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
On the personal validation side: this was the villain plot of my near-miss Netflix show last year, so cool to see I wasn't too far off on the details.
— John Rogers (@jonrog1) May 25, 2019
On the personal terror side: AAGGGHHHHHHH https://t.co/rDkVkJcBsX
“If Toyota makes pickup trucks and someone takes a pickup truck, welds an explosive device onto the front, crashes it through a perimeter and into a crowd of people, is that Toyota’s responsibility?... “The N.S.A. wrote an exploit that was never designed to do what was done.”
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
“A key component of the malware that cybercriminals used in the Baltimore ransomware attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.” https://t.co/66WgrLoWha
— Justin Fenton (@justin_fenton) May 25, 2019
New details:
— Thomas Rid (@RidT) May 25, 2019
—ETERNALBLUE was initially nicknamed EternalBluescreen
—NSA never seriously considered alerting Microsoft about discovering the vulnerability (before Shadow Brokers happened), and
—“held on it” (“used it,” presumably) for more than five years https://t.co/ib0guBIWhI
Software security is hard. Exploiting software and keeping the hacks secret is irresponsible. Period.
— Gary McGraw (@cigitalgem) May 25, 2019
Not a surprise that the United States government thinks it is OK. It is not. https://t.co/UwwKolazyo
It took us months of digging to confirm the NSA weapon was used in cyberattacks in Texas, Pennsylvania, and finally in Baltimore, where city officials still didn’t know, this week, that part of the reason the attack was so widespread was because it was augmented by NSA tools. https://t.co/PK09Z3q4ax
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
NEW: Baltimore was hit with an NSA hacking tool that is being used to hijack U.S. cities. @ScottShaneNYT and I spent months looking into the origins of EternalBlue, a stolen NSA weapon that is popping up in more and more attacks across the country. https://t.co/QwZshZ0yR2
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
But in the last year, it has boomeranged back to the NSA’s own backyard, hitting Baltimore, Allentown, San Antonio and countless other cities in attacks that have paralyzed municipal operations and alarmed government officials, who privately say the NSA needs to account.
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
High quality remote kernel RCE exploits don’t just write themselves (multiple person years of highly specialized effort as per the article) and something that powerful never should have been leaked. There aren’t any simple clean answers to this problem except for faster patching. https://t.co/iBw7tIs0ju
— Dino A. Dai Zovi (@dinodaizovi) May 25, 2019
Great story, and the reality that every advanced cyber weapon, when it gets out, however it gets out, has a lifecycle and consequences to manage - for YEARS. I call it the recycling problem, but there are lots of ways to talk about it. https://t.co/m4BET0NeCr
— Cristin Goodwin (@CristinGoodwin) May 25, 2019
Microsoft rejects that analogy: “These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous. When someone takes that, they’re not strapping a bomb to it. It’s already a bomb.”
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
Weapons, when created... always get off the farm.
— Bryan William Jones (@BWJones) May 25, 2019
Sometimes you have the luxury of deliberately making the decision to not create a weapon.
Other times you have to create a weapon, knowing it will someday get loose. All weapons eventually get out.
Complexity is... complex. https://t.co/fYuPRUfIz3
This (stolen NSA exploits, e.g., WannaCry) should continue to be a front-and-center example of why weakening encryption through backdoors is a bad idea. This was an unintentional backdoor. An intentional back door could be much worse. https://t.co/yXNxWUTFwB
— Gabriel Weinberg (@yegg) May 25, 2019
The NSA spent more than a year searching for the flaw in Microsoft’s software and writing the code to exploit it. NSA TAO operators jokingly referred to it as “EternalBluescreen” because it often crashed computer systems, a risk they might tip off targets. It took months to hone.
— Nicole Perlroth (@nicoleperlroth) May 25, 2019
Yes, discussion to be had on whether NSA should have kept EternalBlue to themselves for so long and not disclose the vuln. If the VEP was used and ended in disclosure, Microsoft would have patched earlier. But, even then, people wouldn't have patched. That's the underlying issue.
— Joseph Cox (@josephfcox) May 25, 2019
NSA spent a lot of taxpayer money developing hacking tools for espionage. Then it lost the tools. They've already done billions in damage around the world, and now they're being used to attack American cities. With @nicoleperlroth https://t.co/IrtWipsfUG
— Scott Shane (@ScottShaneNYT) May 25, 2019
A great piece about cyber weapons and how they spread. https://t.co/9BHKHipfC3 The real kicker is at the end. 50 nations want a global cyber treaty. Those opposed: China, Iran, Israel, North Korea, Russia & the United States. The war coalition.
— Alex Gibney (@alexgibneyfilm) May 25, 2019
But they could absolutely keep an iOS back door secure. Yup. Pinky swear. https://t.co/Mqpus9lsGH
— Rene Ritchie (@reneritchie) May 25, 2019
This is why Apple refused to make a backdoor into iPhones https://t.co/m5c46u3vcR
— M∆TT PÜNK (@MattPunkArt) May 25, 2019
Rep. Ruppersberger is seeking a briefing from the NSA on New York Times report that a hacking tool the agency created and lost control of was used to spread Baltimore ransomware. Mayor Jack Young and Council President Brandon Scott also looking for answers https://t.co/di9DLzyxkU
— Ian Duncan (@iduncan) May 25, 2019
It's not sexy, but beyond the VEP, the story behind the damage of the Shadow Brokers exploits is really not so much the exploit/vuln itself, but why, even when NSA tipped Microsoft, and Microsoft made a patch ~before~ Shadow Brokers dumped, that so many people didn't patch.
— Joseph Cox (@josephfcox) May 25, 2019
if this had more robots it would be indistinguishable from the plot of several famous animes https://t.co/LrMkpu5yLh
— Tom Lee (@tjl) May 25, 2019
NSA internally warned yrs ago of extreme societal & security risk of pre-positioning, staging & actively employing secret ‘hidden’ cybertools on ‘net to find/create & exploit 0 day vulnerabilities & holes becuz of discovery & use by other actors & backfire https://t.co/fCIoYCnChl
— Thomas Drake (@Thomas_Drake1) May 25, 2019
Update: Sen. Chris Van Hollen says he is also seeking NSA briefing about report agency tool was used in Baltimore ransomware attack.
— Ian Duncan (@iduncan) May 25, 2019
And Council President Brandon Scott now says the federal government ought to step in and pay some of the recovery bill https://t.co/KenKTYn9qF
“The fact that the root technology that enabled this attack came from our own federal government, just miles away, only adds insult to injury.” https://t.co/TdvzzTIW6I
— Colin Campbell (@cmcampbell6) May 26, 2019
Baltimore political leaders seek briefings after report that NSA tool was used in ransomware attack. National security state develops something that is stolen and used against an Amerikanski city. Nothing to see here, folks; move along. https://t.co/qoq29EGxfE
— Donald J. Putin (@donald_j_putin) May 26, 2019
Baltimore political leaders seek briefings after report that NSA tool was used in ransomware attack https://t.co/wIJwtckfPc
— Ben Jacobs (@Bencjacobs) May 26, 2019
Lol the fucking irony! The fact that this crap is still not patched yet, shows their complete incompetence! https://t.co/KKn4jZVgt1#EternalBlue #Wannacry #infosec
— Anis Muslić ⣢ (@0xUID) May 26, 2019
Stolen NSA hacking tool now victimizing US cities, report says https://t.co/mixetWbSZU
— Tactical Tech (@Info_Activism) May 26, 2019
"I've got good news and bad news. The good news is that we have successfully built the weapon. Oh, the bad news? The enemy has unfortunately stolen the weapon." https://t.co/I7zltPrvdd
— Alt US Cyber Command (@AltCyberCommand) May 25, 2019
#Ransomware attacks in US cities are using a stolen #NSA tool #cybersecurityhttps://t.co/c5eNlkndmm
— Mithun Sanghavi (@Mithun_Sanghavi) May 26, 2019
#ransomware attacks in US cities are using a stolen NSA tool https://t.co/haGn410WjQ via @engadget
— Gary Davis (@garyjdavis) May 26, 2019
The more worrisome thing about these cases is the municipal systems' vulnerabilities, not the ransomware's potency. The software flaws should have been patched.https://t.co/wPWhWjzbls
— Lucas Kello (@KelloLucas) May 25, 2019
#Ransomware attacks in US cities are using a stolen #NSA tool #cybersecurity https://t.co/dTW9uOD0wF
— Michelle Kassorla (@drkassorla) May 26, 2019
NSA Tech is falling into the wrong hands. This is what happens when you're in a race to the bottom https://t.co/XHoUt4gBHx
— ABOLISH MONEY (@jyiannako) May 26, 2019
Ransomware attacks in US cities are using a stolen NSA tool#CyberSecurity #hacking #Pentesting #password #vulnerability #cyberattacks #IoT #IoTSecurity #TFA #hackers #malware #ransomware #WannaCry #InfoSec #nsa https://t.co/rcFbBQQuap via @engadget
— LIVEX (@livexsoftware) May 26, 2019
"IF" the #DNC was a hack how do we know if the stolen #NSA toll was used?
— THE TRUTH ⭐⭐⭐ (@TheTruth_1776) May 26, 2019
Shouldn't #Crowdstrike be called to testify?
Shouldn't #JulianAssange be given immunity to speak?
Ransomware attacks in US cities are using a stolen NSA tool https://t.co/TkQSrTM7xG via @engadget
Thanks, Obama.
— Zane Zodrow (@ZaneZodrow) May 25, 2019
Ransomware attacks in US cities are using a stolen NSA tool https://t.co/fQOVb8RHVW #tech #feedly
Cyberattacks created with NSA malware cripple US cities in "the most destructive and costly NSA breach in history" https://t.co/wf4XjxIgUs pic.twitter.com/nUM5RhSqfo
— Sarah Kendzior (@sarahkendzior) May 26, 2019
This is *insane*. In 2017 the NSA lost control of a malware tool picked up by Russian, North Korean hackers. For 3 weeks Baltimore, where NSA is based, has had cyberattacks freezing thousands of computers, disrupted email, sales, water bills, health alerts https://t.co/3Upcn5ynoY
— Julia Macfarlane (@juliamacfarlane) May 26, 2019
The NSA has now turned everyone who wants it into the most powerful script kiddie in the world. Well done, really well done.https://t.co/6uV05cHh2x
— George Neville-Neil (@gvnn3) May 26, 2019
“the same Russian hackers who targeted the 2016 American presidential election used EternalBlue to compromise hotel Wi-Fi networks.” https://t.co/ak4klEy8H3
— The Editor Devil (@fairchild01) May 26, 2019
NSA spent a lot of taxpayer money developing hacking tools for espionage. Then it lost the tools. They've already done billions in damage around the world, and now they're being used to attack American cities. With @nicoleperlroth https://t.co/IrtWipsfUG
— Scott Shane (@ScottShaneNYT) May 25, 2019
Applies to these alarming attacks but also to absolutely everything:
— Kim Masters (@kimmasters) May 26, 2019
“The government has refused to take responsibility, or even to answer the most basic questions ... Congressional oversight appears to be failing. The American people deserve an answer.” https://t.co/r4jIDzIMU1
“Before it leaked, EternalBlue was one of the most useful exploits in the NSA’s cyberarsenal... EternalBlue was so valuable, former NSA employees said, that the agency never seriously considered alerting Microsoft about the vulnerabilities” https://t.co/1cUSqtPu7s
— Lewis Shepherd (@lewisshepherd) May 26, 2019
"The NSA connection to the attacks on American cities has not been previously reported" via @nytimes #CyberSecurity not #CyberWar https://t.co/X4DvprlcbJ
— Ploughshares Fund (@plough_shares) May 26, 2019
Another example of the immense risk natsec and intel agencies pose to the domestic populations they ostensibly serve. NSA’s budget needs to be decimated now, with an eye to dissolution later. https://t.co/orf0d6ps0c #EternalBlue
— Chase Madar (@ChaseMadar) May 25, 2019
NSA get pwned, but its insecurity prevents it from owning up to it. National Insecurity Agency. https://t.co/FgaAF0fDxK via @nytimes
— Tor Ekeland (@TorEkelandPLLC) May 25, 2019
Multiple U.S. cities under attack by stolen NSA cyberweapon EternalBlue which was specifically designed to wreak havoc outside of the U.S. https://t.co/9AoqUxc3cz
— Anonymous (@YourAnonCentral) May 26, 2019
New details:
— Thomas Rid (@RidT) May 25, 2019
—ETERNALBLUE was initially nicknamed EternalBluescreen
—NSA never seriously considered alerting Microsoft about discovering the vulnerability (before Shadow Brokers happened), and
—“held on it” (“used it,” presumably) for more than five years https://t.co/ib0guBIWhI
Make malware for using against enemies.
— Subrahmanyam KVJ (@SuB8u) May 26, 2019
Lose the malware.
Be a victim domestically.
Or, why Governments aren't exactly a shining beacon of trust in the digital age. Our future is ?♂️?♂️?♂️https://t.co/NIr7VbR8Bp pic.twitter.com/zoHXtpj7jw
.@nytimes Coming to a city near you - Eternal Blue The Next Generation! https://t.co/evczV1Adke via @nytimes
— Adam Levin (@Adam_K_Levin) May 25, 2019
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems https://t.co/rqzcnkh7CS pic.twitter.com/3GNdKQEaRK
— The Verge (@verge) May 25, 2019
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems - The Verge https://t.co/nEw3KxhyRp
— Matanovic Law LLC (@MatanovicLaw) May 26, 2019
Hackers reportedly used a tool developed by the NSA to attack Baltimore’s computer systems https://t.co/wB5N3FUFfy
— ΞLΞVΞNTH (@3L3V3NTH) May 26, 2019
Hackers used a #notpetya like attack on Baltimore’s computer systems https://t.co/zuqVKF5cmv via @Verge #Ransomware
— Paul Ferrillo (@PaulFerrillo) May 25, 2019
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems ? https://t.co/xAZfN7xHDN #Hackers #Baltimore #Ransomware #CyberAttacks #Hacking #EternalBlue #NSA
— мιzυяу™ (@MizureX5) May 25, 2019
Hackers reportedly used a tool developed by the NSA to attack Baltimore’s computer systems https://t.co/kXaXsX7uOq pic.twitter.com/5pP5TQ4X4a
— José Sánchez (@sanchezjla) May 26, 2019
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems: #ai #deeplearning #iot ht: @mikequindazzi https://t.co/oqIMyRQFtC pic.twitter.com/FkYe6MzQ8H
— Joe Bond (@BigData_Joe) May 26, 2019
This is a great example of why cyber security is a losing battle. We're fighting against our own governments arrogance.https://t.co/vTfWjcAJFk
— ℒᶏ⍵®ℰи¢ℨ Ŧ.⎣ℰ⋎ȋⓃę (@ltlevine) May 26, 2019
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems https://t.co/ECMhYpuwNw
— Paris (@DavidParis) May 25, 2019
A further argument against government backdoors into our smartphones: even the "best" government security is hackable: Hackers used a tool developed by the NSA to attack Baltimore’s computer systems https://t.co/wQOJLrz1SK
— Gerry Conway (@gerryconway) May 25, 2019
Hackers reportedly launched a cyberattack on Baltimore with a leaked NSA tool https://t.co/I0t8NCXPO5
— Audrey Renée (@BentleyAudrey) May 26, 2019
The headline "Hackers reportedly launched a cyberattack on Baltimore with a leaked NSA tool" is great click bait. Let me save you a click: They used the ETERNALBLUE exploit and Baltimore apparently has not patched their systems for this 2yr old exploit.https://t.co/zJaigocVkQ
— Tom?\(^-^)/ (@TomLawrenceTech) May 26, 2019
Baltimore political leaders seek briefings after report that NSA tool was used in ransomware attack https://t.co/GgqkftiejU
— Phil Davis (@PDavis_LLC) May 26, 2019
Baltimore political leaders seek briefings after report that NSA tool was used in ransomware attack - Baltimore Sun https://t.co/TnroZXMCRT
— Barbara Malmet (@B52Malmet) May 27, 2019
The #Ransomware Tool Causing #Chaos in #Baltimore
— Spiros Margaris (@SpirosMargaris) May 27, 2019
Was Developed by the #NSA https://t.co/nE930vhK0K #fintech #insurtech #cybersecurity @GeorginaTorbet @DigitalTrends pic.twitter.com/li7ewv1Mnk
The ransomware distribution model has changed: as the attacks become more targeted, malicious actors make increasing use of the stolen NSA tools. The lessons are obviously not learnt. https://t.co/O4eazLLK0T
— Paolo Passeri (@paulsparrows) May 26, 2019
Ransomware attacks in US cities are using a stolen NSA tool#CyberSecurity #hacking #Pentesting #password #vulnerability #cyberattacks #IoT #IoTSecurity #TFA #hackers #malware #ransomware #WannaCry #InfoSec #nsa https://t.co/rcFbBQQuap via @engadget
— LIVEX (@livexsoftware) May 27, 2019
Will US prosecute @ScottShaneNYT & @nicoleperlroth of @nytimes under Espionage Act for PUBLISHING public interest national insecurity state ‘secrets’ kept hidden from public?! Asking for some source friends charged w/ espionage. ? https://t.co/fCIoYCnChl
— Thomas Drake (@Thomas_Drake1) May 26, 2019
NYT - In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc - "A leaked N.S.A. cyberweapon, EternalBlue, has caused billions of dollars in damage worldwide." https://t.co/n7VplFQgqo
— Small Wars Journal (@smallwars) May 27, 2019
„The virus was so valuable, that N.S.A. never seriously considered alerting Microsoft about the vulnerabilities.“ This happens when intelligence services exploit vulnerabilities: The weapons strike back. https://t.co/e1duHVMXyB
— Eva Wolfangel (@evawolfangel) May 26, 2019
"Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders."https://t.co/7seatMaAAj
— Chris Bing (@Bing_Chris) May 26, 2019
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc https://t.co/XnfiMN4vh6 @RealNYT #CNI #Infosec #cybersecurity #technology #defence
— Cameron HB (@CamHunterBell) May 26, 2019
Do they have a fix @thespybrief?
— 3rdkneeblog (@AvroArrowflys) May 26, 2019
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc https://t.co/f3RSHGr6RH
Baltimore's been held hostage for ~ 3 wks by a cyberattack that wreaked havoc on local gov't.
— Dolphin ? ? Demands Transparency ?????️? (@DolphinDemVoter) May 25, 2019
Now all U.S. cities could be targets (partly from a stolen NSA hacking tool).
Sounds like this could be a real #NationalEmergency/ #NationalSecurity issue ?https://t.co/QzjBFYJzGp
One security expert calls it “the most destructive and costly N.S.A. breach in history,” more damaging than Snowden's. “The government has refused to take responsibility, or even to answer the most basic questions.” @nicoleperlroth @scottshane https://t.co/uMigYJACvW
— John Schwartz (@jswatz) May 26, 2019
Hackers behind the Baltimore #ransomware attack used NSA tool 'EternalBlue' to exploit obsolete SMB v1 protocol still found across millions of machines due to poor security practices and lack of patching.#Acronis #CyberProtection #Ransomware
— Acronis (@Acronis) May 27, 2019
via @verge https://t.co/gu5i7chCrt pic.twitter.com/MzhlYJ6Nvv
Hackers reportedly used a tool developed by the NSA to attack Baltimore’s computer systems - #CIO #vCIO #CyberSecurity #WannaCry - https://t.co/oJ5UoMBF2C
— Paul Turner (@pmturner3) May 26, 2019
"#EternalBlue was also used in the #WannaCry and #NotPetya attacks in 2017"#Hackers reportedly used a #tool developed by the #NSA to attack #Baltimore’s computer systems
— roan (@roansub) May 27, 2019
.https://t.co/nbXXe74wns via @Verge
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems https://t.co/gzfeS9zfqH pic.twitter.com/5rJHCYXpun
— #AI (@AI__TECH) May 27, 2019
#Hackers used a #tool developed by the #NSA to attack #Baltimore’s computer systems#EternalBlue was also used in the #WannaCry and #NotPetya attacks in 2017 https://t.co/8ImNqkoC7g
— AnOnALLREDToDoRoJo (@ALLREDToDoRoJo) May 25, 2019
Hackers used a tool developed by the NSA to attack Baltimore’s computer systemshttps://t.co/LbYpIH36Zw
— ??Golden Resister ? (@rjcrock2003) May 26, 2019
The headline should be "Baltimore City hacked due to poor patch management and no security"
— Spreading Sapience (@Nonredacted) May 26, 2019
If you get popped by 2017-(143-148) you failed.https://t.co/A8nqhhLBbk