Today was a summit of the best minds in the computer world.
The hackers who hacked google and others are increasing their appetite for money.
They well funded and have support in equipment and hosting.
They hit targets for money.
They learn from the idiots at anonymous
Ransom, steal, trick into getting into accounts.
They are keeping politics out of it.
The current windows 10 is causing nonstop problems for business and customers
But the hackers spend lavishly.
That is the weakness.
When using the Tool Eternal Blue. One must have been trained by a person familiar with it.
More than 45,000 attacks have been recorded in as many as 74 countries, including Russia, Turkey, Vietnam, the Philippines and Japan, according to Kaspersky Labs, a Russian cybersecurity firm
The Russian Interior Ministry confirmed in a statement that 1,000 of its computers had also been hit.
The ransomware encrypted data on the computers, demanding payments of $300 to $600 to restore access. Security researchers said they observed some victims paying via the digital currency bitcoin, though they did not know what percent had given in to the extortionists.
A tool known as Eternal Blue developed by US spies was used by the hackers to supercharge an existing form of criminal malware, three senior cyber security analysts said, leading to one of the fastest-spreading and potentially damaging cyber attacks seen to date. Their analysis was confirmed by western security officials who were scrambling to contain an attack that initially hit hospitals and doctors’ practices across the UK. The same or similar virus was used in a large-scale attack in Spain that hit Telefónica, the country’s main telecoms provider.
An “accidental hero” has halted the global spread of the WannaCry ransomware that has wreaked havoc on organizations including the UK’s National Health Service (NHS), FedEx and Telefonica.
Massive ransomware cyber-attack hits nearly 100 countries around the world
A cybersecurity researcher tweeting as @malwaretechblog, with the help of Darien Huss from security firm Proofpoint, found and implemented a “kill switch” in the malicious software that was based on a cyber-weapon stolen from the NSA.
The kill switch was hardcoded into the malware in case the creator wanted to stop it from spreading. This involved a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading.
Friday’s massive international cyberattack may give you the best reason of all to hit “update” when prompted.Reports suggest that the vulnerability exploited by the worm responsible for the attack is the same one revealed in April by the hacker group known as the Shadow Brokers. The Shadow Brokers alleged that the U.S. National Security Agency had used weaknesses in Windows as part of its digital surveillance efforts.