{"id":14720,"date":"2019-05-27T12:51:13","date_gmt":"2019-05-27T16:51:13","guid":{"rendered":"http:\/\/worldjusticenews.com\/news\/?p=14720"},"modified":"2019-05-27T12:51:13","modified_gmt":"2019-05-27T16:51:13","slug":"baltimore-ransomware-attack-nsa-faces-questions","status":"publish","type":"post","link":"https:\/\/worldjusticenews.com\/news\/2019\/05\/27\/baltimore-ransomware-attack-nsa-faces-questions\/","title":{"rendered":"Baltimore ransomware attack: NSA faces questions"},"content":{"rendered":"<p class=\"story-body__introduction\">Politicians representing a US city struck by a ransomware attack are asking questions of the National Security Agency after claims it helped make the breach possible.<\/p>\n<p>The New York Times reported on Saturday that a hacking vulnerability known as EternalBlue has been exploited to blackmail Baltimore&#8217;s local government.<\/p>\n<p>The NSA discovered the flaw, but the paper claims that its cyber-spies kept the discovery secret for years.<\/p>\n<p>The NSA declined to comment.<\/p>\n<p>But the report has particular resonance as the organisation is headquartered at Fort Meade, Maryland, which is a short drive from Baltimore.<\/p>\n<p>&#8220;We don&#8217;t have anything for you on this,&#8221; an NSA spokesman told the BBC.<\/p>\n<p>The EternalBlue flaw has been implicated in a range of cyber-attacks over the past three years, including the WannaCry assault that disrupted the UK&#8217;s NHS.<\/p>\n<p>It involves a bug in old versions of\u00a0<a class=\"story-body__link-external\" href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft&#8217;s Windows operating system<\/a>\u00a0that allows other malicious code to be run on infected computers.<\/p>\n<p>The NSA reportedly created a tool to do this, which it also called EternalBlue.<\/p>\n<p>The New York Times said the agency did not disclose the problem to Microsoft for more than five years until a breach forced its hand.<\/p>\n<p>Microsoft released a fix for EternalBlue flaw in March 2017.<\/p>\n<p>Weeks later, a group calling itself the Shadow Brokers<a class=\"story-body__link\" href=\"https:\/\/www.bbc.co.uk\/news\/technology-39553241\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0leaked the NSA&#8217;s related hacking tool online<\/a>.<\/p>\n<p>The NSA has never confirmed how it came to lose control of its code nor officially commented on the affair.<\/p>\n<p>But the suggestion is that if it had shared its findings with Microsoft at an earlier stage, fewer PCs would have been exposed to subsequent attacks that made use of the vulnerability.<\/p>\n<h2 class=\"story-body__crosshead\">Email lock-out<\/h2>\n<p>Thousands of Baltimore&#8217;s city government computers were frozen on 7 May after their files became digitally scrambled.<\/p>\n<p>The criminals responsible demanded 13 Bitcoin ($114,440; \u00a36,940) to unlock them all, or three Bitcoin to release specific systems ahead of a deadline, which has now passed.<\/p>\n<p>The authorities refused.<\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"><img loading=\"lazy\" decoding=\"async\" class=\"responsive-image__img js-image-replace\" src=\"https:\/\/ichef.bbci.co.uk\/news\/624\/cpsprodpb\/1EFC\/production\/_107123970_92bc601b-533c-447f-b9f6-59684847e726.jpg\" alt=\"City of Baltimore website\" width=\"976\" height=\"450\" data-highest-encountered-width=\"624\" \/><\/span><figcaption class=\"media-caption\"><span class=\"media-caption__text\">The city&#8217;s website informs vistors that it cannot currently process online payments<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Local residents have been unable to pay utility bills, parking tickets and some taxes online as a consequence.<\/p>\n<p>In addition, staff have been unable to send or receive emails from their normal accounts.<\/p>\n<p>Senator Chris Van Hollen and Congressman Dutch Ruppersberger have told the Baltimore Sun newspaper that they are now seeking &#8220;a full briefing&#8221; directly from the NSA.<\/p>\n<p>&#8220;We must ensure that the tools developed by our agencies do not make their way into the hands of bad actors,&#8221; the senator told the paper.<\/p>\n<p>Some security experts say if EternalBlue is truly involved, then IT managers should have installed a patch long ago.<\/p>\n<div class=\"social-embed\">\n<div class=\"social-embed-post social-embed-twitter\">\n<div class=\"embed embed-twitter\">\n<div class=\"embed-region\" role=\"region\" aria-label=\"Twitter post by @ErrataRob\">\n<div class=\"twitter-wrap\">\n<div class=\"SandboxRoot env-bp-350\" data-twitter-event-id=\"0\">\n<div id=\"twitter-widget-0\" class=\"EmbeddedTweet EmbeddedTweet--cta js-clickToOpenTarget tweet-InformationCircle-widgetParent\" lang=\"en\" data-click-to-open-target=\"https:\/\/twitter.com\/ErrataRob\/status\/1132346101057630210\" data-iframe-title=\"Twitter Tweet\" data-scribe=\"page:tweet\" data-twitter-event-id=\"1\">\n<div class=\"EmbeddedTweet-tweetContainer\">\n<div class=\"EmbeddedTweet-tweet\">\n<blockquote class=\"Tweet h-entry js-tweetIdInfo subject expanded\" cite=\"https:\/\/twitter.com\/ErrataRob\/status\/1132346101057630210\" data-tweet-id=\"1132346101057630210\" data-scribe=\"section:subject\">\n<div class=\"Tweet-header\">\n<p><a class=\"TweetAuthor-avatar Identity-avatar u-linkBlend\" href=\"https:\/\/twitter.com\/ErrataRob\" data-scribe=\"element:user_link\" aria-label=\"Rob\u1d47\u1d49\u1d57\u1d52 Graham (screen name: ErrataRob)\"><img decoding=\"async\" class=\"Avatar\" src=\"https:\/\/pbs.twimg.com\/profile_images\/1765729789\/image1326952644_normal.png\" alt=\"\" data-scribe=\"element:avatar\" data-src-2x=\"https:\/\/pbs.twimg.com\/profile_images\/1765729789\/image1326952644_bigger.png\" data-src-1x=\"https:\/\/pbs.twimg.com\/profile_images\/1765729789\/image1326952644_normal.png\" \/><\/a><\/p>\n<div class=\"TweetAuthor js-inViewportScribingTarget\" data-scribe=\"component:author\">\n<div class=\"TweetAuthor-nameScreenNameContainer\"><span class=\"TweetAuthor-decoratedName\"><span class=\"TweetAuthor-name Identity-name customisable-highlight\" title=\"Rob\u1d47\u1d49\u1d57\u1d52 Graham\" data-scribe=\"element:name\">Rob\u1d47\u1d49\u1d57\u1d52 Graham<\/span><\/span><span class=\"TweetAuthor-screenName Identity-screenName\" dir=\"ltr\" title=\"@ErrataRob\" data-scribe=\"element:screen_name\">@ErrataRob<\/span><\/div>\n<\/div>\n<div class=\"Tweet-brand\"><\/div>\n<\/div>\n<div class=\"Tweet-body e-entry-content\" data-scribe=\"component:tweet\">\n<div class=\"Tweet-inReplyTo\"><a class=\"u-linkBlend\" href=\"https:\/\/twitter.com\/_\/status\/1132345806177144833\" data-scribe=\"element:in_reply_to_user_link\">Replying to @ErrataRob<\/a><\/div>\n<div class=\"Tweet-target js-inViewportScribingTarget\"><\/div>\n<p class=\"Tweet-text e-entry-title\" dir=\"ltr\" lang=\"en\">Eternalblue was released over two years ago.. If an organization has substantial numbers of Windows machines that have gone 2 years without patches, then that&#8217;s squarely the fault of the organization, not Eternalblue.<\/p>\n<div class=\"TweetInfo\"><\/div>\n<\/div>\n<\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"resize-sensor\">\n<div class=\"resize-sensor-expand\">\n<div><\/div>\n<\/div>\n<div class=\"resize-sensor-shrink\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>But one consultant noted that this may have been easier said than done.<\/p>\n<p>&#8220;For some organisations, patching can be a non-trivial exercise, even with a couple of years of lead time,&#8221; said Troy Hunt.<\/p>\n<p>&#8220;Specialised systems such as medical devices, for example, often go unpatched for long periods of time.<\/p>\n<p>&#8220;Offsetting that risk are factors such as the devices not being internet-connected. although given we&#8217;re still seeing infections due to EternalBlue two years after it was patched, evidently there are still systems out there both unpatched and exposed.&#8221;<\/p>\n<h2 class=\"story-body__crosshead\">On the ground in Baltimore:<\/h2>\n<figure class=\"media-landscape no-caption full-width\"><span class=\"image-and-copyright-container\"><img loading=\"lazy\" decoding=\"async\" class=\"responsive-image__img js-image-replace\" src=\"https:\/\/ichef.bbci.co.uk\/news\/624\/cpsprodpb\/17FF7\/production\/_104759289_davelee-nc.png\" alt=\"Analysis box by Dave Lee, technology correspondent\" width=\"1706\" height=\"340\" data-highest-encountered-width=\"624\" \/><\/span><\/figure>\n<p>It&#8217;s not exactly the talk of the town here &#8211; after all, it&#8217;s not like Facebook has gone down, merely crucial public services.<\/p>\n<p>For those who have been affected, it&#8217;s very frustrating &#8211; a delayed house sale here, a new business that can&#8217;t open on schedule there. One person told me about how they have been unable to pay for their wedding venue at a place part-owned by the city.<\/p>\n<p>Another told me they couldn&#8217;t go online to pay a parking ticket &#8211; that&#8217;s not as fortunate as it sounds, trust me.<\/p>\n<p>A further kick in the teeth for this city is the suggestion that this attack used an exploit discovered not by the Russians or Chinese, but by an organisation based just 20 miles away &#8211; the US National Security Agency.<\/p>\n<p>City officials want answers on that, but locals don&#8217;t want it to be a scapegoat. There have been repeated warnings here about severe underinvestment in government IT infrastructure.<\/p>\n<p>Source: <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-48423954\" target=\"_blank\" rel=\"noopener noreferrer\">bbc.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\">Politicians representing a US city struck by a ransomware attack are asking questions of the National Security Agency after claims it helped make the breach possible. The New York Times reported on Saturday that a <a class=\"mh-excerpt-more\" href=\"https:\/\/worldjusticenews.com\/news\/2019\/05\/27\/baltimore-ransomware-attack-nsa-faces-questions\/\" title=\"Baltimore ransomware attack: NSA faces questions\">[&#8230;]<\/a><\/div>\n","protected":false},"author":1,"featured_media":14721,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","footnotes":""},"categories":[109,2,3],"tags":[4877,308,6272,2936,6271,6270],"class_list":{"0":"post-14720","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-headline","8":"category-news","9":"category-usa","10":"tag-baltimore","11":"tag-cybersecurity","12":"tag-eternalblue","13":"tag-hacking","14":"tag-national-security-agency","15":"tag-ransomware","16":"pmpro-has-access"},"_links":{"self":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/14720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/comments?post=14720"}],"version-history":[{"count":1,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/14720\/revisions"}],"predecessor-version":[{"id":14722,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/14720\/revisions\/14722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media\/14721"}],"wp:attachment":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media?parent=14720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/categories?post=14720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/tags?post=14720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}