The hacker group threatened to spread the network attack tool behind WannaCry
Shadow Brokers, a hacker group behind the network weapon theft and vulnerability exploiting tool used by the NSA, said it will release the stolen tools monthly. These are the tools that created the global cyberattack called WannaCry,
On an article, the group said it will begin its release in June and those who pay a Subscription will be able to access it. They also added that these are " network data from Russian, Chinese, Iranian or Korean missile programs, rocket launchers, as well as tools to exploit Windows 10 vulnerabilities, handset and data devices. whether stolen from the central bank ".
" In June, TheShadowBrokers announced the service" Discharging TheShadowBrokers data of the Month. "The group will offer a full-cost subscription model. The member wants to do with the data depending on their decision , "the group said.
The group did not give evidence that they had data, so it was probably a lie. They also criticize technology companies for not buying their data.
Leakage tool from Shadow Brokers behind the WannaCry attack
In early 2016, Shadow Brokers put the NSA hack tool online. They also spread more and more, including tools to exploit vulnerabilities on Windows machines, after failing to sell them in an online auction.
These tools were then used by a hidden attack group to spread the ransomware WannaCry, stirring up thousands of computers around the world, causing chaos in many large companies. Microsoft had to break the law to release patches for vulnerabilities in Windows, but many un-updated organizations were still exploited. The attack also prompted Microsoft to protest against the US government's use of exploitation tools.
"Attack" anyone, from China to Apple
Journalist Marcy Wheeler said the group's new statement about Windows 10 exploits could be a stressful effort between Microsoft and the US government. " Just threatening to leak another tool after launching two Microsoft exploit tools, Shadow Brokers will make the relationship between Microsoft and the government increasingly stressful ."
Shadow Brokers directly criticized Microsoft director Brad Smith and suspected he had contact with the NSA. They also voiced criticism of those from China and Apple for not buying their tools in the auction at the beginning of the year. " Intelligence agencies Five Eyes, Russia, China, Iran, Korea, Israel, Saudi, United Nations, NATO, no government or country buys it either. Cisco, Juniper, Intel, Microsoft, Symantec, Google, Apple, FireEye and all other security companies, nobody bought it . "
You should read it
- 2 effective and free ways to check WannaCry
- WannaCry remains one of the most dangerous global security threats
- How to remove / fix ransomware WannaCry
- Download and sell Windows patches for all versions to avoid being hit by a massive cyber attack, affecting 150 countries and still spreading
- Prevent WannaCry variants by turning off this Windows 10 installation
- Windows SMB users should close some ports to prevent WannaCry
- Network security researcher claims to find a way to decode WannaCry
- How to identify WannaCry malicious code from Vietnam Computer Emergency Response Center (VNCERT)
May be interested
- Watch out for new dangerous viruses similar to WannaCryanother type of computer virus that exploits a security hole in the windows operating system, such as the wannacry malicious code, has spread more than 200,000 devices and helped hackers hack silver.
- Download the free WannaCry malware checker nowthe free wannacry malware checking tool is released from bkav, capable of checking whether a computer contains an eternalblue vulnerability. this is the flaw that wannacry took advantage of to invade the computer.
- What is a Replay Attack?a replay attack occurs when a cybercriminal eavesdroves a communication over a secure network, intercepts it, then delays or resends the content, to get the recipient to do what the hacker wants.
- The hero destroys the captured WannaCry because he suspected of creating a trojan to attack the bankmarcus hutchins, a british malware researcher who successfully attacked the wannacry ransomware attack was arrested in las vegas on suspicion of writing malware.
- China is threatened by computer 'super virus'hackers have warned that the long national holiday in china could make the country the most populous in the world
- Warning with 4 dangerous variants of WannaCry malwarethe malicious code wannacry crippled the worldwide network in just a few hours after it appeared. in addition, 4 variants of wannacry malicious code are equally dangerous.
- Discovered a group of Vietnamese hackers specializing in stealing credit cards for the past 8 yearsaccording to security firm volexity, a group of suspected vietnamese hackers has been conducting activities to steal credit card information for the past 8 years.
- The hero preventing WannaCry faces 10 penalties related to malicious codemarcur hutchins, a british security expert who once set up a bar to prevent the spread of wannacry virus last year, now faces allegations of malicious code.
- Kaspersky accused the APT32 hacker group of using the Google Play Store to spread spyware for yearskaspersky security researchers found a malicious campaign called phantomlance targeting android device users.
- Network security researcher claims to find a way to decode WannaCryransomware wannacry has infected hundreds of thousands of computers around the world. recently, a cyber security researcher said he had found a way to defeat it.