Jesus' Coming Back

NSA ‘EternalBlue’ tool facilitates cyberattacks worldwide including U.S.

National Security Agency (NSA) headquarters building in Fort Meade, Maryland

National Security Agency (NSA) headquarters building in Fort Meade, Maryland. (photo credit: NSA/HANDOUT VIA REUTERS)

X

Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analysis from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew – Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later

A series of cyberattacks throughout the world, including attacks targeting US municipalities, have been facilitated by a hacking tool known as “EternalBlue” which was formerly used by the National Security Agency (NSA), according to The New York Times.

EternalBlue was, at one time, one of the NSA’s most valuable and useful tools. Former NSA operators told The New York Times that analysts spent almost a year developing the tool to target a flaw in Microsoft’s software. The tool was used in countless intelligence-gathering and counter-terrorism missions.

Due to the usefulness of EternalBlue, the NSA didn’t seriously consider alerting Microsoft about the vulnerability until a breach gave them no choice.

EternalBlue was stolen by a group called the “Shadow Brokers” in 2016 and then released online in April 2017, according to welivesecurity. The Shadow Brokers have released many of the NSA’s most valuable and top secret tools to hackers worldwide.

To this day, it is still unknown who is behind the Shadow Brokers. It’s not even known if they hacked the NSA, if it was insider’s leak or both.

The arsenal of hacking tools that the Shadow Brokers acquired included tools to steal documents, subtly change data or become the launching pad for an attack, such as an infamous attack against Iran which caused centrifuges enriching uranium at the Natanz nuclear plant to self-destruct.

The Shadow Brokers incident is “the most destructive and costly NSA breach in history,” Thomas Rid, a cybersecurity expert at John Hopkins University told The New York Times.

The tools stolen by Shadow Brokers have already been used to attack millions of computers with ransomware demanding payments in digital currency in order to have access restored. The attacks have targeted FedEx, Mondelez International, and hospitals in Pennsylvania, Britain and Indonesia, among other thousands of other targets, according to the New York Times.

The tool was used by North Korea for the widespread WannaCry attack in 2017, which targeted the British health care system, German railroads and about 200,000 organizations worldwide. It was also used by Russia in the NotPetya attack, which targeted Ukraine but spread to major companies doing business in the country as well.

On May 7, EternalBlue was used to attack Baltimore city workers with ransomware, demanding about $100,000 in Bitcoin in order to regain access. City officials refuse to pay and many Baltimore city services are still disabled.

Many of the targets in the US have been local governments, such as Baltimore and San Antonio, where public employees often oversee networks using outdated software. In July, the Department of Homeland Security warned that local and state governments were being hit by destructive malware which has begun relying on the EternalBlue tool to spread.

The hack can be prevented with a software patch provided by Microsoft, but almost a million computers remain vulnerable, according to welivesecurity.

Security responders have reported seeing EternalBlue show up in attacks almost every day at this point.

In the past week, researchers at the Palo Alto Networks security firm found that a Chinese state group had hacked Middle Eastern governments with the EternalBlue tool.

“We expect EternalBlue will be used almost forever, because if attackers find a system that isn’t patched, it is so useful,” said Jen Miller-Osborn, a deputy director of threat intelligence at Palo Alto Networks, according to The New York Times.

Microsoft’s president, Brad Smith, has called for a “Digital Geneva Convention” for cyberspace. This would include a pledge by governments to report vulnerabilities to vendors instead of keeping them secret in order to use them for attacks or espionage.

Maryland Sen. Chris Van Hollen and Rep. C. A. “Dutch” Ruppersberger – whose district includes some of Baltimore – have both requested briefings from the NSA, according to The Baltimore Sun.

“We must ensure that the tools developed by our agencies do not make their way into the hands of bad actors,” Van Hollen told The Baltimore Sun.

Baltimore City Council President Brandon Scott insisted that the federal government should help with the situation, saying, “Given the new information and circumstances it’s even more clear that the federal government needs to have a larger role in supporting the City’s recovery, including federal reimbursement for damages.”

“The fact that the root technology that enabled this attack came from our own federal government, just miles away, only adds insult to injury,” added Scott.

The NSA and FBI have refused to comment on the EternalBlue breach, according to The New York Times.

Join Jerusalem Post Premium Plus now for just $5 and upgrade your experience with an ads-free website and exclusive content. Click here>>

Comments are closed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More