This video says about itself:
13 May 2017
After non-establishment Edward Snowden and non-establishment WikiLeaks blamed the United States NSA for the present Wannacry ransomware worldwide attacks on computers scandal, now Microsoft agrees. Microsoft, very much part of the establishment and sometimes collaborators with the NSA and other spying government agencies.
Translated from Dutch NOS TV:
Microsoft: NSA should have reported leak earlier
The Wannacry ransomware that holds the ICT world to ransom ever since Friday actually uses a leak [in Microsoft Windows] discovered by the US secret service NSA. Microsoft confirms this. Many security investigators had already drawn that conclusion.
It is a security issue used by the NSA to hack suspects. However, because the secret service kept this secret, computers of innocent civilians and organizations continued to be vulnerable to attacks.
Last month, a package of NSA digital weapons was leaked, where that leak [in Microsoft Windows] was part of. Researchers feared that malicious people would abuse that. Although Microsoft has been patching up this issue, businesses and consumers who have not updated their computers are still vulnerable.
Microsoft is not happy that the NSA has kept the leak secret. As a consequence, the security issue was not resolved earlier. “This shows the danger of governments collecting [computer] security issues.” Governments worldwide should see this as a wake up call and think better about using digital weapons, Microsoft says.
In the Netherlands, the AIVD secret service also collects security issues in software to target targets. The government also wants the police to have the power to hack suspects. The Dutch House of Representatives will soon be discussing this. Critics fear that maliciously-collected leaks will also be exploited by malicious people, as happened to the NSA.
This video says about itself:
WannaCry Ransomware in Action | NSA Exploit based
13 May 2017
WannaCry or WannaCrypt0r, a new ransomware based on an NSA exploit, has been taking over several computers since the last couple of days (May, 2017). As usual it encrypts user files, and demands a ransom payment in bitcoin for decryption. Airports, businesses, govt. organizations, universities, health services (like NHS) and even the Russian Internal Affairs department are affected. Over 99 countries are under siege including Russia, Germany (most of Europe), China, US.
Make sure you have backups of important data on a separate external drive and don’t forget to patch your systems, cause the NSA vulnerability has been fixed by Microsoft via updates.
From News Line daily in Britain:
Monday, 15 May 2017
ON FRIDAY afternoon a terrorist cyber attack was launched on the NHS in England and Scotland that brought it to a standstill in many areas, a standstill that is still continuing. The terrorists encrypted vital NHS patient information to prevent doctors having access to it so that patients’ lives were directly threatened with their operations unable to take place!
Apparently, the ransom demands were for £230 in Bitcoins, so the likelihood is that the NHS, the great gain and pride of the British people is being held to ransom by a gang of amateur robbers!
One would think that the government would die of shame at what has happened, but it marches brazenly on, as if nothing has happened except that Health Secretary, Jeremy Hunt, has gone into hiding, and we have been warned that more of the same is ahead.
The reality is that savage Tory NHS multi-billion cuts have seen hospitals cut and closed, and hundreds of thousands of beds ‘lost’. There are billions of pounds of more savage STP reorganisation cuts ahead, leading the way to NHS privatisation. The ongoing cuts have left the NHS not only understaffed and struggling to provide the service that it was intended for, it has left it with decades-old computers, a sitting duck, for the cyber terrorists who want to endanger patients lives for a handful of Bitcoins.
Health Secretary Hunt has spent the last 18 months harrying the junior doctors and forcing them to accept an imposed contract. He told them every day that their protests and refusal to work a seven-day service were endangering patients lives and even causing patient deaths! Now we see the essence of the situation. Cameron‘s, May‘s and Hunt’s cuts have not only left the NHS unable to function, they have allowed its security systems to become so completely outdated that the NHS could be held to ransom and patients lives threatened for a handful of Bitcoins! Their refusal to properly finance and secure the NHS has handed it over to terrorists which may well result in a number of patient deaths!
Hunt is directly in charge of the NHS, and must not be allowed to escape responsibility for the crisis that his policies have created. He must be made to resign at once! In fact on June 8th the Tory government itself must be held to account for the crime of allowing the cyber terrorists to hold the NHS for ransom by being sacked by the electorate. A Labour government must be returned that can be made to to carry out a policy of developing the NHS and not destroying it.
One thing that is missing in the present situation is any attempt to blame Putin and Russian hackers for the NHS security crisis.
This is because as the whistleblower Snowden has pointed out that responsibility for the terrorists getting the tools to do the job rests with the USA. Snowden is not alone in pointing out that the US National Security Agency allowed the terrorists to use an NSA tool codenamed EternalBlue that was one of several tools leaked by the Shadow Brokers hacking gang last month.
The tool exploits a vulnerability in Microsoft’s Server Message Block which allows attackers to crash systems with a denial of service attack. After scrambling computer files, the malware demands $300 (£230) in Bitcoin to restore documents.
Edward Snowden commented that: ‘Last month, the Shadow Brokers hacking group released documents containing vulnerabilities identified by the NSA and hacking tools developed by the intelligence agency to break into Windows computers. Shadow Brokers made the exploits public after the NSA left their arsenal of hacking tools on a server “in the wild”, allowing them to be picked up by any hacker who stumbled upon them.
Snowden raised the issue of whether the NSA would be liable for any consequent hack using the tools. The Shadow Brokers’ file dump included 23 new hacking tools named OddJob, EasyBee, EternalRomance, FuzzBunch, EducatedScholar, and others.
The tools are capable of breaking into computers running versions of the Windows operating system which are earlier than the most recent Windows 10. The way to proceed is to make Hunt quit at once, then sack the Tories on June 8th and then send the clean-up bill to the USA and its NSA for payment!
POST-CYBERATTACK, MONDAY COULD BE ROUGH “U.S. and European officials scrambled to catch the culprits behind a massive ransomware worm that caused damage across the globe over the weekend, stopping car factories, hospitals, shops and schools, as Microsoft pinned blame on governments for not disclosing more software vulnerabilities.” Here’s a look into what it takes to catch a cybercriminal and what to do if you’ve been attacked. [Reuters]