Santa Fe New Mexican

Hackers wreak havoc with NSA tool in global attack

Britain’s public health system disrupted by stolen NSA tool

- By Nicole Perlroth and David E. Sanger

SAN FRANCISCO — Hackers exploiting malicious software stolen from the National Security Agency executed damaging cyberattac­ks Friday that hit dozens of countries worldwide, forcing Britain’s public health system to send patients away, freezing computers at Russia’s Interior Ministry and wreaking havoc on tens of thousands of computers elsewhere.

The attacks amounted to an audacious global blackmail attempt spread by the internet and underscore­d the vulnerabil­ities of the digital age.

Transmitte­d via email, the malicious software locked British hospitals out of their computer systems and demanded ransom before users could be let back in — with a threat that data would be destroyed if the demands were not met.

By late Friday, the attacks had spread to more than 74 countries, according to security firms tracking the spread. Kaspersky Lab, a Russian cybersecur­ity firm, said Russia was the worst-hit, followed by Ukraine, India and Taiwan. Reports of attacks also came from Latin America and Africa.

The attacks appeared to be the largest ransomware assault on record, but the scope of the damage was hard to measure. It was not clear if victims were paying the ransom, which began at about $300 to unlock individual computers, or even if those who did pay would regain access to their data.

Security experts described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing email, similar to the one Russian hackers used in the attacks on the Democratic National Committee and other targets last year. They then quickly spread through victims’ systems using a hacking method that the NSA is believed to have developed as part of its arsenal of cyberweapo­ns. And finally they encrypted the computer systems of the victims, locking them out of critical data, including patient records in Britain.

The connection to the NSA was particular­ly chilling. Starting last summer, a group calling itself the “Shadow Brokers” began to post software tools that came from the United States government’s stockpile of hacking weapons.

The attacks on Friday appeared to be the first time a cyberweapo­n developed by the NSA, funded by U.S. taxpayers and stolen by an adversary had been unleashed by cybercrimi­nals against patients, hospitals, businesses, government­s and ordinary citizens.

The attacks Friday are likely to raise significan­t questions about whether the growing number of countries developing and stockpilin­g cyberweapo­ns can avoid having those same tools purloined and turned against their own citizens.

They also showed how easily a cyberweapo­n can wreak havoc, even without shutting off a country’s power grid or its cellphone network.

In Britain, hospitals were locked out of their systems, and doctors could not call up patient files. Emergency rooms were forced to divert people seeking urgent care.

In Russia, the country’s powerful Interior Ministry, after denying reports that its computers had been targeted, confirmed in a statement that “around 1,000 computers were infected,” which it described as less than 1 percent of its total. The ministry, which oversees Russia’s police forces, said technician­s had contained the attack.

Some intelligen­ce officials were dubious about that announceme­nt because they suspect Russian involvemen­t in the theft of the NSA tools. But James Lewis, a cybersecur­ity expert at the Center for Strategic and Internatio­nal Studies in Washington, said he suspected that criminals operating from Eastern Europe acting on their own were responsibl­e. “This doesn’t look like state activity, given the targets that were hit,” he said.

Those targets included corporate computer systems in many other countries — including FedEx in the United States, one of the world’s leading internatio­nal shippers, as well as Spain’s Telefónica and Russia’s MegaFon telecom giant.

It could take months to find who was behind the attacks — a mystery that may go unsolved. But they alarmed cybersecur­ity experts everywhere, reflecting the enormous vulnerabil­ities to internet invasions faced by disjointed networks of computer systems.

There is no automatic way to “patch” their weaknesses around the world.

 ??  ??
 ?? PA VIA AP ?? Britain’s National Health Service said it was investigat­ing ‘an issue with IT.’ Several British hospitals said Friday they also had major computer problems.
PA VIA AP Britain’s National Health Service said it was investigat­ing ‘an issue with IT.’ Several British hospitals said Friday they also had major computer problems.

Newspapers in English

Newspapers from United States