日韩精品久久一区二区三区_亚洲色图p_亚洲综合在线最大成人_国产中出在线观看_日韩免费_亚洲综合在线一区

USEUROPEAFRICAASIA 中文雙語Fran?ais
China
Home / China / Across America

Who's behind 'WannaCry' cyberattack?

China Daily USA | Updated: 2017-05-16 10:08

Washington - Cyber security researchers have found technical evidence they said could link DPRK with the global WannaCry "ransomware" cyber attack that has infected more than 300,000 computers in 150 countries since Friday.

Symantec and Kaspersky Lab said on Monday that some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a DPRK-run hacking operation.

"This is the best clue we have seen to date as to the origins of WannaCry," Kaspersky Lab researcher Kurt Baumgartner told Reuters.

Both firms said it was too early to tell whether DPRK was involved in the attacks, based on the evidence that was published on Twitter by Google security researcher Neel Mehta. The attacks, which slowed on Monday, are among the fastest-spreading extortion campaigns on record.

In a blog post on Sunday, Microsoft Corp President Brad Smith confirmed what researchers already widely concluded: The attack made use of a hacking tool built by the US National Security Agency (NSA) that had leaked online in April.

He poured fuel on a long-running debate over how government intelligence services should balance their desire to keep software flaws secret - in order to conduct espionage and cyber warfare - against sharing those flaws with technology companies to better secure the internet.

On Monday, Trump homeland security adviser Tom Bossert sought to distance the NSA from any blame.

"This was not a tool developed by the NSA to hold ransom data. This was a tool developed by culpable parties, potentially criminals or foreign nation-states, that were put together in such a way as to deliver phishing emails, put it into embedded documents, and cause infection, encryption and locking," Bossert said.

Russian President Vladimir Putin, noting the technology's link to the US spy service, said it should be "discussed immediately on a serious political level."

"Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators," he said.

Regardless of the source of the attack, investors piled into cyber security stocks on Monday, betting that governments and corporations will spend more to upgrade their defenses.

The perpetrators had raised less than $70,000 from users paying to regain access to their computers, Bossert said.

"We are not aware if payments have led to any data recovery," Bossert said, adding that no US federal government systems had been affected.

WannaCry demanded ransoms starting at $300, in line with many cyber extortion campaigns, which keep pricing low so more victims will pay.

Still, some security experts said they were not sure if the motive of WannaCry was primarily to make money, noting that large cyber extortion campaigns typically generate millions of dollars of revenue.

"I believe that this was spread for the purpose of causing as much damage as possible," said Matthew Hickey, a co-founder of British cyber consulting firm Hacker House.

The economies most affected by WannaCry to date are Russia, Taiwan, Ukraine and India, according to security firm Avast.

The number of infections has fallen dramatically since Friday's peak when more than 9,000 computers were being hit per hour.

Authorities in Europe and the United States turned their attention to preventing hackers from spreading new versions of the virus.

Reuters

Polar icebreaker Snow Dragon arrives in Antarctic
Xi's vision on shared future for humanity
Air Force units explore new airspace
Premier Li urges information integration to serve the public
Dialogue links global political parties
Editor's picks
Beijing limits signs attached to top of buildings across city
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 久久精品国产2020 | 九九精品在线 | 天天澡天天碰天天狠伊人五月 | 久久我们这里只有精品国产4 | 亚洲精品国产成人无码区A片 | 色播在线永久免费视频网站 | 免费黄色a视频 | 天天燥日日燥 | 国产精品一区二区在线 | 国产主播福利精品一区二区 | 国产一区免费 | 久久一区二区三区不卡 | 日本在线无 | 国内精品小视频福利网址 | 欧美精品成人a多人在线观看 | 国产精品每日更新 | 日韩伦理电影免费观看 | 国产一区不卡 | 狠狠av | 午夜精品一区二区三区免费视频 | 成人免费一级毛片在线播放视频 | 欧美影院| 日本a在线| 九九伊在人线 | 日韩欧美在线观看视频一区二区 | 国内精品视频免费观看 | 国产传媒网址 | 九九热线精品视频6一 | 国产成人无码AA片免费看 | 在线播放国产一区二区三区 | 国产精品一区在线观看你懂的 | 欧美色欧美色 | 国产美女小视频 | 九九av | 欧美久| 国产精品小黄鸭一区二区三区 | 天堂资源地址在线 | 性色视频在线 | 午夜视频高清在线aaa | 欧美激情a∨在线视频播放 中文字幕亚洲图片 | 成人深夜福利视频 |