|
Post by robeiae on May 13, 2017 9:44:23 GMT -5
|
|
|
Post by Angie on May 13, 2017 10:06:14 GMT -5
That's the beauty of Chromebooks. I thought they were a novelty until I actually got one. They're pretty nice machines, and with the less-than-5-minute hard reset option, they're damned-near indestructible from a software standpoint. My desktop machine is Windows, though, so I have antivirus and two different anti-malware programs. PITA. The bit about hospitals being unable to access patient data was scary.
|
|
|
Post by Don on May 14, 2017 9:42:25 GMT -5
Nice job of "protecting" us, NSA!
|
|
|
Post by robeiae on May 15, 2017 8:43:13 GMT -5
|
|
|
Post by robeiae on May 17, 2017 9:03:19 GMT -5
So, everyone is saying--per Don's reference--that this was the "Shadow Brokers," a group (or even just one or two) of hackers who hacked the NSA and retrieved all of these tools to do what they are doing. Here's a piece arguing that there must be at least one insider--contractor or a part of the US intelligence community--involved: www.mcclatchydc.com/news/nation-world/national/national-security/article150827507.htmlHere's the Shadow Borkers' latest statement re the ransomware attack: steemit.com/shadowbrokers/@theshadowbrokers/oh-lordy-comey-wanna-cry-editionThis obviously looks like cyberwar between the "Equation Group" and the "Shadow Brokers." The above piece says as much, in fact. Shadow Brokers is claiming the stolen tools were offered back to Equation Group and the latter passed, which is why Shadow Brokers unleashed this attack. To me, it looks like Shadow Brokers is a spin-off from Equation Group, that it's membership is drawn from the latter. And of course, it's assumed that the NSA is the source of Equation Group. This is messed up...
|
|
|
Post by Angie on May 17, 2017 10:06:35 GMT -5
Vs.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on May 17, 2017 10:52:42 GMT -5
Damn it, where are the dogs when we need them?
|
|
|
Post by robeiae on Jun 28, 2017 8:40:55 GMT -5
|
|
|
Post by Vince524 on Jun 28, 2017 12:00:52 GMT -5
Can't they just unplug it and reboot?
|
|
|
Post by robeiae on Jun 28, 2017 13:51:07 GMT -5
No, not on a Windows-based machine. The ransomware still takes control of the system, even on a reboot, because it's actually on the computer.
|
|
|
Post by Optimus on Jun 29, 2017 1:33:57 GMT -5
I have nothing to add other than I think it's super nerdy that "The Shadow Brokers" stole their name from a character in the Mass Effect video game series. I mean, it's a cool name but if I had a hacker group and was gonna steal a fictional character's name as my own, I'd probably go with "The Decepticons" or "The Cobra Commanders" or something like that.
|
|
|
Post by ben on Jun 29, 2017 21:07:48 GMT -5
A few months ago I read "Countdown To Zero Day," it's mostly about Stuxnet and the long unraveling of what it was and what it did, but it also discussed NSA and other government entities (for both the USA and other countries) that spend considerable effort to discover software vulnerabilities. The "moral thing to do" is report these to the companies whose software is affected so they can patch it (some even offer cash rewards for exploits they haven't seen before), but these entities keep the vulnerabilities secret, and use them to spy on people they're interested in. The morality of this is at best questionable, because such things stay in the software and can be discovered by yet other evil entities to cause harm.
|
|
|
Post by ben on Jun 29, 2017 21:10:01 GMT -5
No, not on a Windows-based machine. The ransomware still takes control of the system, even on a reboot, because it's actually on the computer. If you want to read about a legitimate (!) company installing bad things on your (Windows) computer without telling you, google Sony rootkit.
|
|