{"id":180198,"date":"2017-06-27T08:24:00","date_gmt":"2017-06-27T13:24:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2017\/06\/27\/once-again-the-nsa-makes-us-all-less-safe\/"},"modified":"2017-06-27T08:24:00","modified_gmt":"2017-06-27T13:24:00","slug":"once-again-the-nsa-makes-us-all-less-safe","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2017\/06\/27\/once-again-the-nsa-makes-us-all-less-safe\/","title":{"rendered":"Once Again, the NSA Makes Us All Less Safe"},"content":{"rendered":"<div>We are now seeing <a href=\"https:\/\/arstechnica.com\/security\/2017\/06\/a-new-ransomware-outbreak-similar-to-wcry-is-shutting-down-computers-worldwide\/\">another ransomware conflagration based on exploits curated by the NSA<\/a>: <\/div>\n<blockquote><p><span style=\"color: blue;\">A new ransomware attack similar to last month&#8217;s <a href=\"https:\/\/arstechnica.com\/security\/2017\/05\/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide\/\">self-replicating WCry outbreak<\/a> is sweeping the world with at least 80 large companies infected, including drug maker Merck, international shipping company Maersk, law firm DLA Piper, UK advertising firm WPP, and snack food maker Mondelez International. It has attacked at least 12,000 computers, according to one security company. <\/p>\n<p>PetyaWrap, as some researchers are calling the ransomware, uses a cocktail of potent techniques to break into a network and from there spread from computer to computer. Like the WCry worm that paralyzed hospitals, shipping companies, and train stations around the globe in May, Tuesday&#8217;s attack made use of EternalBlue, the code name for an advanced exploit that was developed and used by, and later stolen from, the National Security Agency. <\/p>\n<p>According to a <a href=\"https:\/\/securelist.com\/schroedingers-petya\/78870\/\">blog post published by antivirus provider Kaspersky Lab<\/a>, Tuesday&#8217;s attack also repurposed a separate NSA exploit dubbed EternalRomance. Microsoft <a href=\"https:\/\/arstechnica.com\/security\/2017\/04\/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch\/\">patched the underlying vulnerabilities for both of those exploits<\/a> in March, precisely four weeks before a <a href=\"https:\/\/arstechnica.com\/security\/2017\/04\/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet\/\">still-unknown group calling itself the Shadow Brokers published the advanced NSA hacking tools<\/a>. The leak gave people with only moderate technical skills a powerful vehicle for delivering virtually any kind of digital warhead to systems that had yet to install the updates. <\/p>\n<p>Besides use of EternalRomance, Tuesday&#8217;s attack showed several other impressive improvements over WCry. One, according to Kaspersky, was the use of the <a href=\"https:\/\/www.offensive-security.com\/metasploit-unleashed\/Mimikatz\/\">Mimikatz hacking tool<\/a> to extract passwords from other computers on a network. With those network credentials in hand, infected computers would then use <a href=\"https:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb897553.aspx\">PSExec<\/a>, a legitimate Windows component known as the Windows Management Instrumentation, and possibly other command-line utilities to infect other machines, even when they weren&#8217;t vulnerable to the EternalBlue and EternalRomance exploits. For added effectiveness, at least some of the attacks also exploited the update mechanism of a third-party Ukrainian software product called <a href=\"http:\/\/www.me-doc.com.ua\/\">MeDoc<\/a>, Kaspersky Lab said. A researcher who posts under the handle MalwareTech, <a href=\"https:\/\/www.malwaretech.com\/2017\/06\/petya-ransomware-attack-whats-known.html\">speculated here<\/a> that MeDoc was itself compromised by malware that took control of the mechanism that sends updates to end users.<\/span><\/p><\/blockquote>\n<p>The fact that the NSA does not do a good job on cybersecurity should surprise no one.&nbsp; Their job is not to keep our computers safe, but to break into as many systems as it can and hoover up data.<\/p>\n<p><a href=\"https:\/\/www.aclu.org\/blog\/free-future\/us-government-malware-policy-puts-everyone-risk\">The ACLU has accurately described the problem<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">Last month, a massive ransomware attack hit computers around the globe, and the government is partly to blame.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">The malicious software, known as \u201cWannaCry,\u201d encrypted files on users\u2019 machines, effectively locking them out of their information, and demanded a payment to unlock them. This attack spread rapidly through a vulnerability in a widely deployed component of Microsoft&#8217;s Windows operating system, and placed hospitals, local governments, banks, small businesses, and more in harm&#8217;s way.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">This happened in no small part because of U.S. government decisions that prioritized offensive capabilities \u2014 the ability to execute cyberattacks for intelligence purposes \u2014 over the security of the world\u2019s computer systems. The decision to make offensive capabilities the priority is a mistake. And at a minimum, this decision is one that should be reached openly and democratically. A bill has been proposed to try to improve oversight on these offensive capabilities, but oversight alone may not address the risks and perverse incentives created by the way they work. It\u2019s worth unpacking the details of how these dangerous weapons come to be.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">When researchers discover a previously unknown bug in a piece of  software (often called a \u201czero day\u201d), they have several options:<\/span><\/p>\n<ol>\n<li><span style=\"color: blue;\">They can report the problem to the supplier of the software (Microsoft, in this case).<\/span><\/li>\n<li><span style=\"color: blue;\">They  can write a simple program to demonstrate the bug (a \u201cproof of  concept\u201d) to try to get the software supplier to take the bug report  seriously.<\/span><\/li>\n<li><span style=\"color: blue;\">If the flawed program is free or open source  software, they can develop a fix for the problem and supply it alongside  the bug report.<\/span><\/li>\n<li><span style=\"color: blue;\">They can announce the problem publicly to  bring attention to it, with the goal of increasing pressure to get a fix  deployed (or getting people to stop using the vulnerable software at  all).<\/span><\/li>\n<li><span style=\"color: blue;\">They can try to sell exclusive access to information  about the vulnerability on the global market, where governments and  other organizations buy this information for offensive use.<\/span><\/li>\n<li><span style=\"color: blue;\">They  can write a program to aggressively take advantage of the bug (an  \u201cexploit\u201d) in the hopes of using it later to attack an adversary who is  still using the vulnerable code.<\/span><\/li>\n<\/ol>\n<p><span style=\"color: blue;\">Note that these last two  actions (selling information or building exploits) are at odds with the  first four. If the flaw gets fixed, exploits aren&#8217;t as useful and  knowledge about the vulnerability isn&#8217;t as valuable.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">The NSA knew about a disastrous flaw in widely used piece of software \u2013 as well as code to exploit it \u2014 for <a href=\"https:\/\/www.washingtonpost.com\/business\/technology\/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did\/2017\/05\/16\/50670b16-3978-11e7-a058-ddbb23c75d82_story.html\">over five years<\/a>  without trying to get it fixed. In the meantime, others may have  discovered the same vulnerability and built their own exploits.<\/span><\/p><\/blockquote>\n<p>The people handling our offensive cyber capabilities cannot be trusted to protect us, because it is not their jobs.<\/p>\n<p>Their job is to hack into other people&#8217;s systems, and any consequences are seen as irrelevant.<\/p>\n<p>It&#8217;s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blind_men_and_an_elephant\">blind men and an elephant<\/a>, and it&#8217;s the rest of us who suffer as a result.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are now seeing another ransomware conflagration based on exploits curated by the NSA: A new ransomware attack similar to last month&#8217;s self-replicating WCry outbreak is sweeping the world with at least 80 large companies infected, including drug maker Merck, international shipping company Maersk, law firm DLA Piper, UK advertising firm WPP, and snack food &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[395,435,369,588,665],"class_list":["post-180198","post","type-post","status-publish","format-standard","hentry","tag-computer","tag-crimes","tag-espionage","tag-fail","tag-hacking"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/180198"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=180198"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/180198\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=180198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=180198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=180198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}