Uncategorized

Editorial: Ransomware infects thousands using government tools

How much is all of the information stored on your computer worth?

A ransomware that spread to more than 100 countries in just a few hours faced thousands with this very question. When infected users opened their computers on Monday, they were met with nothing. All of their files were encrypted by the WannaCry ransomware. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address.

But the catch is obvious — WannaCry and its creators have no obligation to decrypt the data if the user pays up. Essentially, people’s entire digital lives have been stolen and are being held for ransom without guarantee.

Ransomware is nothing new. In fact, McAfee, a popular anti-virus software, reported nearly 250,000 new, individual and unique types of ransomware in the first quarter of 2013. These types of infection usually exploit vulnerabilities in networks using Trojan links, seemingly innocuous attachments that deceptively contain a malicious ransomware. When a user clicks on the link, their computer and the information on it is held for ransom while being used to further spread the ransomware.

But WannaCry is unique. When a hacking group called Shadow Brokers released a trove of information containing vulnerabilities and exploits that they stole from the National Security Agency, they opened the internet world to a mass infection of ransomware.

Many parties are at fault here — Shadow Brokers should not have stolen NSA data, and nobody should have created WannaCry. We cannot expect criminal hackers to be held accountable for their actions, but we should hold our government agencies accountable.

Firstly, given its involvement with surveillance and safety, the NSA should have a safer network. There is no reason why our government’s best security experts should not be able to design a network that would prevent this type of theft. But no system is foolproof, and even more importantly, their practice of stockpiling vulnerability is a questionable NSA practice that directly enabled this attack.

Stockpiling vulnerability involves finding and keeping hidden information regarding internet and computer vulnerabilities. The NSA stockpiles vulnerabilities in order be able to effectively combat cyber attacks — if it knows what tools are used in an attack before it even starts, it’s chance of stopping it in its tracks is high.

But WannaCry demonstrates the danger in stockpiling vulnerability — if those vulnerabilities are stolen and released to the general public, anybody with a computer can create ransomware that takes advantage of the vulnerabilities.

Hackers created WannaCry using NSA tools, and it’s not the only malware to be created from government documents. Other reports of cyber attacks developed using information in the Shadow Brokers dump surfaced over the past few weeks. Adylkuzz, discovered at the beginning of May, used the same exploitations and leaks, but was a much larger attack that used infected computers to mine for cryptocurrency rather than demand it from users.

WannaCry rightly scared the general public, but the ransomware shows signs of being produced by amateurs and thus is easily combatted — a 22-year-old discovered a “kill switch” in the program, an easy solution to the growing problem. Adylkuzz, however, is WannaCry’s much quieter, much more dangerous cousin that could have more serious consequences for the world. It is crucial to remember that simply because malware doesn’t reach international news doesn’t mean that it isn’t dangerous, and we should always be on the lookout for malware.

There exists a fine line between fighting fire with fire and simply being careless of the sparks. The NSA’s decision to stockpile vulnerabilities could have already contributed to thwarting other cyberattacks, but there is an easy solution to this problem — if the NSA had alerted Microsoft to the stolen vulnerability, Microsoft could have issued a security patch, as they did shortly after WannaCry spread internationally.

The NSA is on thin ice when it comes to public trust, and if they wish to stay in our good graces they have to prove, with finality, that we can and should trust them to keep us safe.

opinionsdesk

Share
Published by
opinionsdesk

Recent Posts

Pitt men’s soccer defeats Cornell, proceeds to Round of 16

On Sunday night, No. 2 seed Pitt mens’ soccer (13-5-0) defeated Cornell (13-4-2) 1-0 in…

4 hours ago

A chat with the Pitt Volleyball icon Cat Flood

On this episode of “The Pitt News Sports Podcast,” assistant sports editor Matthew Scabilloni talks…

1 day ago

Meaning at the Movies | My Old Heart & “My Old Ass”

In this edition of “Meaning at the Movies,” staff writer Lauren Deaton explores how the…

1 day ago

A Good Hill to Die On // What I Am Really Thankful For

This edition of “A Good Hill to Die On” confronts rising pressures even with the…

1 day ago

Don’t Be a Stranger | Tiny Beautiful Things

In this edition of Don’t Be a Stranger, staff writer Sophia Viggiano discusses the parts…

1 day ago

Students gear up, get excited for Thanksgiving break plans 

From hosting a “kiki” to relaxing in rural Indiana, students share a wide scope of…

3 days ago