{"id":123153,"date":"2019-05-26T06:28:18","date_gmt":"2019-05-26T10:28:18","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=123153"},"modified":"2019-05-26T07:09:28","modified_gmt":"2019-05-26T11:09:28","slug":"cybercrime-wave-unstoppable-cities-and-corporations-across-america-being-cyberattacked-into-communication-paralysis","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=123153","title":{"rendered":"Cybercrime Wave &#8216;Unstoppable&#8217; by Design: Cities and Corporations Across America Being Cyberattacked into Communication Paralysis"},"content":{"rendered":"<h1 style=\"text-align: center;\"><strong>Who&#8217;s doing it and why?<\/strong><\/h1>\n<div id=\"attachment_80796\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/05\/cyberattack_750xx5512-3101-0-223.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-80796\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/05\/cyberattack_750xx5512-3101-0-223.jpg\" alt=\"\" width=\"750\" height=\"421\" class=\"size-full wp-image-80796\" \/><\/a><p id=\"caption-attachment-80796\" class=\"wp-caption-text\">Hackers reportedly launched a cyberattack on Baltimore with a leaked NSA tool<\/p><\/div>\n<p><!--more--><strong><a href=\"https:\/\/stateofthenation2012.com\/?p=123153\">SOTN Editor&#8217;s Note:<\/a><\/strong> There&#8217;s a HUGE war going on under the radar that&#8217;s potentially as dangerous and destructive as any on the planet.<\/p>\n<p><em>Deep State<\/em> agents, foreign intelligence agencies and contracted cybercriminals both foreign and domestic are working in concert to terrorize cities and corporations across the USA.<\/p>\n<p>The pattern of criminal cyberattacks indicates a variety of motives which make this crime spree more difficult to solve.  However, that only means that this type of cyber-warfare is being used more frequently and with greater effect.<\/p>\n<p>That Baltimore, Maryland has been successfully targeted for nearly 3 weeks demonstrates the high degree of proficiency of these mercenary cyber-criminals.  It also shows how close to the nation&#8217;s capital the perps are willing to go. See: <a href=\"https:\/\/stateofthenation2012.com\/?p=123035\">Here\u2019s how cyber-weaponry has literally shut down a major American city<\/a><\/p>\n<p>This burgeoning cybercrime wave is actually a highly complex conspiracy with multiple state actors (not Russia) that requires a dedicated expos\u00e9 which is forthcoming.  In the meantime, what follows is the MSM spin from the ever-prevaricating NYT.<\/p>\n<p><a href=\"https:\/\/stateofthenation2012.com\/?p=123153\">State of the Nation<\/a><br \/>\nMay 26, 2019<\/p>\n<hr \/>\n<header class=\"css-1n5gntz e12qa4dv1\"><\/header>\n<section class=\"meteredContent css-1i2y565\">\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<h1>In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc<\/h1>\n<div id=\"attachment_123154\" style=\"width: 871px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-6.27.51-AM.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-123154\" class=\"size-full wp-image-123154\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-6.27.51-AM.png\" alt=\"\" width=\"861\" height=\"573\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-6.27.51-AM.png 861w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-6.27.51-AM-300x200.png 300w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-6.27.51-AM-768x511.png 768w\" sizes=\"auto, (max-width: 861px) 100vw, 861px\" \/><\/a><p id=\"caption-attachment-123154\" class=\"wp-caption-text\">The National Security Agency headquarters in Maryland. A leaked N.S.A. cyberweapon, EternalBlue, has caused billions of dollars in damage worldwide. A recent attack took place in Baltimore, the agency\u2019s own backyard.CreditCreditJim Lo Scalzo\/EPA, via REX, via Shutterstock<\/p><\/div>\n<p>By Nicole Perlroth and Scott Shane<br \/>\nThe New York Times<\/p>\n<p>For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.<\/p>\n<p class=\"css-18icg9x evys1bk0\">But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.<\/p>\n<p class=\"css-18icg9x evys1bk0\">Since 2017, when <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.nytimes.com\/2017\/11\/12\/us\/nsa-shadow-brokers.html?module=inline\">the N.S.A. lost control of the tool<\/a>, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.\u2019s own backyard.<\/p>\n<p class=\"css-18icg9x evys1bk0\">It is not just in Baltimore. Security experts say EternalBlue attacks <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.welivesecurity.com\/2019\/05\/17\/eternalblue-new-heights-wannacryptor\/\" target=\"_blank\" rel=\"noopener noreferrer\">have reached a high<\/a>, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.<\/p>\n<p class=\"css-18icg9x evys1bk0\">The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.nytimes.com\/2019\/03\/28\/us\/politics\/hal-martin-nsa-guilty-plea.html?module=inline\">the Shadow Brokers<\/a>. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">Thomas Rid, a cybersecurity expert at Johns Hopkins University, called the Shadow Brokers episode \u201cthe most destructive and costly N.S.A. breach in history,\u201d more damaging than the better-known leak in 2013 from Edward Snowden, the former N.S.A. contractor.<\/p>\n<p class=\"css-18icg9x evys1bk0\">\u201cThe government has refused to take responsibility, or even to answer the most basic questions,\u201d Mr. Rid said. \u201cCongressional oversight appears to be failing. The American people deserve an answer.\u201d<\/p>\n<p class=\"css-18icg9x evys1bk0\">The N.S.A. and F.B.I. declined to comment.<\/p>\n<p class=\"css-18icg9x evys1bk0\">Since that leak, foreign intelligence agencies and rogue actors have used EternalBlue to spread malware that has paralyzed hospitals, airports, rail and shipping operators, A.T.M.s and factories that produce critical vaccines. Now the tool is hitting the United States where it is most vulnerable, in local governments with aging digital infrastructure and fewer resources to defend themselves.<\/p>\n<h5><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-7.00.28-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-123164\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-7.00.28-AM.png\" alt=\"\" width=\"660\" height=\"393\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-7.00.28-AM.png 660w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-26-at-7.00.28-AM-300x179.png 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><span class=\"css-8i9d0s e13ogyst0\">On May 7, city workers in Baltimore had their computers frozen by hackers. Officials have refused to pay the $100,000 ransom.<\/span><\/h5>\n<p class=\"css-18icg9x evys1bk0\">Before it leaked, EternalBlue was one of the most useful exploits in the N.S.A.\u2019s cyberarsenal. According to three former N.S.A. operators who spoke on the condition of anonymity, analysts spent almost a year finding a flaw in Microsoft\u2019s software and writing the code to target it. Initially, they referred to it as EternalBluescreen because it often crashed computers \u2014 a risk that could tip off their targets. But it went on to become a reliable tool used in countless intelligence-gathering and counterterrorism missions.<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">EternalBlue was so valuable, former N.S.A. employees said, that the agency never seriously considered alerting Microsoft about the vulnerabilities, and held on to it for more than five years before the breach forced its hand.<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">The <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.nytimes.com\/2019\/05\/22\/us\/baltimore-ransomware.html?module=inline\">Baltimore attack<\/a>, on May 7, was a <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.nytimes.com\/2018\/03\/29\/us\/atlanta-cyberattack-ransom.html?module=inline\">classic ransomware<\/a> assault. City workers\u2019 screens suddenly locked, and a message in flawed English demanded about $100,000 in Bitcoin to free their files: \u201cWe\u2019ve watching you for days,\u201d said the message, <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.baltimoresun.com\/news\/maryland\/politics\/bs-md-ci-it-outage-20190507-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">obtained by The Baltimore Sun<\/a>. \u201cWe won\u2019t talk more, all we know is MONEY! Hurry up!\u201d<\/p>\n<p class=\"css-18icg9x evys1bk0\">Today, Baltimore remains handicapped as city officials refuse to pay, though workarounds have restored some services. Without EternalBlue, the damage would not have been so vast, experts said. The tool exploits a vulnerability in unpatched software that allows hackers to spread their malware faster and farther than they otherwise could.<\/p>\n<p class=\"css-18icg9x evys1bk0\">North Korea was the first nation to co-opt the tool, for an attack in 2017 \u2014 called WannaCry \u2014 that paralyzed the British health care system, German railroads and some 200,000 organizations around the world. Next was Russia, which used the weapon in an attack \u2014 called NotPetya \u2014 that was aimed at Ukraine but spread across major companies doing business in the country. The assault cost FedEx more than $400 million and Merck, the pharmaceutical giant, $670 million.<\/p>\n<p class=\"css-18icg9x evys1bk0\">The damage didn\u2019t stop there. In the past year, the same Russian hackers who targeted the 2016 American presidential election used EternalBlue to compromise hotel Wi-Fi networks. Iranian hackers have used it to spread ransomware and hack airlines in the Middle East, according to researchers at the security firms Symantec and FireEye.<\/p>\n<p class=\"css-18icg9x evys1bk0\">\u201cIt\u2019s incredible that a tool which was used by intelligence services is now publicly available and so widely used,\u201d said Vikram Thakur, Symantec\u2019s director of security response.<\/p>\n<\/div>\n<aside class=\"css-o6xoe7\"><\/aside>\n<\/div>\n<div class=\"css-190ncxp\"><\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">One month before the Shadow Brokers began dumping the agency\u2019s tools online in 2017, the N.S.A. \u2014 aware of the breach \u2014 reached out to Microsoft and other tech companies to inform them of their software flaws. Microsoft released a patch, but hundreds of thousands of computers worldwide remain unprotected.<\/p>\n<p class=\"css-18icg9x evys1bk0\">Hackers seem to have found a sweet spot in Baltimore, Allentown, Pa., San Antonio and other local, American governments, where public employees oversee tangled networks that often use out-of-date software. Last July, the <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-201A\" target=\"_blank\" rel=\"noopener noreferrer\">Department of Homeland Security issued a dire warning<\/a> that state and local governments were getting hit by particularly destructive malware that now, security researchers say, has started relying on EternalBlue to spread.<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">Microsoft, which tracks the use of EternalBlue, would not name the cities and towns affected, citing customer privacy. But other experts briefed on the attacks in Baltimore, Allentown and San Antonio confirmed the hackers used EternalBlue. Security responders said they were seeing EternalBlue pop up in attacks almost every day.<\/p>\n<p class=\"css-18icg9x evys1bk0\">Amit Serper, head of security research at Cybereason, said his firm had responded to EternalBlue attacks at three different American universities, and found vulnerable servers in major cities like Dallas, Los Angeles and New York.<\/p>\n<p class=\"css-18icg9x evys1bk0\">The costs can be hard for local governments to bear. The Allentown attack, in February last year, disrupted city services for weeks and cost about $1 million to remedy \u2014 plus another $420,000 a year for new defenses, said Matthew Leibert, the city\u2019s chief information officer.<\/p>\n<p class=\"css-18icg9x evys1bk0\">He described the package of dangerous computer code that hit Allentown as \u201ccommodity malware,\u201d sold on the dark web and used by criminals who don\u2019t have specific targets in mind. \u201cThere are warehouses of kids overseas firing off phishing emails,\u201d Mr. Leibert said, like thugs shooting military-grade weapons at random targets.<\/p>\n<p class=\"css-18icg9x evys1bk0\">The malware that hit San Antonio last September infected a computer inside Bexar County sheriff\u2019s office and tried to spread across the network using EternalBlue, according to two people briefed on the attack.<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">This past week, researchers at the security firm Palo Alto Networks discovered that a Chinese state group, Emissary Panda, had hacked into Middle Eastern governments using EternalBlue.<\/p>\n<p class=\"css-18icg9x evys1bk0\">\u201cYou can\u2019t hope that once the initial wave of attacks is over, it will go away,\u201d said Jen Miller-Osborn, a deputy director of threat intelligence at Palo Alto Networks. \u201cWe expect EternalBlue will be used almost forever, because if attackers find a system that isn\u2019t patched, it is so useful.\u201d<\/p>\n<p class=\"css-18icg9x evys1bk0\">Until a decade or so ago, the most powerful cyberweapons belonged almost exclusively to intelligence agencies \u2014 N.S.A. officials used the term \u201cNOBUS,\u201d for \u201cnobody but us,\u201d for vulnerabilities only the agency had the sophistication to exploit. But that advantage has hugely eroded, not only because of the leaks, but because anyone can grab a cyberweapon\u2019s code once it\u2019s used in the wild.<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">Some F.B.I. and Homeland Security officials, speaking privately, said more accountability at the N.S.A. was needed. A former F.B.I. official likened the situation to a government failing to lock up a warehouse of automatic weapons.<\/p>\n<p class=\"css-18icg9x evys1bk0\">In an interview in March, Adm. Michael S. Rogers, who was director of the N.S.A. during the Shadow Brokers leak, suggested in unusually candid remarks that the agency should not be blamed for the long trail of damage.<\/p>\n<p class=\"css-18icg9x evys1bk0\">\u201cIf Toyota makes pickup trucks and someone takes a pickup truck, welds an explosive device onto the front, crashes it through a perimeter and into a crowd of people, is that Toyota\u2019s responsibility?\u201d he asked. \u201cThe N.S.A. wrote an exploit that was never designed to do what was done.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"css-1fanzo5 StoryBodyCompanionColumn\">\n<div class=\"css-53u6y8\">\n<p class=\"css-18icg9x evys1bk0\">At Microsoft\u2019s headquarters in Redmond, Wash., where thousands of security engineers have found themselves on the front lines of these attacks, executives reject that analogy.<\/p>\n<p class=\"css-18icg9x evys1bk0\">\u201cI disagree completely,\u201d said Tom Burt, the corporate vice president of consumer trust, insisting that cyberweapons could not be compared to pickup trucks. \u201cThese exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They\u2019re inherently dangerous. When someone takes that, they\u2019re not strapping a bomb to it. It\u2019s already a bomb.\u201d<\/p>\n<p class=\"css-18icg9x evys1bk0\">Brad Smith, Microsoft\u2019s president, has called for a <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2017\/02\/14\/need-digital-geneva-convention\/#sm.0001gnysbhjsod01z7q11hvz0xg2d\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cDigital Geneva Convention\u201d<\/a> to govern cyberspace, including a pledge by governments to report vulnerabilities to vendors, rather than keeping them secret to exploit for espionage or attacks.<\/p>\n<p class=\"css-18icg9x evys1bk0\">Last year, Microsoft, along with Google and Facebook, joined 50 countries in signing on to a similar call by French President Emmanuel Macron \u2014 the Paris Call for Trust and Security in Cyberspace \u2014 to end \u201cmalicious cyber activities in peacetime.\u201d<\/p>\n<p class=\"css-18icg9x evys1bk0\">Notably absent from the signatories were the world\u2019s most aggressive cyberactors: China, Iran, Israel, North Korea, Russia \u2014 and the United States.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<p><!--more--><\/p>\n<div class=\"bottom-of-article\">\n<div class=\"css-vdv0al\">A version of this article appears in print on <time class=\"css-10rvbm3\" datetime=\"2019-05-26T04:00:00.000Z\">May 26, 2019<\/time>, on Page A1 of the New York edition with the headline: Cities Hijacked By Tool Stolen From the N.S.A.<\/div>\n<\/div>\n<p>___<br \/>\n<a href=\"https:\/\/www.nytimes.com\/2019\/05\/25\/us\/nsa-hacking-tool-baltimore.html\">https:\/\/www.nytimes.com\/2019\/05\/25\/us\/nsa-hacking-tool-baltimore.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who&#8217;s doing it and why?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-123153","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/123153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=123153"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/123153\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=123153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=123153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=123153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}