Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Hackers use NSA malware EternalBlue to disrupt services of local U.S governments


The government of Baltimore city is busy tackling a ransomware infection that started May 7th shutting down the city's e-mail system along with other servers which let inhabitants to purchase homes, make payment of water bills as well as avail other services. The New York Times reports that the malware, which is responsible for Baltimore's debacle, is EternalBlue a creation of National Security Agency (NSA) that was deployed within other sophisticated cyber assaults.


In the words of security experts, during hacking attacks, cyber-criminals would utilize EternalBlue for exploiting vulnerability within some particular editions of Vista and Windows XP of Microsoft systems, letting someone from outside issue remote instructions to his target. www.theverge.com posted this, May 27, 2019.


Security experts further said that one major component of EternalBlue, which hackers employed during the assault, was designed with public's tax money at NSA situated close to Baltimore-Washington Parkway.


From 2017, the period NSA could no longer control its EternalBlue tool, state hackers picked it up within Russia, North Korea, while of late, China for wreaking havoc globally and damaging billions of USDs.


According to security specialists, currently the EternalBlue attacks are at their peak when attackers are using it against vulnerable cities and towns of America such as Texas to Pennsylvania, crippling works of local governments while escalating costs.


There hasn't been any earlier report of the Agency's association with the EternalBlue assaults aimed at American cities, partly since NSA wouldn't discuss else even admit it lost its online weapon, leaked on the Web during April 2017 thanks to Shadow Brokers a group whose origin is still not identified. The value of EternalBlue was extremely high so much so that erstwhile NSA employees stated that Microsoft was even not alerted of the security flaws. The agency kept the tool with it for over 5-yrs prior to the hack forcibly breaking in. www.straitstimes.com posted this, May 26, 2019.


It appears as if hackers have discovered an easy target in local American governments of Allentown, Baltimore, San Antonio, Pennsylvania along with others where public staff handle disordered networks which many a times have outdated software in place.


» SPAMfighter News - 5/30/2019

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page