Stolen NSA Tool EternalBlue used again

NSA EternalBlue Current Event

Lancez-Vous. C'est gratuit
ou s'inscrire avec votre adresse e-mail
Stolen NSA Tool EternalBlue used again par Mind Map: Stolen NSA Tool EternalBlue used again

1. Sources

1.1. Hackers reportedly used a tool developed by the NSA to attack Baltimore’s computer systems

1.2. N.S.A. Denies Its Cyberweapon Was Used in Baltimore Attack, Congressman Says

1.3. https://wapo.st/2qWwX6y

1.4. One Year After WannaCry, EternalBlue Exploit Is Bigger Than Ever

2. Overall cost in damages for all EternalBlue attacks

2.1. More than $8 billion dollars to corporations and governments around the world

3. Eternal Blue Background

3.1. NSA kept vulnerability quiet since 2012 until it was stolen

3.1.1. SMB Protocol Vulnerability

3.2. Stolen and released online May 2017 by 'Shadow Brokers'

3.2.1. Microsoft released a patch to fix the exploit the next day

3.3. Involved in Nonpetya and Wannacry

4. Used Again! Baltimore's Computer Systems hacked

4.1. Disruption of government email, water bills, home purchasing, and more

4.2. Attack Date - May 7th 2019

4.3. NSA Denies it was EternalBlue, Independent investigators find evidence of EternalBlue

5. NSA Ethics

5.1. Honesty vs Public Image

5.2. National Security vs Potential Public Harm