-
Advertorial
-
FOCUS
-
Guide
-
Lifestyle
-
Tech and Vogue
-
TechandScience
-
CHTF Special
-
Nanhan
-
Futian Today
-
Hit Bravo
-
Special Report
-
Junior Journalist Program
-
World Economy
-
Opinion
-
Diversions
-
Hotels
-
Movies
-
People
-
Person of the week
-
Weekend
-
Photo Highlights
-
Currency Focus
-
Kaleidoscope
-
Tech and Science
-
News Picks
-
Yes Teens
-
Fun
-
Budding Writers
-
Campus
-
Glamour
-
News
-
Digital Paper
-
Food drink
-
Majors_Forum
-
Speak Shenzhen
-
Business_Markets
-
Shopping
-
Travel
-
Restaurants
-
Hotels
-
Investment
-
Yearend Review
-
In depth
-
Leisure Highlights
-
Sports
-
World
-
QINGDAO TODAY
-
Entertainment
-
Business
-
Markets
-
Culture
-
China
-
Shenzhen
-
Important news
在线翻译:
szdaily -> World
Hacking group claims it has data on nuke programs
    2017-May-18  08:53    Shenzhen Daily

THE hacking group that leaked the bugs that enabled last week’s global ransomware attack is threatening to make public even more computer vulnerabilities in the coming weeks — potentially including “compromised network data” pertaining to the nuclear or missile programs, as well as vulnerabilities affecting Windows 10, which is run by millions of computers worldwide.

A spokesperson for the group, which calls itself the Shadow Brokers, claimed in a blog post Tuesday that some of those computer bugs may be released on a monthly basis as part of a new subscription-based business model that attempts to mimic what has proved successful for companies such as Spotify, Netflix, Blue Apron and many more.

The move shows the growing commercial sophistication of groups such as the Shadow Brokers, which already has demonstrated a fearsome technical ability to compromise the world’s top intelligence agencies. And it underscores the way much of the underground trade for computer bugs resembles a real-world commercial market.

Security experts have been analyzing the blog post for clues about the Shadow Brokers’ intentions and capabilities.

Marcy Wheeler, a longtime independent researcher, said in a blog post Tuesday that the Shadow Brokers’ post “brings the hammer” down both on Microsoft, whose products could be affected by any further leaks, and the U.S. National Security Agency, whose information the Shadow Brokers leaked in April. That leak led indirectly to the creation of WannaCry and the subsequent crisis, security experts say.

“Simply by threatening another leak after leaking two sets of Microsoft exploits, Shadow Brokers will ratchet up the hostility between Microsoft and the government,” Wheeler wrote.

Microsoft didn’t immediately respond to a request for comment. On Sunday, the company criticized the NSA for stockpiling digital weapons. The tech industry opposes efforts by the government to weaken the security of its products, while national security advocates say it could help combat terrorism.

Although experts say the Shadow Brokers do not appear to have been directly involved in the WannaCry attack, leaking the exploit in the first place was a major step toward facilitating the cyberattack.

The group’s claim that it possesses information on the nuclear programs of governments is extremely worrisome, said Joseph Lorenzo Hall, chief technologist for the Center for Democracy and Technology, a Washington think tank. (SD-Agencies)

深圳报业集团版权所有, 未经授权禁止复制; Copyright 2010, All Rights Reserved.
Shenzhen Daily E-mail:szdaily@szszd.com.cn