A few weeks ago, in what was described as one of the "worst-ever
recorded attacks of its kind," the WannaCry ransomware virus spread the
globe at an alarming rate, seizing control of private networks and
demanding bitcoin payments to relinquish that control.
This has nothing to do with Russians, but is both an attack on any currency or gold that is NOT THE US DOLLAR, WITH THE DOUBLE WHAMMY OF LAYING THE WHOLE BLACK OP AT THE FEET OF RUSSIA, WHERE THERE IS NO PROOF.
There is plenty of Facefuck and China links.
For those who missed it, the WannaCry virus exploited a piece of NSA code known as "Eternal Blue" allowing it to automatically spread across large networks via a known bug in Microsoft's Windows operating system. It was thought to be among the most destructive viruses to hit global critical infrastructure in nearly a decade.
This has nothing to do with Russians, but is both an attack on any currency or gold that is NOT THE US DOLLAR, WITH THE DOUBLE WHAMMY OF LAYING THE WHOLE BLACK OP AT THE FEET OF RUSSIA, WHERE THERE IS NO PROOF.
There is plenty of Facefuck and China links.
New analysis suggests Chinese-speaking criminals may have been behind the WannaCry ransomware that affected thousands of organisations worldwide.
Researchers from Flashpoint looked at the language used in the ransom notice.
They said the use of proper grammar and punctuation in only the Chinese versions indicated the writer was "native or at least fluent" in Chinese.
The translated versions of the ransom notice appeared to be mostly "machine translated".
The WannaCry ransom note could be displayed in 28 different languages, but only the Chinese and English versions appeared to have been written by humans. That would be agency programmers out of Fort Dietrich and Langley VA.
The English text also used some unusual phrases such as: "But you have not so enough time".
For those who missed it, the WannaCry virus exploited a piece of NSA code known as "Eternal Blue" allowing it to automatically spread across large networks via a known bug in Microsoft's Windows operating system. It was thought to be among the most destructive viruses to hit global critical infrastructure in nearly a decade.
24 hours after it first emerged, it has been called the first global, coordinated ransomware attack using hacking tools developed by the NSA, crippling over a dozen hospitals across the UK, mass transit around Europe, car factories in France and the UK, universities in China, corporations in the US, banks in Russia and countless other mission-critical businesses and infrastructure.
According to experts, "this could be one of the worst-ever recorded attacks of its kind." The security researcher who tweets and blogs as MalwareTech told The Intercept, “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over 9 million computers in nearly 200 countries.
The fallout, according to cyber-specialists, has been "unprecedented": it has left unprepared governments, companies and security experts from China to the United Kingdom on Saturday reeling, and racing to contain the damage from the audacious cyberattack that spread quickly across the globe, raising fears that people would not be able to meet ransom demands before their data are destroyed.
The animated map below shows the speed and scale of the global infestation which took just a few hours to cover the globe: