<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          US EUROPE AFRICA ASIA 中文
          China / Across America

          Who's behind 'WannaCry' cyberattack?

          (China Daily USA) Updated: 2017-05-16 10:08

          Washington - Cyber security researchers have found technical evidence they said could link DPRK with the global WannaCry "ransomware" cyber attack that has infected more than 300,000 computers in 150 countries since Friday.

          Symantec and Kaspersky Lab said on Monday that some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a DPRK-run hacking operation.

          "This is the best clue we have seen to date as to the origins of WannaCry," Kaspersky Lab researcher Kurt Baumgartner told Reuters.

          Both firms said it was too early to tell whether DPRK was involved in the attacks, based on the evidence that was published on Twitter by Google security researcher Neel Mehta. The attacks, which slowed on Monday, are among the fastest-spreading extortion campaigns on record.

          In a blog post on Sunday, Microsoft Corp President Brad Smith confirmed what researchers already widely concluded: The attack made use of a hacking tool built by the US National Security Agency (NSA) that had leaked online in April.

          He poured fuel on a long-running debate over how government intelligence services should balance their desire to keep software flaws secret - in order to conduct espionage and cyber warfare - against sharing those flaws with technology companies to better secure the internet.

          On Monday, Trump homeland security adviser Tom Bossert sought to distance the NSA from any blame.

          "This was not a tool developed by the NSA to hold ransom data. This was a tool developed by culpable parties, potentially criminals or foreign nation-states, that were put together in such a way as to deliver phishing emails, put it into embedded documents, and cause infection, encryption and locking," Bossert said.

          Russian President Vladimir Putin, noting the technology's link to the US spy service, said it should be "discussed immediately on a serious political level."

          "Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators," he said.

          Regardless of the source of the attack, investors piled into cyber security stocks on Monday, betting that governments and corporations will spend more to upgrade their defenses.

          The perpetrators had raised less than $70,000 from users paying to regain access to their computers, Bossert said.

          "We are not aware if payments have led to any data recovery," Bossert said, adding that no US federal government systems had been affected.

          WannaCry demanded ransoms starting at $300, in line with many cyber extortion campaigns, which keep pricing low so more victims will pay.

          Still, some security experts said they were not sure if the motive of WannaCry was primarily to make money, noting that large cyber extortion campaigns typically generate millions of dollars of revenue.

          "I believe that this was spread for the purpose of causing as much damage as possible," said Matthew Hickey, a co-founder of British cyber consulting firm Hacker House.

          The economies most affected by WannaCry to date are Russia, Taiwan, Ukraine and India, according to security firm Avast.

          The number of infections has fallen dramatically since Friday's peak when more than 9,000 computers were being hit per hour.

          Authorities in Europe and the United States turned their attention to preventing hackers from spreading new versions of the virus.

          Reuters

          Highlights
          Hot Topics

          ...
          主站蜘蛛池模板: 福利一区二区1000| 亚洲欧洲一区二区福利片| 亚洲一区二区中文av| 欧产日产国产精品精品| 亚洲av无码精品蜜桃| 国产精品多p对白交换绿帽| 一区二区三区四区亚洲自拍| 欧美日韩国产图片区一区| 亚洲欧美另类久久久精品播放的| 中文无码妇乱子伦视频| 亚洲av日韩av一卡二卡| 国产欧美日韩精品丝袜高跟鞋| 国产成人一区二区三区免费| 99久久精品午夜一区二区| 在线欧美精品一区二区三区| 国产毛片子一区二区三区| 99在线视频免费观看| 国产99视频精品免费视频76| 无码人妻丰满熟妇啪啪网不卡 | 日本一区不卡高清更新二区| 日本午夜精品一区二区三区电影 | 亚洲成AV人片在线观看麦芽| 视频一区视频二区视频三| 亚洲欧美偷国产日韩| 少妇伦子伦情品无吗| 4hu四虎永久在线观看| 亚洲第一香蕉视频啪啪爽| 亚洲AV永久无码天堂网一线| 国产优质女主播在线观看| 国产永久免费高清在线观看| 18禁无遮挡羞羞污污污污网站| 久久精品国产亚洲av麻豆长发| 亚洲人成在线观看网站无码| 视频一区二区三区刚刚碰| 亚洲狠狠婷婷综合久久久| 亚洲码欧洲码一二三四五| 久久婷婷大香萑太香蕉av人| 日本一区二区三本视频在线观看| 国产999久久高清免费观看| 国产av剧情无码精品色午夜| 中文字幕国产精品专区|