Meet the 20
Two 20-something cyber experts helped bring down the widespread ransomware attack that infiltrated networks at hospitals, banks, and government agencies in multiple countries. A 22-year-old British researcher unintentionally found the so-called "kill switch" that authors of the malicious software left in the code. Later, he teamed up with a 28-year-old engineer in western Michigan to ultimately halt the infections, the Associated Press reported. The unprecedented outbreak, which began last Friday, locked up computers and extorted users for large Bitcoin payments in nations as diverse as the U.S., Russia, Ukraine, Brazil, Spain, and India. It also hit the U.K.'s National Health Service, affecting computers in hospitals and doctors' offices. Britain's National Cyber Security Center and others praised the 22-year-old researcher -- identified only as MalwareTech -- for killing the software, which reportedly blocked U.K. hospital schedules, patient files, and phone and email systems from access and rerouted emergency room patients. MalwareTech belongs to a large global community of cybersecurity buffs who, working independently or for security companies, constantly monitor for attacks and collaborate to stop them. It's fairly common for members to use aliases for privacy or to protect themselves from retaliatory attacks. The young researcher explained in a blog post on Saturday how he "accidentally" stopped the global cyberattack He said he returned from lunch with a friend on Friday and learned that a ransomeware attack had crippled Britain's health system. A fellow researcher called Kafeine soon gave him a sample of the malicious software. The malware, known as WannaCry or WannaCrypt, exploits a vulnerability in Microsoft Windows that was reportedly developed and used by the U.S. National Security Agency. Hackers in the group Shadow Brokers later leaked the exploit online. In his analysis, MalwareTech noticed a hidden, unregistered web address in the code. He quickly registered the inexpensive domain to see if it would help him track or stop the software. Meanwhile, across the pond in Michigan, Darien Huss was doing his own research. The engineer, who works for the cybersecurity firm Proofpoint, said he noticed the malware authors had included a kill switch. He took a screenshot of his finding and posted it on Twitter. Huss and MalwareTech were soon communicating about their findings. By registering the domain name and redirecting attacks to his server, MalwareTech had apparently activated the kill switch, which halted the ransomware's infections. The duo's actions may have saved companies and governments millions of dollars and slowed the outbreak before more U.S. computers were affected. Huss praised his partner in non-crime for the discovery and said the security industry as a whole "should be considered heroes," the AP reported. But he said he's worried the authors of the malware could release a new and improved version without a kill switch, or that copycats could unleash similar attacks. "I think it is concerning that we could definitely see a similar attack occur, maybe in the next 24 to 48 hours or maybe in the next week or two," Huss told the AP. "It could be very possible." Security experts said the perpetrators of this attack remain unknown. The malicious software was identified in more than 70 experts, though Russia was hit the hardest. European cybercrime experts are "working closely with affected countries' cybercrime units and key industry partners to mitigate the threat and assist victims," Europol, the European Union's police agency, said on Saturday in a statement. "The recent attack is at an unprecedented level and will require a complex international investigation to identify the culprits," Europol said. Associated Press contributed reporting to this story. TopicsCybersecurityWindowsTweet may have been deleted
Tweet may have been deleted
Featured Video For You
This self-proclaimed cyborg turned his prosthetic eye into a tiny camera
- 最近发表
-
- “大体老师”的故事:以生命点亮生命
- 雅安籍射击运动员蒲琪峰首次获得奥运参赛资格
- 稻田美景、潮玩文创,广东丝苗米评选火热进行中!
- 带领乡村学生探索未知!广东平安产险2023年支教行动启动
- Elon Musk's AI facility is reportedly operating gas turbines without a permit
- 到经开区和名山区:走雅乐连接线,省时又省钱
- 树上的“糖包子”快成熟啦!粤和兴邀世界共品梅州柚和“粤香柑”
- 雅康高速全线隧道开挖累计完成33%
- New Grok response directs users to Vote.gov for election questions
- 龙门乡白伙新村30亩荷塘开种
- 随机阅读
-
- 评论丨农事运动会:一场农民的盛会、新农人风采展现的盛会、城乡双向奔赴的盛会
- 聚焦营改增试点 助力供给侧改革
- 突出抓好换届风气监督 营造风清气正良好环境
- 广东26产品入选新一批全国名特优新农产品!快为你家乡好物投上一票
- The Wonderful World of Christmas Trees
- 到经开区和名山区:走雅乐连接线,省时又省钱
- 到经开区和名山区:走雅乐连接线,省时又省钱
- 石棉县公安局宣传安全知识 普及安全意识
- We Bought the Cheapest DDR5 RAM Modules We Could Find, Are They Any Good?
- 您对保险行业满意吗?
- 2400多株景观树发新芽 东城公园绿地绿意盎然
- 合力营造保险行业发展良好局面
- Ford can make your Mustang Mach
- 做到四个“进一步” 全力以赴做好今年防汛工作
- 献出一份爱 关注百岁人
- 突出抓好换届风气监督 营造风清气正良好环境
- Google is bringing AI summaries to ‘Files’ so you can find your docs quicker
- 升华理论知识 现场实训教学
- 千年古城,种业“芯”生!
- 结合宣传思想文化工作 把学习教育引向深入
- 搜索
-
- 友情链接
-