Global ransomware attack used info stolen from NSA, says Microsoft

The head of Microsoft has called on governments to stop stockpiling software vulnerabilities, after claiming that Friday’s global cyber-attack exploited information stolen from the US National Security Agency.
The ‘WannaCrypt’ cyber-attack (from the software’s name Wanna Decryptor, and also known as WannaCry) is estimated to have hit some 200,000 organisations in at least 150 countries. In the UK’s National Health Service, which was particularly badly hit, at least 47 organisations were affected.
Security experts have speculated that the ransomware, which works by exploiting a vulnerability in older versions of Windows, came from a cache of hacking tools allegedly stolen from the NSA by hacker group Shadow Brokers.
The malware is believed to make use of an NSA hacking tool called Eternal Blue that makes it easier to invade older Windows machines.
In a blog posted on Sunday, Microsoft president Brad Smith said “the WannaCrypt exploits [sic] used in the attack were drawn from the exploits stolen from the National Security Agency” and called on governments to treat the attack as a “wake-up call”.
“This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,” he said. “This is an emerging pattern in 2017.
“We have seen vulnerabilities stored by the CIA show up on WikiLeaks and now this vulnerability stolen from the NSA has affected customers around the world.
“Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen.”
Smith said governments need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world. “We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits,” he said.

Microsoft Headquarters, Redmond. A patch for the vulnerability was released 2 months ago on March 14th.
Microsoft released a security update to patch the vulnerability on March 14, a month before the theft of exploits from the NSA was publicly reported, Smith said.
The patch protected newer Windows systems and computers that had enabled Windows Update to apply it, but not older versions for which it no longer provides support. Over the weekend, Microsoft rolled out a patch for Windows XP, Windows Server 2003 and Windows 8.
Smith said that Microsoft proposed in February a new “Digital Geneva Convention” that would include a new requirement for governments to report software vulnerabilities to vendors, rather than stockpile, sell or exploit them.
“We should take from this recent attack a renewed determination for more urgent collective action,” he said. “We need the tech sector, customers and governments to work together to protect against cybersecurity attacks.”
For up to date government news and international best practice follow us on Twitter @globegov
See also:
New international centre to challenge state-led fake news and cyber attacks
Calls for further EU security action as new measures signed into law
Germany announces new cyber security unit in wake of terror attacks
Estonia seeks safe location abroad to protect citizens’ data from hackers
should begin Class-Action lawsuit against NSA for not divulging there nefarious secrets. There job is supposed to keep us safe, not to spy on us.