Andrew Anglin
Daily Stormer
June 27, 2017
Because I hate everything and enjoy chaos and destruction, I find these ransomware situations very funny.
The fact that they are using software designed by the NSA just makes it quadruple funny.
This is almost certainly worse than WannaCry.
Maybe they should call it “WannaSlitMyWrists.”
Computer systems from Russia to the United States were victims of an international cyberattack on Tuesday in a hacking that bore similarities to a recent one that crippled tens of thousands of machines worldwide.
The first thing that every journalist learns is that the lede is by far the most important sentence in any news article. As a journalist myself, I just want to note how shitty this NYT lede is.
“From Russia to the United States” is a horrible way of saying “across the globe.”
This is happening in the southern hemisphere as well.
“Computer systems … were victims” is also horrible.
The rest of it is also ungood.
I just want you to understand that the New York Times isn’t only full of lies, it is also poorly written. And pretentious.
Because journalism is now the most corrupt industry on the planet – more so in fact than taxi driving or drug-dealing – talented people tend to avoid it. Corruption and talent generally only exist simultaneously in Jews, given that talent is usually linked to a certain level of self-respect.
The only practical use of NYT is an article like this one, where they have done a more comprehensive job than the AP or Reuters of compiling publicly available facts and statements from public individuals (as opposed to “anonymous sources”).
They have to be doing something right, in order to maintain some tiny bit of credibility, and the “compiling of facts on a happening” is the place where they continue to do something right.
As reports of the attack spread quickly, the Ukrainian government said that several of its ministries, radiation monitoring at the Chernobyl nuclear facility, local banks and metro systems had been affected. A number of companies — including the Danish shipping giant Maersk; Rosneft, the Russian energy giant; Saint-Gobain, the French construction materials company; and WPP, the British advertising agency — also said they had been targeted.
And in the first confirmed cases in the United States, Merck, the drug giant, confirmed that its global computer networks had been hit, as did DLA Piper, the multinational law firm.
It remains unclear who is behind this most recent cyberattack. Like the previous WannaCry attacks in May, Tuesday’s hack takes over computers and demands digital ransom to regain control.
“We are urgently responding to reports of another major ransomware attack on businesses in Europe,” Rob Wainwright, executive director of Europol, Europe’s police agency, said on Twitter.
And it’s the same situation.
How do you respond to something to which there is no response?
This is one guy, and it is impossible to catch him.
Computer experts were calling the computer virus “Petya,” and said that it was similar to the WannaCry attack that spread quickly across much of Asia and Europe. Others cautioned, however, that it could be yet another type of ransomware.
“Petya” is a stupid name.
Especially after “WannaCry” was such a great name.
At least nine European countries had been targeted in the latest attack, said Dan Smith, an information security researcher at Radware, a cybersecurity firm. “I first saw reports of this attack around 8 a.m. Eastern time coming from Ukraine, but it’s too early to tell who’s behind this,” Mr. Smith said.
Researchers at the computer security company Symantec said the new attack is using the same hacking tool created by the National Security Agency that was used in the WannaCry attacks. Called “Eternal Blue,” the tool was among dozens leaked online last April by a group known as the Shadow Brokers.
Again – this is brutally funny.
The vulnerability used by Eternal Blue was patched by Microsoft last April, but as the WannaCry attacks demonstrated, hundreds of thousands of organizations around the world failed to properly install the patch. But researchers at F-Secure, the Finnish cybersecurity firm, also noted that the ransomware used at least two other vectors to spread, beyond Eternal Blue, which suggests even those who implemented the Microsoft patch could be vulnerable.
Immediate reports that the computer virus was a variant of Petya, suggest the attackers will be hard to trace. Petya was for sale on the so-called dark web, where its creators made the ransomware available as “ransomware as a service” — a play on Silicon Valley term for delivering software over the internet, according to the security firm Avast Threat Labs.
That means anyone can launch the ransomware, with the click of a button, encrypt someone’s systems and demand a ransom to unlock it. If the victim pays, the authors of the Petya ransomware, who call themselves “Janus Cybercrime Solutions,” get a cut of the payment.
That distribution model means that pinning down the individuals responsible for Tuesday’s attack could be difficult, if near impossible.
Or if just “impossible.”
Without the “near” qualifier.
The attack is actually “an improved and more lethal version of WannaCry” according to Matthieu Suiche, a security researcher who helped contain the spread of the WannaCry ransomware last month when he created a “kill switch” that stopped the attacks from spreading.
The NSA part is so funny because of the context.
Boomers order this stuff built by millennials. And you have to think that the millennials building it know that this is going to happen – if you are smart enough to design this type of software, you are smart enough to know that you cannot keep exclusive ownership of it. It is used on the internet, meaning it is on the internet, meaning someone can get it from the internet.
The whole concept of “action=consequence” has always been a difficult one for boomers to grasp.
What you need to know about today's global #cyberattack https://t.co/yddR7UCysa pic.twitter.com/mzJ7cqdzrQ
— Kaspersky Lab (@kaspersky) June 27, 2017
Cyber warfare is really not a very good form of warfare, in that you end up hurting yourself at least as bad as your enemies. If your enemy is Russia, you are guaranteed to hurt yourself worse than your enemies, given that Russia doesn’t have this “suicidal efficiency” methodology hardwired into their national zeitgeist, and so skipped digitizing their entire infrastructure to save a few cents.
Our lad weev wrote an article about this after the Vault 7 dump, which is well worth reading now if you missed it.
Very few people are noting the absurdity of all of this in normal English.
We’re glad to help.