Ransomware Shutting Down UK Hospitals and 75k Computers World Wide is NSA Software

Andrew Anglin
Daily Stormer
May 12, 2017

As you may have probably recently heard, a bunch of computers got shut down.

They’re being held with “ransomware,” which is software that locks your computer completely by encrypting the data until you pay to have it opened back up with a decryption code.

This is why digitalizing your infrastructure to save a few pennies is retarded. Our good friend weev wrote a very good article about this topic when the CIA Vault 7 leaks happened.

RT:

Hospitals across Britain have been hit by a large-scale cyberattack. Some are having to divert emergency patients, with doctors reporting messages demanding money.

National Health Service (NHS) hospitals across the country were hit by a bug spreading through their IT systems. Doctors have been posting on Twitter about what has been happening.

NHS Digital which has responsibility for IT systems says the attack is not believed to have been a targeted one. It has named the malware ‘Wanna Decryptor’ as the likely cause of the problem, but insists there is no evidence that patient data has been accessed.

Prime Minister Theresa May is being kept informed on the situation, a spokesperson for her office told Reuters, while health minister Jeremy Hunt has been briefed by cyber security officials.

A screengrab of an instant message conversation circulated by one doctor says: “So our hospital is down … We got a message saying your computers are now under their control and pay a certain amount of money. And now everything is gone.”

A second doctor tweeted: “Massive NHS hack cyber attack today. Hospital in shut down. Thanks for delaying emergency patient care & endangering lives. Assholes.

Hey, the government bureaucrats who digitized your hospitals are the ones who endangered lives.

These hackers are just making a buck off of Western decadence and idiocy.

Sky News reported that sources inside the department of health had described the attack as “unexpected, but not unprecedented.”

Services affected are thought to include picture archiving communication systems for x-ray images, pathology test results, phone and bleep systems and patient administration systems, the Telegraph reports.

Why would you put any of those things on the internet, unless you were stupid?

At least that tweeter put the :joy: emoji at the end of that tweet.

I wish more people would note how funny this is instead of signaling moral outrage.

Of the things I am bored of (and there are a whole lot), the signaling of moral outrage is the thing I am most bored of.

“At approximately 12:30pm we experienced a problem with our email servers crashing. Following this a lot of our clinical systems and patient systems were reported to have gone down,” an NHS IT worker said in a message to a Guardian reporter.

“A bitcoin pop-up message had been introduced onto the network asking users to pay $300 to be able to access their PCs. You cannot get past this screen.

“This followed with an internal major incident being declared and advised all staff to shut down all PCs in the trust and await further instructions.”

There are reports of messages on computers saying: “Oops. Your files have been encrypted,” and demands for bitcoin to be paid.

The attackers are allegedly demanding $300-worth (£232) of the digital currency bitcoin, otherwise the files will be deleted. It gives a deadline of May 19 to pay.

Not an outrageous amount, tbh.

Same price as two of these worthless items.

These dudes are modest and clearly of simple means.

A screenshot obtained by the Health Service Journal (HSJ) purported to show the pop-up that appeared on at least one of the computers affected.

It said: “Your important files are encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time.

“Nobody can recover your files without our decryption service.”

The hospitals are what the media is focusing on, but these guys hit 75,000 computers worldwide.

And counting.

It’s only incidental that the hospitals were hit. Well, not incidental. It’s apparently because they have very lax security.

Yall niggas got took.

RT:

An increase in activity of the malware was noticed starting from 8am CET (07:00 GMT) Friday, security software company Avast reported, adding that it “quickly escalated into a massive spreading.”

In a matter of hours, over 75,000 attacks have been detected worldwide, the company said.

Dozens of countries around the globe have been affected, with the number of victims still growing, according to the Russian multinational cybersecurity and anti-virus provider, the Kaspersky Lab.

Britain and Spain are among the first nations who have officially recognized the attack. In Spain, apart from the telecommunications giant, Telefonica, a large number of other companies has been infected with the malicious software, Reuters reported.

Who knows what kinda crap is going to get shut down. I’m sure people will die as a result.

BUT – it isn’t the fault of the hackers.

Someone was going to do this eventually on a massive scale, and everyone knew that. They digitized critical systems and put them on the internet anyway.

But wait – you’ve yet to hear the funnest part of all.

Washington Post:

Malicious software that blocks access to computers is spreading swiftly across the world, snarling critical systems in hospitals, telecommunications and corporate offices with the help of a software vulnerability originally discovered by the National Security Agency.

Cybersecurity experts said the malicious software works by exploiting a flaw in Microsoft software that was described in NSA documents stolen from the agency and leaked publicly in April by a criminal group called Shadow Brokers.

Microsoft released a “critical” patch fixing the flaw in March, before the NSA documents were publicly released, but the patch was apparently applied inconsistently, with many computers continuing to be unprotected.

The NSA did not respond to requests for comment.

So-called “phishing” attacks are delivering the malicious software by tricking email recipients to open misleading links that take over computers. Such attacks have become increasingly common in recent years because they are simple to execute and lucrative for attackers.

But the speed and scale of the spread of the malicious software startled experts.

“It’s one of the first times we’ve seen a large international global campaign,” said Chris Camacho, chief strategy officer for Flashpoint, a cyber-intelligence company.

This ransomware program has hit companies including FedEx and the Spanish telecommunications giant Telefonica.

The ransomware, once opened by a single user on a computer network, is able to spread to many other machines on that network, vastly expanding the reach of the attack.

The program is called Wanna Decrypt0r 2.0 and appears to support 28 different languages, underscoring the global ambitions of its creators

The WannaCry ransom note also says, dryly: “Don’t worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users.”

It’s going to end up with a lot more than 75k infected, and there isn’t going to be any “antidote” for it. People are going to have to pay, or format their computers.

Microsoft says now that they’ve fixed it. But, they had already fixed it. These computers getting infected were not updated, or were on an open network with a computer that was not updated.

The point is: these things cannot be avoided, and at this point, it would be extremely difficult for the West to roll back the digital “improvements” on our infrastructure.

This is one place where, in the case of a World War, Russia has a massive advantage. They thought ahead and didn’t digitize their infrastructure.

The original Battlestar Galactica came out in the 70s. So no one really has any excuse for having done this.

They were warned.