After the great attack of the WannaCry virus, last Friday (12), Keith Alexander, former director of the NSA (National Security Agency, USA) and former head of the Central Security Service, defended that the agencies should, yes , guard the security flaws found in the most diverse software – in this case, Windows – against terrorism. The ransomware virus, which hijacks files from computers and returns them only after payment of ransom in Bitcoins, has affected several companies and also public services and more than 100 countries.
What you need to know about the WannaCrypt ransomware
WannaCrypt demands payment of the equivalent of $ 300 in Bitcoins – Photo: Disclosure / Symantec
dnetc’s App: Get Tech Tips and News on Mobile
In the view of the former director of the NSA, the government agency must have tools to identify possible threats to the country and citizens. «We have to have tools. The NSA doesn’t accumulate exploits (security holes); they release more than 90% of what they discover, but to go after a terrorist you need an exploit,» Keith told TechCrunch during Disrupt NY 2017 in New York.
To go after a terrorist you need an exploit
This idea goes against what Microsoft thinks, the maker of the software that was targeted by hackers. Last Sunday (14), the company published a post on its blog stating that the government should stop saving information about security breaches after the WannaCry outbreak.
In defense of the NSA, Alexander says the WannaCry ransomware was not used by the United States. And, yes, stolen by cybercriminals who used the tool against public and private companies in several countries. The former director of the security agency still says that this type of problem is just beginning and will be just one of many that we will see in what he called «the year of ransomware».
I think this is just one of many that we are going to see. Many people said that this is the year of ransomware
Microsoft offers a patch that corrects security flaws exploited by ransomware. However, there are still other measures you can take to protect your data from malware of this nature. In addition to downloading the patch, installing security updates from Windows Update and using a good antivirus is essential.
Although WannaCry was «stopped» by a 22-year-old British boy, the virus is still a threat and many companies are still suffering the consequences of the attack. So far, the master key for decrypting data has not been found and many PCs remain infected.
WannaCrypt: has anyone paid bitcoins to return files blocked by ransomware? Check out the dnetc Forum.