An Alert Researcher, Teamwork Helped Stem Huge Cyberattack - NBC Bay Area
National & International News
The day’s top national and international news

An Alert Researcher, Teamwork Helped Stem Huge Cyberattack

This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Russia, Ukraine, Brazil, Spain and India

    processing...

    NEWSLETTERS

    A cyberattack hit hospitals across the United Kingdom, forcing emergency rooms to temporarily shut down on Friday, May 12, 2017. British Prime Minister Theresa May said there was no evidence patient security had been compromised. (Published Friday, May 12, 2017)

    The cyberattack that spread malicious software around the world, shutting down networks at hospitals, banks and government agencies, was thwarted by a young British researcher and an inexpensive domain registration, with help from another 20-something security engineer in the U.S.

    Britain's National Cyber Security Center and others were hailing the cybersecurity researcher, a 22-year-old identified online as MalwareTech, who — unintentionally at first — discovered a so-called "kill switch" that halted the unprecedented outbreak.

    By then the "ransomware" attack had crippled Britain's hospital network and computer systems in several countries in an effort to extort money from computer users. But the researcher's actions may have saved companies and governments millions of dollars and slowed the outbreak before computers in the U.S. were more widely affected.

    Kurtis Baron of Fidus Information Security, a cyber security consultance, told NBC News that MalwareTech's name is Marcus Hutchins. Baron also said that he "doesn't doubt for a moment that Marcus, and people like him, will be getting ready to deal with a second attack."

    3 Dead in Maryland Shooting; Manhunt for Gunman Underway

    [NATL] 3 Dead in Maryland Shooting; Manhunt for Gunman Underway

    Authorities are searching for Radee Labeeb Prince, 37, who is on the run after he was suspected of shooting five employees of Advanced Granite Solutions at the Emmorton Business Park in Edgewood, Maryland. 

    (Published Wednesday, Oct. 18, 2017)

    Baron said, as others have including MalwareTech, we should be ready for for a second attack from the hackers on Monday.

    MalwareTech, who works for cybersecurity firm Kryptos Logic, is part of a large global cybersecurity community who are constantly watching for attacks and working together to stop or prevent them, often sharing information via Twitter. It's not uncommon for them to use aliases, either to protect themselves from retaliatory attacks or for privacy.

    In a blog post Saturday, MalwareTech explained he learned on Friday that networks across Britain's health system had been hit by ransomware, tipping him off that "this was something big."

    He began analyzing a sample of the malicious software and noticed its code included a hidden web address that wasn't registered. He said he "promptly" registered the domain, something he regularly does to try to discover ways to track or stop malicious software.

    Across an ocean, Darien Huss, a 28-year-old research engineer for the cybersecurity firm Proofpoint, was doing his own analysis. The western Michigan resident said he noticed the authors of the malware had left in a feature known as a kill switch. Huss took a screen shot of his discovery and shared it on Twitter.

    Soon he and MalwareTech were communicating about what they'd found: That registering the domain name and redirecting the attacks to the server of Kryptos Logic had activated the kill switch, halting the ransomware's infections.

    US Gold Medalist Goes Public With Account of Sexual Abuse

    [NATL] US Gold Medalist Goes Public With Account of Sexual Abuse

    McKayla Maroney, a gold medalist and former Olympic gymnast, went public with her account of sexual assault by former US Gymnastics doctor Larry Nassar on Twitter. Maroney revealed she was assaulted for years by Nassar, beginning when she was 13 years old.

    (Published Wednesday, Oct. 18, 2017)

    Huss and others were calling MalwareTech a hero on Saturday, with Huss adding that the global cybersecurity community was working "as a team" to stop the infections from spreading.

    "The 'hero' is a bit strong," MalwareTech said Sunday. "I sort of did what I could."

    Both said they were concerned the authors of the malware could re-release it without a kill switch or with a better one, or that copycats could mimic the attack.

    "I think it is concerning that we could definitely see a similar attack occur, maybe in the next 24 to 48 hours or maybe in the next week or two," Huss said. "It could be very possible."

    Who perpetrated this wave of attacks remains unknown. This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Russia, Ukraine, Brazil, Spain and India.

    Europol, Europe's policing agency, called the attack unprecedented and said computers in more than 150 countries have been affected. Two security firms — Kaspersky Lab and Avast —said Russia was hit hardest.

    These hackers "have caused enormous amounts of disruption— probably the biggest ransomware cyberattack in history," said Graham Cluley, a veteran of the anti-virus industry in Oxford, England.

    In Russia, government agencies insisted that all attacks had been resolved. Russian Interior Ministry, which runs the national police, said the problem had been "localized" with no information compromised. Russia's health ministry said its attacks were "effectively repelled."

    The ransomware exploits a vulnerability in Microsoft Windows that was purportedly identified by the U.S. National Security Agency for its own intelligence-gathering purposes. Hackers said they stole the tools from the NSA and dumped them on the internet.