<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          USEUROPEAFRICAASIA 中文雙語Fran?ais
          China
          Home / China / Across America

          Who's behind 'WannaCry' cyberattack?

          China Daily USA | Updated: 2017-05-16 10:08

          Washington - Cyber security researchers have found technical evidence they said could link DPRK with the global WannaCry "ransomware" cyber attack that has infected more than 300,000 computers in 150 countries since Friday.

          Symantec and Kaspersky Lab said on Monday that some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a DPRK-run hacking operation.

          "This is the best clue we have seen to date as to the origins of WannaCry," Kaspersky Lab researcher Kurt Baumgartner told Reuters.

          Both firms said it was too early to tell whether DPRK was involved in the attacks, based on the evidence that was published on Twitter by Google security researcher Neel Mehta. The attacks, which slowed on Monday, are among the fastest-spreading extortion campaigns on record.

          In a blog post on Sunday, Microsoft Corp President Brad Smith confirmed what researchers already widely concluded: The attack made use of a hacking tool built by the US National Security Agency (NSA) that had leaked online in April.

          He poured fuel on a long-running debate over how government intelligence services should balance their desire to keep software flaws secret - in order to conduct espionage and cyber warfare - against sharing those flaws with technology companies to better secure the internet.

          On Monday, Trump homeland security adviser Tom Bossert sought to distance the NSA from any blame.

          "This was not a tool developed by the NSA to hold ransom data. This was a tool developed by culpable parties, potentially criminals or foreign nation-states, that were put together in such a way as to deliver phishing emails, put it into embedded documents, and cause infection, encryption and locking," Bossert said.

          Russian President Vladimir Putin, noting the technology's link to the US spy service, said it should be "discussed immediately on a serious political level."

          "Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators," he said.

          Regardless of the source of the attack, investors piled into cyber security stocks on Monday, betting that governments and corporations will spend more to upgrade their defenses.

          The perpetrators had raised less than $70,000 from users paying to regain access to their computers, Bossert said.

          "We are not aware if payments have led to any data recovery," Bossert said, adding that no US federal government systems had been affected.

          WannaCry demanded ransoms starting at $300, in line with many cyber extortion campaigns, which keep pricing low so more victims will pay.

          Still, some security experts said they were not sure if the motive of WannaCry was primarily to make money, noting that large cyber extortion campaigns typically generate millions of dollars of revenue.

          "I believe that this was spread for the purpose of causing as much damage as possible," said Matthew Hickey, a co-founder of British cyber consulting firm Hacker House.

          The economies most affected by WannaCry to date are Russia, Taiwan, Ukraine and India, according to security firm Avast.

          The number of infections has fallen dramatically since Friday's peak when more than 9,000 computers were being hit per hour.

          Authorities in Europe and the United States turned their attention to preventing hackers from spreading new versions of the virus.

          Reuters

          Polar icebreaker Snow Dragon arrives in Antarctic
          Xi's vision on shared future for humanity
          Air Force units explore new airspace
          Premier Li urges information integration to serve the public
          Dialogue links global political parties
          Editor's picks
          Beijing limits signs attached to top of buildings across city
          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 免费人成网站视频在线观看国内| 国产精品推荐一区二区| 日韩亚洲精品中文字幕| 久久久精品94久久精品| 俄罗斯老熟妇性爽xxxx| 一本大道无码av天堂| 韩国18禁啪啪无遮挡免费| 国产AV福利第一精品| 国产亚洲av天天在线观看 | 国产精品推荐手机在线| 99热在线免费观看| 国产精品亚洲二区在线播放| 少妇被搞高潮在线免费观看| 永久免费av网站可以直接看的| 国产一级黄色av影片| 亚洲成片在线看一区二区| 精品熟女日韩中文十区| 中文字幕 日韩 人妻 无码| 亚洲国产精品成人一区二区在线 | 在线免费成人亚洲av| 国产毛多水多高潮高清| 日本道播放一区二区三区| 搡老女人老妇女老熟妇69| 黄色亚洲一区二区三区四区 | 成全免费高清观看在线剧情| 性色av一区二区三区精品| 成人国产精品中文字幕| 国产精品毛片在线看不卡| 日本三级理论久久人妻电影| 伊在人间香蕉最新视频| 岛国大片在线免费播放| 欧美性猛交xxxx乱大交丰满| 国产精品久久亚洲不卡| 美女一区二区三区亚洲麻豆| 亚洲 卡通 欧美 制服 中文| 亚洲亚洲网站三级片在线| 丰满的少妇被猛烈进入白浆| 人妻少妇无码精品专区| 伊人久久大香线蕉AV网禁呦| 在线天堂资源www中文| 久久精品第九区免费观看|