{"id":11156,"date":"2017-05-17T16:00:27","date_gmt":"2017-05-17T21:00:27","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=11156"},"modified":"2018-01-25T15:32:21","modified_gmt":"2018-01-25T20:32:21","slug":"massive-global-cyberattack-ties-nsa","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/massive-global-cyberattack-ties-nsa\/","title":{"rendered":"Massive Global Cyberattack Has Ties to the NSA"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">On Friday, May 12, a massive cyberattack hit worldwide, engineered by an unidentified hacker group. The Russian cybersecurity firm, Kaspersky Lab, said it recorded approximately 45,000 attacks in as many as 74 countries. The attackers used emails with links carrying <\/span>ransomware<span style=\"font-weight: 400;\">, a type of malware that encrypts data, thereby, locking users out of a computer. Several entities were grossly affected, including Spain\u2019s Telef\u00f3nica, Britain&#8217;s NHS system, and FedEx. Although computers with Microsoft systems were compromised, don\u2019t be fooled that your Android device is safe. With the BYOD (Bring Your Own Device) philosophy being implemented in many companies, it\u2019s vital to run scans and protect against hackers, like the ones that masterminded this attack. Activate Full Virus Scan now to check for any threats when you\u2019ve clicked on a link in an email:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_full\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">Full Virus Scan <\/span><span style=\"font-weight: 400;\">will check your smartphone\u2019s files and programs that are in your device\u2019s memory and SD card, alerting you of any breaches or viruses.<\/span><span style=\"font-weight: 400;\"> Although the identity of the hackers is currently unknown, links to the NSA surfaced. A group referred to as the Shadow Brokers originally leaked the hacking tools used in the British NHS attack \u2014 these tools were stolen from the NSA last year. The hackers took advantage of organizations that failed to patch vulnerabilities in their computer systems. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/current-trends-cybersecurity\/\"><b>These Are the Current Trends in Cybersecurity<\/b><\/a><\/p>\n<p><b>Ransomware Attacks Are Increasing<br \/>\n<\/b><span style=\"font-weight: 400;\">The type of ransomware used in the attacks is called <\/span><a href=\"http:\/\/www.wired.co.uk\/article\/wanna-decryptor-ransomware\"><span style=\"font-weight: 400;\">Wanna Decryptor<\/span><\/a><span style=\"font-weight: 400;\">, which encrypts a computer\u2019s files and then deletes the originals. The hackers demanded $300 in Bitcoin to decrypt the files, with the price doubling after three days. After seven days, the files will not be able to be recovered. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are typically able to infect an entire system with malware and hold it for ransom by targeting individual employees at an organization. This can be accomplished through phishing or social engineering attacks \u2014 all it takes is one employee clicking on a malicious link or attachment from an email. Click here to use Anti-Hacking to protect yourself against phishing attempts on your work phone:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/safe_navigation\" rel=\"attachment wp-att-11173\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11173\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking-300x60.png\" alt=\"Deeplink_Activate-Anti-Hacking\" width=\"300\" height=\"60\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking-300x60.png 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking.png 392w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\"><br \/>\nAnti-Hacking will also block you from malicious websites and warn you of any deceptive sites so that you don\u2019t fall prey to malware. It is now more important than ever to protect yourself from social engineering attacks as they become cleverer and more frequent \u2014 especially if your business is a likely target for cyberattacks.<\/span><a href=\"http:\/\/www.cnbc.com\/2016\/12\/13\/ransomware-spiked-6000-in-2016-and-most-victims-paid-the-hackers-ibm-finds.html\"><span style=\"font-weight: 400;\">Ransomware attacks<\/span><\/a><span style=\"font-weight: 400;\">, in particular, have increased by about 6,000% since 2015, according to a study by IBM.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A worldwide cyberattack of this scale is a strong reminder that not only are work or home computers at risk, but malware <\/span><a href=\"https:\/\/www.scmagazine.com\/mobile-ransomware-attack-on-the-rise-report\/article\/529319\/\"><span style=\"font-weight: 400;\">attacks on mobile devices<\/span><\/a><span style=\"font-weight: 400;\"> are gaining as well. Be vigilant and aware, and above all else &#8212; protect all your devices, not just one.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An unknown hacking group that targeted several countries used NSA tools to launch a major cyberattack. Learn more and how you can protect yourself.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[3709,259,3263,249],"class_list":["post-11156","post","type-post","status-publish","format-standard","hentry","category-security","tag-cyberattack","tag-hackers","tag-massive-hacks","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=11156"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11156\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=11156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=11156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=11156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}