Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Accounting Basics Expert

Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool - NY Times - Saturday, May 12, 2017;

By NICOLE PERLROTH and DAVID E. SANGERMAY 12, 2017

SAN FRANCISCO - Hackers exploiting malicious software stolen from the National Security Agency executed damaging cyberattacks on Friday that hit dozens of countries worldwide, forcing Britain's public health system to send patients away, freezing computers at Russia's Interior Ministry and wreaking havoc on tens of thousands of computers elsewhere.

The attacks amounted to an audacious global blackmail attempt spread by the internet and underscored the vulnerabilities of the digital age.

Transmitted via email, the malicious software locked British hospitals out of their computer systems and demanded ransom before users could be let back in - with a threat that data would be destroyed if the demands were not met.

By late Friday the attacks had spread to more than 74 countries, according to security firms tracking the spread. Kaspersky Lab, a Russian cybersecurity firm, said Russia was the worst-hit, followed by Ukraine, India and Taiwan. Reports of attacks also came from Latin America and Africa.

The attacks appeared to be the largest ransomware assault on record, but the scope of the damage was hard to measure. It was not clear if victims were paying the ransom, which began at about $300 to unlock individual computers, or even if those who did pay would regain access to their data.

Security experts described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing email, similar to the one Russian hackers used in the attacks on the Democratic National Committee and other targets last year. They then quickly spread through victims' systems using a hacking method that the N.S.A. is believed to have developed as part of its arsenal of cyberweapons. And finally they encrypted the computer systems of the victims, locking them out of critical data, including patient records in Britain.

The connection to the N.S.A. was particularly chilling. Starting last summer, a group calling itself the "Shadow Brokers" began to post software tools that came from the United States government's stockpile of hacking weapons.

The attacks on Friday appeared to be the first time a cyberweapon developed by the N.S.A., funded by American taxpayers and stolen by an adversary had been unleashed by cybercriminals against patients, hospitals, businesses, governments and ordinary citizens.

Something similar occurred with remnants of the "Stuxnet" worm that the United States and Israel used against Iran's nuclear program nearly seven years ago. Elements of those tools frequently appear in other, less ambitious attacks.

The United States has never confirmed that the tools posted by the Shadow Brokers belonged to the N.S.A. or other intelligence agencies, but former intelligence officials have said that the tools appeared to come from the N.S.A.'s "Tailored Access Operations" unit, which infiltrates foreign computer networks. (The unit has since been renamed.)

The attacks on Friday are likely to raise significant questions about whether the growing number of countries developing and stockpiling cyberweapons can avoid having those same tools purloined and turned against their own citizens.

They also showed how easily a cyberweapon can wreak havoc, even without shutting off a country's power grid or its cellphone network.

In Britain, hospitals were locked out of their systems and doctors could not call up patient files. Emergency rooms were forced to divert people seeking urgent care.

In Russia, the country's powerful Interior Ministry, after denying reports that its computers had been targeted, confirmed in a statement that "around 1,000 computers were infected," which it described as less than 1 percent of its total. The ministry, which oversees Russia's police forces, said technicians had contained the attack.

Some intelligence officials were dubious about that announcement because they suspect Russian involvement in the theft of the N.S.A. tools.

In Britain, hospitals were locked out of their systems and doctors could not call up patient files. Emergency rooms were forced to divert people seeking urgent care.

In Russia, the country's powerful Interior Ministry, after denying reports that its computers had been targeted, confirmed in a statement that "around 1,000 computers were infected," which it described as less than 1 percent of its total. The ministry, which oversees Russia's police forces, said technicians had contained the attack.

Some intelligence officials were dubious about that announcement because they suspect Russian involvement in the theft of the N.S.A. tools.

There is no automatic way to "patch" their weaknesses around the world.

"When people ask what keeps you up at night, it's this," said Chris Camacho, the chief strategy officer at Flashpoint, a New York security firm tracking the attacks. Mr. Camacho said he was particularly disturbed at how the attacks spread like wildfire through corporate, hospital and government networks.

Another security expert, Rohyt Belani, the chief executive of PhishMe, an email security company, said the wormlike capability of the malware was a significant shift from previous ransom attacks. "This is almost like the atom bomb of ransomware," Mr. Belani said, warning that the attack "may be a sign of things to come."

The hackers' weapon of choice on Friday was Wanna Decryptor, a new variant of the WannaCry ransomware, which encrypts victims' data, locks them out of their systems and demands ransoms.

Researchers said the impact and speed of Friday's attacks had not been seen in nearly a decade, when the Conficker computer worm infected millions of government, business and personal computers in more than 190 countries, threatening to overpower the computer networks that controlled health care, air traffic and banking systems over the course of several weeks.

One reason the ransomware on Friday was able to spread so quickly was that the stolen N.S.A. hacking tool, known as "Eternal Blue," affected a vulnerability in Microsoft Windows servers.

Hours after the Shadow Brokers released the tool last month, Microsoft assured users that it had already included a patch for the underlying vulnerability in a software update in March.

But Microsoft, which regularly credits researchers who discover holes in its products, curiously would not say who had tipped the company off to the issue. Many suspected that the United States government itself had told Microsoft, after the N.S.A. realized that its hacking method exploiting the vulnerability had been stolen.

Privacy activists said if that were the case, the government would be to blame for the fact that so many companies were left vulnerable to Friday's attacks. It takes time for companies to roll out systemwide patches, and by notifying Microsoft of the hole only after the N.S.A.'s hacking tool was stolen, activists say the government would have left many hospitals, businesses and governments susceptible.

"It would be deeply troubling if the N.S.A. knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen," Patrick Toomey, a lawyer at the American Civil Liberties Union, said on Friday. "These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world."

During the Obama administration, the White House created a process to review software vulnerabilities discovered by intelligence agencies, and to determine which should be "stockpiled" for future offensive or defensive cyberoperations and which should be reported to the companies so that they could be fixed.

Last year the administration said that only a small fraction were retained by the government. But this vulnerability appeared to be one of them, and it was patched only recently, suggesting that the N.S.A. may have concluded the tool had been stolen and therefore warned Microsoft.  But that was clearly too little, and far too late.

On Friday, hackers took advantage of the fact that vulnerable targets - particularly hospitals - had yet to patch their systems, either because they had ignored advisories from Microsoft or because they were using outdated software that Microsoft no longer supports or updates.

The malware was circulated by email. Targets were sent an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its targets. The fact that the files were encrypted ensured that the ransomware would not be detected by security systems until employees opened them, inadvertently allowing the ransomware to replicate across their employers' networks.

Employees at Britain's National Health Service had been warned about the ransomware threat earlier on Friday. But it was too late. As the disruptions rippled through at least 36 hospitals, doctors' offices and ambulance companies across Britain, the health service declared the attack a "major incident," warning that local health services could be overwhelmed.

Britain's health secretary, Jeremy Hunt, was briefed by cybersecurity experts, while Prime Minister Theresa May's office said on television that "we're not aware of any evidence that patient data has been compromised."

As the day wore on, dozens of companies across Europe, Asia and the United States discovered that they had been hit with the ransomware when they saw criminals' messages on their computer screens demanding $300 to unlock their data. But the criminals designed their ransomware to increase the ransom amount on a set schedule and threatened to erase the hostage data after a predetermined cutoff time, raising the urgency of the attack and increasing the likelihood that victims would pay.

Without the ability to decrypt their data on their own, security experts said that victims who had not backed up their data were faced with a choice: Either live without their data or pay. It was not clear how many victims ultimately paid.

Security experts advised companies to immediately update their systems with the Microsoft patch.

Until organizations use the Microsoft patch, Mr. Camacho said, they could continue to be hit - not just by ransomware, but by all kinds of malicious tools that can manipulate, steal or delete their data.

"There is going to be a lot more of these attacks," he said. "We'll see copycats, and not just for ransomware, but other attacks."

Nicole Perlroth reported from San Francisco and David E. Sanger from Washington. Reporting was contributed by Dan Bilefsky, Sewell Chan and Yonette Joseph from London, Ivan Nechepurenko from Moscow, Raphael Minder from Fátima, Portugal, and Rick Gladstone from New York. A version of this article appears in print on May 13, 2017, on Page A1 of the New York edition with the headline: Hackers Use Tool Taken From N.S.A. in Global Attack.

Acme Enterprises

Based on the incident described above, Pat as CEO is concerned about the safety of the data within Acme Enterprises.  In a memo to Acme Enterprises, identify and describe the weaknesses in Acme Enterprises' payroll process.  (Label your answers.)

Acme employs over 40,000 workers for three shifts, and most employees work overtime when necessary. Additional information about payroll procedures follows:

  • The HR department determines the wage rates of all employees. The process begins when a form authorizing the addition of a new employee to the payroll master file is sent to the payroll coordinator for review and approval. Once the information about the new employee is entered in the system, the computer automatically calculates the overtime and shift differential rates for that employee.
  • A local accounting firm provides Acme with monthly payroll tax updates, which are used to modify the tax rates.
  • Employees record time worked on time cards. Every Tuesday morning the previous week's time cards are collected from a bin next to the time clock, and new time cards are left for employees to use. The payroll department manager reviews the time cards to ensure that hours are correctly totaled; the system automatically determines if overtime has been worked or a shift differential is required.
  • The payroll department manager performs all the other activities necessary to ensure accurate and timely delivery of payroll. The payroll department manager who does not believe in taking vacation has received numerous awards for perfect attendance over a twelve year employee tenure.
  • The system automatically assigns a sequential number to each payroll check. The checks are stored in a box next to the printer for easy access. After the checks are printed, the payroll department manager uses an automatic check-signing machine to sign the checks. The signature plate is kept locked in a safe. After the checks have been signed, the payroll manager distributes the paychecks to all first-shift employees. Paychecks for the other two shifts are given to the shift supervisor for distribution.
  • The payroll master file is backed up bi-weekly, after payroll processing is finished. The back-up process is reviewed and approved by the payroll department manager.

REQUIRED:  In a typed memo to Pat - CEO of Acme Enterprises, identify and describe the weaknesses in Acme Enterprises' payroll process.  Please label your answers. Your memo may exceed one page if necessary.

Accounting Basics, Accounting

  • Category:- Accounting Basics
  • Reference No.:- M92396097
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Accounting Basics

Question - culver corporation having recently issued a

Question - Culver Corporation, having recently issued a $20,075,700, 15-year bond issue, is committed to make annual sinking fund deposits of $625,000. The deposits are made on the last day of each year and yield a retur ...

Question - the asset account office supplies had a

Question - The asset account, office supplies had a beginning balance of 5700. During the accounting period, office supplies were purchased, on account for 5100. A physical count, on the last day of the accounting period ...

Question - for the year ended may 31 2015 nike inc

Question - For the year ended May 31, 2015, NIKE, Inc. financial statements included the following data: NIKE, Inc. Selected financial data Revenues 30,601 Cost of sales 16,534 Gross profit 14,067 Total selling and admin ...

Question - during the past few years abc company has taken

Question - During the past few years, ABC Company has taken out the following loans from the bank: 1. On August 1, 2017, ABC Company borrowed $18,000 on a 9%, 11-month note payable. 2. On February 1, 2018, ABC Company bo ...

Question as the first step of your final project select

Question: As the first step of your final project, select three companies to evaluate for determining which is in the best financial health and would, therefore, be the most profitable investment. • What considerations m ...

Question - at december 31 2014 the available for sale

Question - At December 31, 2014, the available for sale equity portfolio for xyz corp. is as follows. Security Cost Fair Value Stock A 33,600 31,000 Stock B 175,000 174,000 Stock C 59,400 68,500 Total 268,000 273,500 Dec ...

Question the turkish and japanese economies face different

Question: The Turkish and Japanese economies face different challenges over the next decade. The assignment requires you to choose one of the countries and identify the key risks in terms of the economic, financial, poli ...

Question - the following transactions are july activities

Question - The following transactions are July activities of Bill's Extreme Bowling, Inc., which operates several bowling centers. a. Bill's collected $21,600 from customers for services related to games played in July. ...

Question - journal entries for job order costingcycle

Question - Journal entries for job order costing Cycle Specialists manufactures goods on a job order basis. Durin the month of June, three jobs were started in process. (There was no work in process at the beginning of t ...

Question - paulson company issues 6 four-year bonds on

Question - Paulson Company issues 6%, four-year bonds, on December 31, 2017, with a par value of $200,000 and semiannual interest payments. Semiannual Period-End Unamortized Discount Carrying Value (0) 12/31/2017 $ 13,46 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As