Skip to content

Compliance Building

Doug Cornelius on compliance for private equity real estate

Menu
  • Home
  • About
    • About
    • About Doug
    • About This Website
    • Why I Blog
    • Speaking Engagements
    • Contact
    • Publications
  • Archives
    • Topic Archive
    • Book Reviews
    • Most Popular
  • Subscribe
  • Disclaimers
    • Disclaimers
    • Policies and Procedures
    • Use of Site Content
    • Comments
    • FTC Disclosure
Menu

We Have Seen The Enemy And It Is US

Posted on May 15, 2017September 26, 2017 by Doug Cornelius
Print Friendly, PDF & Email

There was a massive cyberattack over the weekend that has afflicted 200,000 computers in more than 150 countries. The malware locks users out of their computers and threatens to destroy data if a ransom is not paid. It turns out that the the malicious software used in the cyberattack was originally been developed by the National Security Agency. It was then stolen by a hacking group known as the Shadow Brokers and converted into the ransom malware, WannaCrypt.

There was concern that there might be a second wave spread this morning as people return to work. So far that is not the case.

It turns out that WannaCrypt was especially effective in China. Probably because there is a lot more pirated versions of the Microsoft software on Chinese computers. Microsoft released a patch in March.

The scary news is that the US government is stockpiling malware. As pointed out in Countdown to Zero Day there is no US or international norms on the use of computer malware as weapons. We have the US government funding weaponized computer malware that can be released into the wild causing wanton destruction. We like to think that malware is being used to protect the US, but this is an example of the dangers of creating this malware.

Like any weapon, we should be concerned that it can’t fall into the wrong hands. In the case of WannaCrypt, it was stolen and put to evil use.

Thankfully a benevolent hacker found the weakness in WannaCrypt. There was a kill switch. If not, it could have done much more damage.

The malware attack was a good example of the need to keep software up to date.

Sources:

  • The need for urgent collective action to keep people safe online: Lessons from last week’s cyberattack by Brad Smith
  • WannaCry: What is ransomware and how to avoid it
  • Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool by NICOLE PERLROTH and DAVID E. SANGER
  • Cyberattack Spreads in Asia, Though No ‘Second Wave’ Is Seen by GERRY MULLANY and PAUL MOZUR

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X
  • Click to email a link to a friend (Opens in new window) Email

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search for Stuff

Recent Stories

  • Compliance Bricks and Mortar for January 9
  • “Small”: I Don’t Think You Know What That Means
  • CFTC is Saying Goodbye to Private Funds
  • New York’s LLC Transparency Act Will Remain Limited
  • SEC and CFTC With Only Republicans
  • Compliance Books from 2025
  • Happy New Year
  • The One That Can Drive You and Give You Investment Advice
  • The One with the Foreclosure and OFAC Sanctions
  • Can Precious Gem Buying Being Securities Fraud?

Fight Cancer

Please support my Pan-Mass Challenge
Make a donation to fight cancer. donate.pmc.org/DC0176
pan-mass challenge badge

I am a lawyer, but I am not your lawyer. Since I’m a lawyer, this website may be considered attorney advertising under the ethical rules of certain jurisdictions. Please read my disclaimers page before taking any action. And then, don't take any action based on what I wrote.

Creative Commons logo with the text 'Some Rights Reserved' and three symbols representing attribution, non-commercial use, and share alike.

Compliance Building - by Doug Cornelius is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.