Hackers Used Stolen NSA Tool To Conduct Global Cyberattacks NPR's Robert Siegel talks to Craig Timberg of The Washington Post about the tool hackers stole from the National Security Agency to conduct massive cyberattacks around the world on Friday.
NPR logo

Hackers Used Stolen NSA Tool To Conduct Global Cyberattacks

  • Download
  • <iframe src="https://www.npr.org/player/embed/528166439/528166440" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript
Hackers Used Stolen NSA Tool To Conduct Global Cyberattacks

Hackers Used Stolen NSA Tool To Conduct Global Cyberattacks

Hackers Used Stolen NSA Tool To Conduct Global Cyberattacks

  • Download
  • <iframe src="https://www.npr.org/player/embed/528166439/528166440" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

NPR's Robert Siegel talks to Craig Timberg of The Washington Post about the tool hackers stole from the National Security Agency to conduct massive cyberattacks around the world on Friday.

ROBERT SIEGEL, HOST:

Craig Timberg reports that the ransomware used in this attack apparently took advantage of a software vulnerability discovered by the National Security Agency. He's a national technology reporter with The Washington Post. He's also covering this story. Welcome to the program.

CRAIG TIMBERG: Thanks, Robert.

SIEGEL: And what's the NSA connection here?

TIMBERG: The NSA spends a lot of its time looking for vulnerabilities in software so that it can spy on people around the world. That's the job of the agency. And so this group called Shadow Brokers managed to get their hands on a bunch of these vulnerabilities and release them on the internet. It appears to be one of these things that was actually used in the attacks today.

SIEGEL: Now, Microsoft had released a patch fixing that flaw. That was in March. But it seems that many, many computers were vulnerable to this attack. Why?

TIMBERG: Indeed, you know, the patch that Microsoft released came out even before the - this document describing the vulnerability that the NSA had found (laughter) was made public. So in a perfect world, everyone patches their Microsoft software. This kind of attack doesn't become a problem. But the reality is that people don't update their computers. And one of the things we're learning is how many people and how many (laughter) parts of the world are failing to update their computers in a timely way.

SIEGEL: But we're not just talking about people. We're talking about some very big institutions. And you write that the health care industry is the easiest to exploit. Briefly, why is that?

TIMBERG: So hospitals, doctors offices, et cetera use a huge amount of computers and software technology, but updating that software tends not to be a top priority of theirs. It's also the case that sometimes regulations affect how quickly you can update. There's all sorts of HIPAA laws involving personal information. So health care has traditionally really lagged behind other industries in keeping itself secure by updating software, getting new hardware and generally sort of tightening up its ship.

SIEGEL: And the stakes can be life or death. You write about someone whose surgery was canceled today because of the ransomware attack.

TIMBERG: Indeed, and if nobody dies today because of this, we'll have to consider that a very happy turn of events because (laughter), as anyone who's ever been to a hospital knows, these things run on computers. And the world is incredibly dependent on these machines working properly, so when an attack like this happens, it's frankly very terrifying.

SIEGEL: Let's talk about the scale of this attack. It's big. It's in many, many countries. Is it a record-breaking attack? Is it very unusual? What would you say?

TIMBERG: It certainly is unusual in terms of its scope and essentially the amount of damage it's done. It's not unusual for a worm to get loose and affect, you know, a gazillion computers around the world. But this is unusual. This isn't just a worm that, you know, flashes some funny messages. This actually shut down computers. It shut down entire computer systems. So the scale on the sweep does seem very unusual. A number of analytics folks have said that we're talking about many dozens of countries- 70, 80, 90 - affected. And the numbers of computers are in the tens of thousands, maybe in the hundreds of thousands once people get around to counting all of them.

SIEGEL: Do you know who is behind this attack?

TIMBERG: I wish I did. I can tell you a lot of folks are trying to figure that out right now. These ransomware attacks - they're very pernicious. They're very common, and they're incredibly hard to track. And it'll take a lot of detective work to figure out who put this thing together.

SIEGEL: That's Craig Timberg, national technology reporter at The Washington Post. Craig, thanks for talking with us today.

TIMBERG: It was my pleasure.

Copyright © 2017 NPR. All rights reserved. Visit our website terms of use and permissions pages at www.npr.org for further information.

NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record.