Stolen NSA hacking tool now victimizing US cities

Posted on May 26, 2019

Stolen NSA hacking tool now victimizing US cities

A hacking tool developed by the US National Security Agency is now being used to shut down American cities and towns, says a Saturday report in The New York Times. Code-named EternalBlue, the hacking exploit involves malicious software and was leaked in 2017 by a group called Shadow Brokers. Hackers used the tool that same year in the worldwide WannaCry ransomware attacks, which locked up computer systems at hospitals, banks and phone companies and required a ransom to set the networks free.

It was also used in the 2017 NotPetya assault against Ukraine, which has been called one of the most destructive cyberattacks ever. Now, though, EternalBlue has reportedly landed in the NSA’s own backyard: Baltimore, site of the agency’s headquarters. The city has been hobbled since a ransomware attack on May 7 ensnared the local government’s computers, disrupting city services.

Baltimore’s IT department is only slowly getting systems up and running again. For years, law enforcement and intelligence agencies have argued that backdoors should be built into encryption systems to allow the agencies to access suspects’ computers. And the NSA has often developed its own tools for cracking into machines and networks to gather data.

But critics have long argued that any such backdoors would inevitably be discovered by hackers and that efforts by spy agencies could spin out of control.