BreachExchange mailing list archives
Analyst finds no evidence of NSA EternalBlue in Baltimore ransomware attack
From: Destry Winant <destry () riskbasedsecurity com>
Date: Wed, 5 Jun 2019 02:28:07 -0500
https://siliconangle.com/2019/06/03/analyst-finds-no-evidence-nsa-eternalblue-baltimore-ransomware-attack/ The ransomware used to cripple the City of Baltimore last month did not include code from the U.S. National Security Agency’s leaked EternalBlue hacking exploits, according to a security analyst. The finding comes from Joe Stewart, a malware analyst now consulting with security firm Armor Defense Inc. Krebs on Security reported today that he was unable to find any evidence of EternalBlue code in the Robbinhood ransomware used in the attack. “We took a look at it and found a pretty vanilla ransomware binary,” Stewart said. “It doesn’t even have any means of spreading across networks on its own.” Stewart did note that it is possible that EternalBlue could have been used to propagate the ransomware but it’s “not terribly likely.” Stewart’s analysis contradicts a report from The New York Times May 26 which claimed that the EternalBlue exploits were used in the attack targeting Baltimore. That report referenced the finding to Thomas Rid, a cybersecurity expert at Johns Hopkins University. Rid has yet to comment publicly on the new report claiming that EternalBlue was not involved in the attack, but he’s currently writing a book called “Active Measures: The Secret History of Disinformation and Political Warfare.” The NSA has never confirmed the existence of EternalBlue but denied any involvement in the attack targeting Baltimore, via a Maryland congressman May 31. In another twist to the story, Eric Sifford, a security researcher at Armor published a separate report that claimed the entity behind the ransomware attack on Baltimore was seemingly taunting the city’s mayor on Twitter. A Twitter account going by the name of @robinkjn, which has since been suspended, sent out a series of tweets to Bernard C. Jack Young that included documents that may have been stolen in the attack. “One of the documents indicates that it has been scanned/copied on May 4, 2019 and pertains to a June 2018 court case where the mayor and City Council of Baltimore City are being sued by an individual,” Sifford wrote. “The other document appears to have been copied/scanned on April 23, 2019 and pertains to a worker’s comp medical file which went to the City of Baltimore.” Sifford cautioned that the person or persons behind the account may have been a malicious prankster, although the evidence would indicate otherwise. _______________________________________________ BreachExchange mailing list sponsored by Risk Based Security BreachExchange () lists riskbasedsecurity com If you wish to Edit your membership or Unsubscribe you can do so at the following link: https://lists.riskbasedsecurity.com/listinfo/breachexchange
Current thread:
- Analyst finds no evidence of NSA EternalBlue in Baltimore ransomware attack Destry Winant (Jun 05)