The latest ransomware attack used an alleged NSA exploit

A hacking tool allegedly used by the NSA has again surfaced to haunt the world.
 By 
Colin Daileda
 on 
The latest ransomware attack used an alleged NSA exploit
Credit: Cultura/REX/Shutterstock

An alleged NSA hacking tool has again surfaced to haunt the world.

Organizations across the globe -- including Boryspil International in Kiev, Ukraine, a Russian oil company and an advertising company in the United Kingdom -- have stalled out on Tuesday as a type of ransomware known as Petya has locked up their computers, demanding bitcoin in exchange for the return of those computers' functionality.

The tool the ransomware uses to get inside computers is called Eternal Blue, and it's more of an exploit than a tool. Leaked by a group (or person) known as the Shadow Brokers back in April, Eternal Blue is an exploit that finds a way into the transport protocols (think file sharing mechanisms and such) of computers running Windows that haven't been patched in a few months. It's proven to be a key ingredient for hackers looking to access a lot of Windows machines.

Hackers have discovered they can add Eternal Blue to a framework called Metasploit to do widespread damage. Metasploit is a system designed to test the vulnerability of a computer by seeing what holes an attacker might slip through. Hackers, though, have used it to see what kind of holes computers have, and have set up their attacks accordingly. Adding Eternal Blue to Metasploit has given even relatively novice hackers the ability to add a dangerous exploit to a framework that will test for for the corresponding vulnerability, among others.

"The addition of the EternalBlue exploit to Metasploit has made it easy for threat actors to exploit these vulnerabilities," researchers for Fire Eye, a cybersecurity firm, wrote in a report published on June 2. "In the coming weeks and months, we expect to see more attackers leveraging these vulnerabilities and to spread such infections with different payloads."

Last month, hackers linked to the North Korean government used Eternal Blue to infect unpatched Windows machines, and did damage in more than 100 countries. That attack brought a ton of attention to Eternal Blue, and rightfully so, but researchers have found a number of other incidents in which hackers have tested the exploit on a smaller scale.

Hackers know that plenty of people never bother updating their machines, leaving them open to ransomware attacks. The best thing to do, especially if you're reading this while running Windows, is to take the advice of those Fire Eye researchers and "update to the latest software versions as soon as possible."

Topics Cybersecurity

Mashable Image
Colin Daileda

Colin is Mashable's US & World Reporter. He previously interned at Foreign Policy magazine and The American Prospect. Colin is a graduate from Columbia University Graduate School of Journalism. When he's not at Mashable, you can most likely find him eating or playing some kind of sport.

Mashable Potato

Recommended For You


'Arc Raiders' issues widespread penalties for alleged cheaters
video game screenshot of arc raiders

Grammarly removes AI feature which used real authors' identities, faces class action lawsuit
The Grammarly logo is seen displayed on a smartphone screen.

Stephen Colbert reacts to Trump's attack on Venezuela
A man in a suit stands on a talk show stage.

Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

NYT Connections hints today: Clues, answers for April 4, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone

Google launches Gemma 4, a new open-source model: How to try it
Google Gemma

Wordle today: Answer, hints for April 4, 2026
Wordle game on a smartphone
The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!