The bigger picture in this attack was the full life cycle of how these exploits are found easily by the NSA. The government uses terms like 'threat analysis' and monetary rewards to gets their hands on the source code from Microsoft. Once they find the exploit, they tell nobody and use it to attack just about anybody. Some of these exploits ends up in the hands of hackers who may collect billions of dollars from their attack.
Many of these exploits have been used as disrupting tactics to stifle or steal my work.
Last edited: