How the NSA Develops Exploits

SPECTRE1

SE for CI, Terrorism, Revenge, Extortion
Registered


The bigger picture in this attack was the full life cycle of how these exploits are found easily by the NSA. The government uses terms like 'threat analysis' and monetary rewards to gets their hands on the source code from Microsoft. Once they find the exploit, they tell nobody and use it to attack just about anybody. Some of these exploits ends up in the hands of hackers who may collect billions of dollars from their attack.

wannacry-2_051317024735.jpg


Many of these exploits have been used as disrupting tactics to stifle or steal my work.
 
Last edited:
These global institutions will go back and apply the patch thinking everything is OK when they need to completely revamp their system to prevent a future attack. You can't use off the shelf software from the U.S. that is readily available to everybody whose source code is exposed to various governments around the world.

Other countries have taken the time to develop their own processors and operating system to run these critical systems.
 
Back
Top