Microsoft fires back at governments stockpiling vulnerabilities following 'WannaCry' ransomware attack
Following the massive "WannaCry" (also known as "WannaCrypt") ransomware attack that began rapidly spreading last week, Microsoft President and Chief Legal Officer Brad Smith had some sharp words for governments stockpiling software vulnerabilities. The National Security Agency (NSA) in particular drew Smith's attention for its role in creating the exploit, which was later leaked, upon which WannaCry is based.
Following leaks from the CIA and NSA, Smith argues, governments stockpiling vulnerabilities, is becoming a worrying trend. Says Smith:
WannaCry initial started spreading around the world on Friday, May 12, initially impacting the National Health Service (NHS) in the UK and Telecom providers in Spain. A "killswitch" for the ransomware was eventually discovered by accident by a cybersecurity researcher in the UK, but not before it had spread to hundreds of thousands of computers at major organizations in 150 countries. Now, a second wave of the same malware appears to be spreading with the killswitch patched.
'WannaCry' ransomware: Everything you need to know
For its part, Microsoft had already patched the vulnerability in question as of March, and anyone running Windows 10 with Windows Update and Windows Defender on was automatically protected. The cause for concern was mostly due to the impact at major organizations and companies that hadn't updated their systems with the patch for one reason or another. The NHS, for example, was heavily impacted due to its reliance on Windows XP, which hasn't been supported for some time. Due to the widespread impact of the malware, Microsoft took a major step in issuing a patch for the vulnerability for unsupported systems.
Though there's still a relatively heated debate surrounding who is to blame for the problem, Smith argues it's time for government agencies to take more responsibility in disclosing vulnerabilities so the tech sector, customers, and governments can work together to prevent such attacks. From Smith:
Get the Windows Central Newsletter
All the latest news, reviews, and guides for Windows and Xbox diehards.
Dan Thorp-Lancaster is the former Editor-in-Chief of Windows Central. He began working with Windows Central, Android Central, and iMore as a news writer in 2014 and is obsessed with tech of all sorts. You can follow Dan on Twitter @DthorpL and Instagram @heyitsdtl.