University researchers in Hungary (at the Laboratory of Cryptography and System Security (CrySyS Lab) of the Budapest University of Technology and Economics) have announced the results of their study of the Shadow Brokers' leak of what are said to be NSA hacking tools. Their most interesting conclusions are that the tools in the "Territorial Dispute" modules were particularly adapted to discerning the activities of competing state intelligence services. WIRED looks at the Shadow Brokers' leaks and particularly laments the widespread dissemination of EternalBlue.
Corero says it's found a "kill switch" that can turn off memcache exploitation for denial-of-service purposes. They mix this good news with some bad: the vulnerability that can be used for DDoS also could enable attackers to steal or modify data on affected servers.
The Dutch Tax Authority sustained another distributed denial-of-service attack yesterday. The disruption lasted about five hours. The previous DDoS attack was in January; the suspect in that case was taken into custody last month. He said he did it for the lulz. No attribution yet in yesterday's attack.
CERT-In, India's Computer Emergency Response Team, reported to Parliament that more than twenty-thousand of the country's websites (including one-hundred-fourteen government sites) were attacked between last April and this past January.
FBI Director Wray resumed the Bureau's longstanding pleas for a non-backdoor backdoor.
The attempted assassination of a former GRU officer and his daughter in the UK appears to have used a nerve agent. The victims (including at least one first responder) remain in serious condition.