MORE

    US government ranked the highest buyer of malware:Reuters

    The US government is waging electronic warfare on a vast scale — so large that it’s causing a seismic shift in the unregulated grey markets where hackers and criminals buy and sell security exploits, Reuters reports.

    - Advertisement -

    Former White House cybersecurity advisors Howard Schmidt and Richard Clarke say this move to “offensive” cybersecurity
    has left US companies and average citizens vulnerable, because it relies on the government collecting and exploiting critical
    vulnerabilities that have not been revealed to software vendors or the public.

    “If the US government knows of a vulnerability that can be exploited, under normal circumstances, its first obligation is to tell US users,” Clarke told Reuters. “There is supposed to be some mechanism for deciding how they use the information, for offense or defense. But there isn’t.”

    - Advertisement -

    “My job was to have 25 zero-days on a USB stick, ready to go.”

    Vulnerabilities go for a pretty penny in the computer hacking underground — zero-day exploits (those which are unknown to software developers at the time of discovery) have been known to sell for as much as $50,000 – $100,000 each. Once obtained, these exploits are packaged into weaponized malware and sold to criminals and repressive governments across the world, who then use it to do everything from spying on citizens to conducting cyber espionage against rival nations and companies or, in the case of the US / Israel-backed Stuxnet worm,destroying industrial machinery inside an Iranian nuclear facility. One former executive for a defense contractor described his job as “to have 25 zero-days on a USB stick, ready to go” so that governments could use them as cyber weapons.

    The US government won’t say anything about the scope or details of its cyber warfare efforts, but vendors and former defense contractors say the US has become a top buyer in the burgeoning malware market. Former officials worry that this shift in priorities is luring skilled hackers and researchers away from defense and toward the more lucrative business of building weaponized malware for government use.

    “There has been a traditional calculus between protecting your offensive capability and strengthening your defense,” said former NSA director Michael Hayden. “It might be time now to readdress that at an important policy level, given how much
    we are suffering.”

    Source: Reuters

    VIA: TheVerge

    - Advertisement -

    IN THIS STORY STREAM

    Techjaja Staff
    Techjaja Staff
    A Techjaja 'bot' Profile

    Fresh Tech

    Data and Fintech Supercharge MTN Uganda — Profits Soar and Dividends Get Juicier!

    MTN Uganda, one of the biggest mobile phone and...

    Huawei launches enhanced AI-Centric network solutions for all intelligence at MWC 2026

    Huawei released a series of all-scenario U6 GHz products...

    Huawei’s Yang Chaobin: Creating mobile value creates a better intelligent world

    Yang Chaobin, CEO of Huawei's ICT Business Group, today...

    Huawei’s SuperPoD portfolio creates new option for Global Computing at MWC Barcelona 2026

    At MWC Barcelona 2026, Huawei debuts its latest SuperPoD...
    - Advertisment -

    Discover more from Techjaja

    Subscribe now to keep reading and get access to the full archive.

    Continue reading