• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Mobile

Why Recent Cyber Attacks Illustrate Apple’s Judicious Stand Against FBI’s Backdoor Demands

SW by SW
June 26, 2017
in Mobile, Security
Share on FacebookShare on Twitter

At the start of 2017, the infamous hacking group, Shadow Brokers, made waves in cyberspace by publishing a series of documents they claimed were snatched directly from the National Security Agency (NSA). The contents of these documents were rife with sensitive data that cybersecurity experts concurred, could be utilized to compromise a myriad of devices, ranging from smartphones and laptops to smart TVs, thereby giving hackers access to invaluable native information.

Fast forward to May 12th, the world witnessed the devastating deployment of the WannaCry cyber-attack. This malicious attack adversely affected over 200,000 Windows-based systems around the globe. Critical medical facilities in the United States and approximately 48 hospital trusts within the United Kingdom weren’t spared. The fallout from this event underlined the longstanding dispute between tech behemoths such as Apple, Google, and Microsoft, and various security agencies over the contentious notion of embedding backdoors within devices and operating systems.

What is WannaCry?

WannaCry is a malevolent strain of malware, specifically a type of Trojan virus commonly known as “ransomware”. As the name suggests, it infects operating systems, encrypting files stored on devices. Once completed, it then demands the affected party pay a ransom (in the case of WannaCry, $300 in Bitcoins) for the decryption of their files. If the ransom is not paid within three days, the amount doubles to $600, and non-payment after seven days results in the total deletion of user’s data by the virus.

Who was Impacted?

wannacrypt

Image source: MalwareTech

This malware emerged scarcely over a month ago, and security researchers estimate that almost 300,000 devices were infected in the initial ten days. It was revealed that affected structures included radiology devices used in both U.K. and U.S. hospitals. These devices, created by Bayer Medrad, enhance medical imaging by monitoring a power injector that assists in the delivery of a contrast agent. However, operations were resumed in less than a day, averting irreversible damage.

How Does This Relate to Apple?

For years, law enforcement agencies have been grappling to unearth vulnerabilities in secured apps, devices, and systems to aid their investigations. This contentious practice was exemplified in the tussle between the FBI and Apple in a bid to unlock an iPhone belonging to the San Bernardino shooter. Apple CEO Tim Cook vehemently opposed this, highlighting that such a backdoor would critically undermine encryption efforts, thereby compromising user’s privacy and security.

In a subsequent interview with ABC, Cook clarified that if a method of embedding a “safe” backdoor existed that didn’t jeopardize personal files, Apple would certainly consider it. However, contending that such a method isn’t currently feasible, Cook reinforced his opposition, emphasizing the need to keep the troves of sensitive data stored in our digital devices, from social security numbers to location data, securely encrypted.

The aspect to underline here is that the WannaCry ransomware was a derivative of the leaked NSA data, which was originally hoarded as a database of cybersecurity vulnerabilities. This reinforces Apple’s decision to deny the FBI, highlighting the dangers of allowing security agencies a backdoor into devices worldwide.

Can the Virus Be Stopped?

No definitive solution yet exists for infected systems. However, cybersecurity and IT support experts have been tirelessly endeavoring to decrypt the ensnared files since the initial outbreak of WannaCry. To prevent your system from falling prey to this menace, it is critical to ensure all systems are updated promptly. Microsoft has also released an additional security update for Windows 8, XP and Server 2003, so users are encouraged to check for updates if they are using these systems.

Alongside Apple, Google and Microsoft have been vocal in their criticism of the behavior demonstrated by the security agencies. Notably, Microsoft publicly denounced the hoarding of vulnerabilities by agencies and governments. The recent incident involving the theft of NSA vulnerabilities only serves to underscore the potential chaos that can ensue should malicious hackers exploit such vulnerabilities.”

In a surprising development, young security researcher Marcus Hutchins inadvertently curtailed the span of the virus, considerably slowing it down by registering a hidden domain name embedded within the WannaCry code as he sought to track its proliferation. Nevertheless, at the time of our report, WannaCry is still actively infecting systems worldwide.

This article was updated in 2025 to reflect modern realities.

Related Posts:

  • Nigeria Bureau of Statistics Data breach
    Hackers Compromised The NBS Sever, But No Ransomware Yet
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • handala hackers
    FBI Warns of Handala Hackers Using Telegram for Malware
  • 2024.02.06-US-Treasury-Department-sanctions-six-Iranian-hackers-responsible-for-malicious-cyber-activities-on-critical-infrastructure
    Iran-Linked Hackers Are Actively Disrupting US…
  • New-mtn-logo-800x630
    MTN Declares Core Infrastructure Secure After Cyberattack
  • nhs_tech_provider_dxs_admits_breach_of_office_serv_edited_1766078164
    NHS England Tech Supplier Confirms Data Breach
  • The logo of Russia's flagship airline Aeroflot is seen on an Airbus A320 in Colomiers near Toulouse, France
    Cyberattack forces Russia's Aeroflot to Cancel…
  • apple_ios_18.6_iphone_warning
    Researchers Warn DarkSword Exploit Could Hit…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: Applecybersecuritydigital assistantfbimeta earningsransomwarewannacry
SW

SW

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Tulupay Unveils Prelaunch of Pan-African Financial OS to Bridge Web2 and Web3 Rails April 17, 2026
  • Short-Form Video App, SaySo, To Rebuild Trust April 17, 2026
  • OpenAI Enhances Codex With Computer Control & Image Generation April 17, 2026
  • Bluesky Reviews The Outage Cause To Be A DDoS Attack April 17, 2026
  • OpenAI Unveils GPT-Rosalind, Aiming at Drug Discovery and Genomics April 17, 2026
  • Google Chrome’s AI Mode Now Handles Tabs More Like a Human Assistant April 17, 2026
  • Anthropic Launches Claude Opus 4.7 as Safer Alternative to Mythos AI April 16, 2026
  • Bluesky Seemed To Be Down For Some Time Today April 16, 2026
  • Lagos Commissioner Gives 21-Weeks Delivery Time Frame On Obalende MTN Yello Park Project April 16, 2026
  • Google Brings a Native Gemini App to macOS, With Deep Screen Access April 16, 2026
  • CAC Experiences Data Breach, Users Advised To Reset Login Credentials April 16, 2026
  • Opera adds Browser Connector for integrating AI chatbots April 16, 2026

Browse Archives

April 2026
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
27282930 
« Mar    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.