• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Mobile

Why Recent Cyber Attacks Illustrate Apple’s Judicious Stand Against FBI’s Backdoor Demands

SW by SW
June 26, 2017
in Mobile, Security
Share on FacebookShare on Twitter

At the start of 2017, the infamous hacking group, Shadow Brokers, made waves in cyberspace by publishing a series of documents they claimed were snatched directly from the National Security Agency (NSA). The contents of these documents were rife with sensitive data that cybersecurity experts concurred, could be utilized to compromise a myriad of devices, ranging from smartphones and laptops to smart TVs, thereby giving hackers access to invaluable native information.

Fast forward to May 12th, the world witnessed the devastating deployment of the WannaCry cyber-attack. This malicious attack adversely affected over 200,000 Windows-based systems around the globe. Critical medical facilities in the United States and approximately 48 hospital trusts within the United Kingdom weren’t spared. The fallout from this event underlined the longstanding dispute between tech behemoths such as Apple, Google, and Microsoft, and various security agencies over the contentious notion of embedding backdoors within devices and operating systems.

What is WannaCry?

WannaCry is a malevolent strain of malware, specifically a type of Trojan virus commonly known as “ransomware”. As the name suggests, it infects operating systems, encrypting files stored on devices. Once completed, it then demands the affected party pay a ransom (in the case of WannaCry, $300 in Bitcoins) for the decryption of their files. If the ransom is not paid within three days, the amount doubles to $600, and non-payment after seven days results in the total deletion of user’s data by the virus.

Who was Impacted?

wannacrypt

Image source: MalwareTech

This malware emerged scarcely over a month ago, and security researchers estimate that almost 300,000 devices were infected in the initial ten days. It was revealed that affected structures included radiology devices used in both U.K. and U.S. hospitals. These devices, created by Bayer Medrad, enhance medical imaging by monitoring a power injector that assists in the delivery of a contrast agent. However, operations were resumed in less than a day, averting irreversible damage.

How Does This Relate to Apple?

For years, law enforcement agencies have been grappling to unearth vulnerabilities in secured apps, devices, and systems to aid their investigations. This contentious practice was exemplified in the tussle between the FBI and Apple in a bid to unlock an iPhone belonging to the San Bernardino shooter. Apple CEO Tim Cook vehemently opposed this, highlighting that such a backdoor would critically undermine encryption efforts, thereby compromising user’s privacy and security.

In a subsequent interview with ABC, Cook clarified that if a method of embedding a “safe” backdoor existed that didn’t jeopardize personal files, Apple would certainly consider it. However, contending that such a method isn’t currently feasible, Cook reinforced his opposition, emphasizing the need to keep the troves of sensitive data stored in our digital devices, from social security numbers to location data, securely encrypted.

The aspect to underline here is that the WannaCry ransomware was a derivative of the leaked NSA data, which was originally hoarded as a database of cybersecurity vulnerabilities. This reinforces Apple’s decision to deny the FBI, highlighting the dangers of allowing security agencies a backdoor into devices worldwide.

Can the Virus Be Stopped?

No definitive solution yet exists for infected systems. However, cybersecurity and IT support experts have been tirelessly endeavoring to decrypt the ensnared files since the initial outbreak of WannaCry. To prevent your system from falling prey to this menace, it is critical to ensure all systems are updated promptly. Microsoft has also released an additional security update for Windows 8, XP and Server 2003, so users are encouraged to check for updates if they are using these systems.

Alongside Apple, Google and Microsoft have been vocal in their criticism of the behavior demonstrated by the security agencies. Notably, Microsoft publicly denounced the hoarding of vulnerabilities by agencies and governments. The recent incident involving the theft of NSA vulnerabilities only serves to underscore the potential chaos that can ensue should malicious hackers exploit such vulnerabilities.”

In a surprising development, young security researcher Marcus Hutchins inadvertently curtailed the span of the virus, considerably slowing it down by registering a hidden domain name embedded within the WannaCry code as he sought to track its proliferation. Nevertheless, at the time of our report, WannaCry is still actively infecting systems worldwide.

This article was updated in 2025 to reflect modern realities.

Related Posts:

  • Nigeria Bureau of Statistics Data breach
    Hackers Compromised The NBS Sever, But No Ransomware Yet
  • handala hackers
    FBI Warns of Handala Hackers Using Telegram for Malware
  • 2024.02.06-US-Treasury-Department-sanctions-six-Iranian-hackers-responsible-for-malicious-cyber-activities-on-critical-infrastructure
    Iran-Linked Hackers Are Actively Disrupting US…
  • New-mtn-logo-800x630
    MTN Declares Core Infrastructure Secure After Cyberattack
  • nhs_tech_provider_dxs_admits_breach_of_office_serv_edited_1766078164
    NHS England Tech Supplier Confirms Data Breach
  • The logo of Russia's flagship airline Aeroflot is seen on an Airbus A320 in Colomiers near Toulouse, France
    Cyberattack forces Russia's Aeroflot to Cancel…
  • apple_ios_18.6_iphone_warning
    Researchers Warn DarkSword Exploit Could Hit…
  • google office
    Google Targets China-Linked Hackers After 53 Attacks

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: Applecybersecuritydigital assistantfbimeta earningsransomwarewannacry
SW

SW

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Trump-Linked Crypto Push Faces Lawsuit, Ethics Fight and Market Setbacks May 3, 2026
  • OpenAI Ignored Employee Warnings Before ChatGPT-Linked Shooting, Report Says May 3, 2026
  • NGX Q1 profit jumps 94% as trading-fee income soars 189% May 3, 2026
  • AI Beats Doctors in Harvard ER Study, Showing Major Shift in Healthcare May 3, 2026
  • Meta Acquires Robotics Startup To Boost & Improve Its Humanoid AI Efforts May 2, 2026
  • xAI Rolls out Grok 4.3 and a New Voice Cloning Suite May 2, 2026
  • Pentagon Taps Nvidia, Microsoft And AWS To Bring AI To Classified Networks May 1, 2026
  • Hackers Are Exploiting Critical cPanel Bug, Putting Millions of Websites at Risk May 1, 2026
  • Alibaba’s Metis Agent Aims to Fix ‘Trigger‑Happy’ AI Tool Use With New RL Framework May 1, 2026
  • Samsung Q1 2026 Earnings: Record Profit Driven by AI Memory Chip Boom May 1, 2026
  • Qualcomm Q1 2026 Earnings: China Weakness and AI Push Drive Mixed Results May 1, 2026
  • Amazon Q1 2026 Earnings: AWS and AI Drive Strong Growth Despite Spending Concerns May 1, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.