Go | New | Find | Notify | Tools | Reply |
Step by step walk the thousand mile road |
And on the UK's NHS hospitals...
Nice is overrated "It's every freedom-loving individual's duty to lie to the government." Airsoftguy, June 29, 2018 | ||
|
Ammoholic |
$300 ransom???? Seems a little cheap to me? Jesse Sic Semper Tyrannis | |||
|
Member |
Could you imagine years of records disappearing? Scary stuff... | |||
|
Member |
That's the first payment. No guarantee that they provide the encryption key or don't re-lock it later. | |||
|
Member |
Multiply that times the number of users affected, and factor in how little money it probably cost the hackers to set this up. Also, $300 is probably more likely to be paid than, say, $3000. "It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts." Sherlock Holmes | |||
|
Member |
I am glad my doctor still knows how to use pen and paper to write prescriptions, schedule appointments and diagnose my problem. He even has a landline as a backup to return calls. | |||
|
Network Janitor |
This stuff sucks, for those that want a bit more on how this works. Today's ransomware worm outbreak is dissected by @TalosSecurity EXECUTIVE SUMMARY A major ransomware attack has affected many organizations across across the world reportedly including Telfonica in Spain, the National Health Service in the UK, and FedEx in the US. The malware responsible for this attack is a ransomware variant known as 'WannaCry'. The malware then has the capability to scan heavily over TCP port 445 (Server Message Block/SMB), spreading similar to a worm, compromising hosts, encrypting files stored on them then demanding a ransom payment in the form of Bitcoin. Organizations should ensure that devices running Windows are fully patched and deployed in accordance with best practices. Additionally, organizations should have SMB ports (139, 445) blocked from all externally accessible hosts. Please note this threat is still under active investigation, the situation may change as we learn more or as our adversary responds to our actions. Talos will continue to actively monitor and analyze this situation for new developments and respond accordingly. As a result, new coverage may be developed or existing coverage adapted and/or modified at a later date. For current information, please refer to your Firepower Management Center or Snort.org. A few Sigs and some others | |||
|
wishing we were congress |
this thing is really big in scope There have been reports of infections in 99 countries, including the UK, US, China, Russia, Spain, Italy and Taiwan. http://www.bbc.com/news/technology-39901382 Some experts say the attack may be have been built to exploit a weakness in Microsoft systems that was identified by the NSA and given the name EternalBlue. The NSA tools were then stolen by a group of hackers known as The Shadow Brokers, who then attempted to sell the encrypted cache in an online auction. However they subsequently made the tools freely available, releasing a password for the encryption on 8 April. The hackers said they had published the password as a "protest" about US President Donald Trump. At the time, some cyber-security experts said some of the malware was real, but old. A patch for the vulnerability was released by Microsoft in March, but many systems may not have had the update installed. Microsoft said on Friday its engineers had added detection and protection against WannaCrypt. The company was providing assistance to customers, it added. Some security researchers have pointed out that the infections seem to be deployed via a worm - a program that spreads by itself between computers. Unlike many other malicious programs, this one has the ability to move around a network by itself. Most others rely on humans to spread by tricking them into clicking on an attachment harbouring the attack code. By contrast, once WannaCry is inside an organisation it will hunt down vulnerable machines and infect them too. This perhaps explains why its impact is so public - because large numbers of machines at each victim organisation are being compromised. | |||
|
Puddle Pirate |
Keep in mind all, 300 bitcoin is valued at about half a million USD. Different currency. Could be payday for someone... | |||
|
Drill Here, Drill Now |
The screen capture says $300 worth of bitcoin not 300 bitcoin Ego is the anesthesia that deadens the pain of stupidity DISCLAIMER: These are the author's own personal views and do not represent the views of the author's employer. | |||
|
Member |
Ransomware flood stopped for $10.69. https://www.google.com/amp/s/a...somware-cyber-attack | |||
|
Do No Harm, Do Know Harm |
Makes a man want to just pull the plug. Our dependency on the Internet rivals only our dependency on cars and electricity. It seems like every one of these Internet breaches etc, are the largest ever...until the next one. Knowing what one is talking about is widely admired but not strictly required here. Although sometimes distracting, there is often a certain entertainment value to this easy standard. -JALLEN "All I need is a WAR ON DRUGS reference and I got myself a police thread BINGO." -jljones | |||
|
Oh stewardess, I speak jive. |
Yep, and now people have connected Thermostats, Door Bells, Dead Bolts, Garage Door Openers, and more... just wait until that shit starts becoming a regular vector of attack. It's coming. Maybe not today or tomorrow, but soon enough. | |||
|
Member |
Its called IoT or the internet of things. Wait till those amazon Echos are subverted then you'll properly lose your mind.
______________________________________________ Life is short. It’s shorter with the wrong gun… | |||
|
Member |
How does the NSA, one of our top secure agencies, lose "tools?" | |||
|
Member |
Probably from anyone of the dozens of previous employees who left the agency for higher paying non government jobs.
______________________________________________ Life is short. It’s shorter with the wrong gun… | |||
|
wishing we were congress |
A 'kill switch' is slowing the spread of WannaCry ransomware http://www.pcworld.com/article...acry-ransomware.html Friday’s unprecedented ransomware attack may have stopped spreading to new machines -- at least briefly -- thanks to a "kill switch" that a security researcher has activated. the ransomware also contains a kill switch that may have backfired on its developers, according to security researchers. Wana Decryptor infects systems through a malicious program that first tries to connect to an unregistered web domain. The kill switch appears to work like this: If the malicious program can’t connect to the domain, it’ll proceed with the infection. If the connection succeeds, the program will stop the attack. A security researcher who goes by the name MalwareTech found that he could activate the kill switch by registering the web domain and posting a page on it. MalwareTech's original intention was to track the ransomware's spread through the domain it was contacting. “It came to light that a side effect of us registering the domain stopped the spread of the infection,” he said in an email. Security firm Malwarebytes and Cisco’s Talos security group reported the same findings and said new ransomware infections appear to have slowed since the kill switch was activated. However, Malwarebytes researcher Jerome Segura said it’s too early to tell whether the kill switch will stop the Wana Decryptor attack for good. He warned that other versions of the same ransomware strain may be out there that have fixed the kill-switch problem or are configured to contact another web domain. Unfortunately, computers already infected with Wana Decryptor will remain infected, he said. Friday’s ransomware attack first spread through a massive email phishing campaign. At least some of those emails appeared to be messages from a bank about a money transfer, according to Cisco’s Talos group. Security firm Avast said it had detected more than 75,000 attacks in 99 countries, with Russia, Ukraine and Taiwan among the hardest-hit countries. The U.K.’s National Health Service was one of the biggest organizations hit by the ransomware. The ransomware was designed to work in numerous languages, including English, Chinese and Spanish, with ransom notes in each. ********************* I always wonder if it wise to publicly report discoveries like this. (that the kill switch was found in the code) | |||
|
Member |
Fwiw. Yesterday I had an email supposedly from a 63 year old, high school graduate, US ex-client, female, who supposedly sent the email from a domain in .au. http://www.mailwasher.net/ allowed me to see from where it originated, among other giveaways. What mailwasher does, among other things, is that you can wash away emails before they reach your inbox. It serves exceedingly well as a frontline measure. *************************** Knowing more by accident than on purpose. | |||
|
Step by step walk the thousand mile road |
Microsoft ought to send "MalwareTech" the 22 year old who found a kill switch in the code about $100M. The NSA needs to hire him for the challenge he'd face. The domain cost him $10.69 but looks to have stopped it cold. Nice is overrated "It's every freedom-loving individual's duty to lie to the government." Airsoftguy, June 29, 2018 | |||
|
member |
This Windows vulnerability is so dangerous and exploitable, that Microsoft even relented and issued a patch for XP, which is past its support deadline. Ars Technica article. | |||
|
Powered by Social Strata | Page 1 2 3 |
Please Wait. Your request is being processed... |