New
#51
You're welcome to provide more info or details ChaCha.
I marked thread as solved for two reasons, MS claimed that they provided security fixes and because intention wasn't to fix the problem, but to inform about the leak in the first place... Admit marking as solved could be interpreted wrongly, thou
Um, yes, likely. Actually, these are nation-state-grade hacking tools (one of them even identifies as Stuxnet IIRC).
It was marked as solved, as there is no need for further assistance from other members here; only additional info can be provided - we can't resolve the vulnerabilities, that depends on MS.
you don't mark an article as solved. it's meant to be commented on whenever
And so the fun begins......
An NSA-derived ransomware worm is shutting down computers worldwide | Ars Technica
A highly virulent new strain of self-replicating ransomware is shutting down computers all over the world, in part by appropriating a National Security Agency exploit that was publicly released last month by the mysterious group calling itself Shadow Brokers.
The malware known as Wanna, Wannacry, or Wcry, has infected at least 57,000 computers, according to antivirus provider Avast. AV provider Kaspersky Lab said organizations in at least 74 countries have been affected, with Russia being disproportionately affected, followed by Ukraine, India, and Taiwan. The malware is notable for its multi-lingual ransom demands, which support more than two-dozen languages.
https://www.nytimes.com/2017/05/12/w...tack.html?_r=1
WanaCrypt0r ransomware hits it big just before the weekend - Malwarebytes Labs | Malwarebytes Labs...security detection technology could not easily catch the ransomware attacks, because the attackers encrypted the malicious file in email attachments. When employees at victim organizations clicked on the attachments, they inadvertently downloaded the ransomware onto their systems.
Hospitals across the UK hit by ransomware cyber attack, systems knocked offline | ZDNetThe ransomware is spread using a known, and patched, vulnerability (MS17-010) that came from a leaked NSA set of exploits that we reported on our blog in April. Our research shows the encryption is done with RSA-2048 encryption. That means that decryption will be next to impossible, unless the coders have made a mistake that we haven’t found yet.
Ransomware infections reported worldwide - BBC NewsNHS Trusts across the country appear are experiencing trouble with their IT systems, with some hospitals forced to shut down their computer networks entirely and urging patients not to visit Accident & Emergency departments.
Hospitals across the country are affected, ranging from hospitals in Manchester, Lister Hospital in Hertfordshire and Bart's Health NHS Trust in London - the largest hospital group in the UK.
"We are experiencing a major IT disruption and there are delays at all of our hospitals. We have activated our major incident plan to make sure we can maintain the safety and welfare of patients," said Barts in a statement.
"We are very sorry that we have to cancel routine appointments, and would ask members of the public to use other NHS services wherever possible. Ambulances are being diverted to neighbouring hospitals." The trust said the problem is also affecting the switchboard at Newham hospital but direct line phones are working.
Dozens of countries hit by huge cyberextortion attackA patch for the vulnerability was released by Microsoft in March, but many systems may not have had the update installed.
Microsoft said on Friday its engineers had added detection and protection against WannaCrypt. The company was providing assistance to customers, it added.
Some security researchers have pointed out that the infections seem to be deployed via a worm - a program that spreads by itself between computers.
Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, called it “the biggest ransomware outbreak in history.”
Security experts said the attack appeared to be caused by a self-replicating piece of software that enters companies and organizations when employees click on email attachments, then spreads quickly internally from computer to computer when employees share documents and other files.
Last edited by simrick; 12 May 2017 at 19:01.