• Software
  • I Hope No One Here Gets Hit With This New Ransomware!
2017/05/15 16:00:42
dlesaux
I haven't seen any posts about this besides one from a few months ago. Stay safe folks! Keep your security patches up to date! I wish you all well!
2017/05/15 16:20:03
azslow3
I can add:
* keep your USB backup drives DISCONNECTED from the PC.
* do not expose your Network based backup storage as a writable shared disk.
 
Note that unlike previous incarnations, which was distributed as a malware (it had to be "clicked" to become active), the last version can be locally distributed as a virus, so can be activated on vulnerable system without user actions. At least that is how I have understood (I must say rather pure) description in the Internet.
The good news (if I understand the procedure correctly, I have analyzed only previous version but "registration of one domain name has solved future distribution" confirms that), encryption code is still downloaded from the Internet. I mean even when virus is already in the local system and now wants activate a new system, that is not going to work. In other words if your particular computer is not infected already, it can not be infected by the version injected 3 days ago.
 
2017/05/15 18:06:30
abacab
This particular malware exploits a flaw that Microsoft released a patch for in the monthly rollups for supported systems in March 2017.  https://technet.microsoft...rary/security/MS17-010
 
Apparently when one system gets infected, this thing can spread by worming it's way into all vulnerable systems on that network.
 
So if you installed the March updates, you should be good.  There is also a special patch available for Win XP and other recently unsupported Windows systems available from the Microsoft catalog.
 
There is evidence that in many ransomware cases such as this, the initial infection arrives as an email attachment that executes a .hta file.  This connects to a malware domain over the web, and downloads the payload.
 
So stay patched, run a good AV, and don't open any sketchy email attachments! 
2017/05/15 18:14:12
abacab
azslow3
 
The good news (if I understand the procedure correctly, I have analyzed only previous version but "registration of one domain name has solved future distribution" confirms that), encryption code is still downloaded from the Internet. I mean even when virus is already in the local system and now wants activate a new system, that is not going to work. In other words if your particular computer is not infected already, it can not be infected by the version injected 3 days ago.
 



That was a clever hack of the "killswitch" domain.  https://www.wired.com/2017/05/accidental-kill-switch-slowed-fridays-massive-ransomware-attack/
 
But some experts are warning that since this exploit is now "in the wild", it will be simple for the bad guys to create variants that bypass this fix used against the latest exploit.  Possibly more to come!
2017/05/15 22:01:27
kennywtelejazz
Lots of decent people can get hurt with hacks like this one that is going on ..
I hope they catch the D Bags ....
My Chromebook has been working over time lately
 
Kenny
 
2017/05/15 23:47:31
ampfixer
Things like this are the reason you have to shut down a bunch of Win10 defaults for sharing and updating your system. I think the initial infections came through systems running XP. Of course that means big business and hospitals.
2017/05/16 01:47:39
Fleer
Get a Mac.
Edith: Macallan 1981. Nice.
2017/05/16 13:20:10
stevec
Fleer
Edith: Macallan 1981. Nice.



Oooh...   Macallan's 1981?  As in aged 35 years?  Nice.
2017/05/16 16:41:26
bitflipper
All you folks in the UK who may have had their surgeries cancelled due to this malware, you can thank our NSA.
 
The NSA identified the exploit years ago that allows this virus to propagate itself quickly over a LAN. But rather than notify Microsoft about it so that a defense could be patched into Windows, they elected to keep this information to themselves and use it for their own purposes.
 
The NSA then wrote software that capitalized on the exploit, presumably in order to infiltrate terrorist networks. Eventually, that software was stolen and released to the world, making it relatively easy for even technically semi-literate criminals to adapt it to their own nefarious schemes.
 
So to all you inconvenienced NHS patients, we American taxpayers say "you're welcome".
© 2025 APG vNext Commercial Version 5.1

Use My Existing Forum Account

Use My Social Media Account