Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 
5133 posts

Uber Geek
+1 received by user: 1435

Trusted
Microsoft

  # 1783637 17-May-2017 12:36
Send private message

Rikkitic:

 

Does Win 10 require patching? I thought it wasn't vulnerable.

 

 

 

 

The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack.

 

You should install the latest Quality Update for Windows 10.


5133 posts

Uber Geek
+1 received by user: 1435

Trusted
Microsoft

  # 1783639 17-May-2017 12:37
Send private message

gzt: What is the initial vector? Word document or executable?

 

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios that we believe are highly possible explanations for the spread of this ransomware:

 

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer is addressable from other infected machines

 
 
 
 


1862 posts

Uber Geek
+1 received by user: 548


  # 1783706 17-May-2017 14:35
Send private message

Pretty sure you've got it right there. There's a google search you can perform that provides links to infected websites that are used to host the payload as linked to in the email.

I'm not sure iof what is generating the spam in the first place but likely from pwnd mailboxes.

588 posts

Ultimate Geek
+1 received by user: 188
Inactive user


  # 1784107 18-May-2017 12:17
Send private message

nathan:

 

gzt: What is the initial vector? Word document or executable?

 

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios that we believe are highly possible explanations for the spread of this ransomware:

 

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer is addressable from other infected machines

 

Microsoft is it's own worst enemy actively allowing Malware to be advertised within its own products.

 

See current Skype ad below which directs to one of those fake anti-virus malware sites:

 

 

Not to mention the quantity of dubious Apps in the Windows Store last time I looked; unsurprising why people are so concerned about Windows 10 telemetry and increased advertising pushed to the desktop / Explorer.


BDFL - Memuneh
63895 posts

Uber Geek
+1 received by user: 14360

Administrator
Trusted
Geekzone
Lifetime subscriber

  # 1784152 18-May-2017 12:21
2 people support this post
Send private message

It's money over sense/responsibility. Same with Stuff, NZ Herald and others running these sponsored links.

 

Meanwhile, someone added Geekzone to the Easylist and blocks everything (not only ads but other scripts too). Not because we distribute malware but because this person thinks he's the only one to dictate what we should show. And yes, he's a Geekzone registered user.





3312 posts

Uber Geek
+1 received by user: 896

Trusted
Lifetime subscriber

  # 1784166 18-May-2017 12:31
One person supports this post
Send private message

freitasm:

 

It's money over sense/responsibility. Same with Stuff, NZ Herald and others running these sponsored links.

 

Meanwhile, someone added Geekzone to the Easylist and blocks everything (not only ads but other scripts too). Not because we distribute malware but because this person thinks he's the only one to dictate what we should show. And yes, he's a Geekzone registered user.

 

 

 

 

I bet he also does not pay a subscription :P 


436 posts

Ultimate Geek
+1 received by user: 145
Inactive user


  # 1784588 19-May-2017 08:58
Send private message

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 


 
 
 
 


5133 posts

Uber Geek
+1 received by user: 1435

Trusted
Microsoft

  # 1785026 20-May-2017 10:17
Send private message

vulcannz:

 

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 

 

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?


BDFL - Memuneh
63895 posts

Uber Geek
+1 received by user: 14360

Administrator
Trusted
Geekzone
Lifetime subscriber

  # 1785041 20-May-2017 11:45
Send private message

nathan:

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

From Symantec:

 

"Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates."





5133 posts

Uber Geek
+1 received by user: 1435

Trusted
Microsoft

  # 1785370 21-May-2017 02:28
Send private message

freitasm:

 

nathan:

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

From Symantec:

 

"Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates."

 

 

that's not a signature.  I'm curious to know more about this piece:

 

"Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). " 


436 posts

Ultimate Geek
+1 received by user: 145
Inactive user


  # 1785781 22-May-2017 09:31
Send private message

nathan:

 

vulcannz:

 

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 

 

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

Sure...

 

https://support.sonicwall.com/kb/229442

 

 

If you are a SonicWall customer, and you have an active Gateway Anti-Virus subscription, your SonicWall firewall has been protecting your network from WannaCry (also known as WanaCrypt0r or WannaCrypt) ransomware since April 20, 2017.

 

There are also IPS signatures for the worm side of things...

 

 

 

https://blog.sonicwall.com/2017/05/sonicwall-protects-customers-latest-massive-wannacry-ransomware-attack/

 

 

 

I suspect there will be other vendors with similar stuff, as the IPS signatures were derived from the leaked NSA hacks. And most security vendors having a group where they share signature data. Sandbox technology will also pick up such things (and then provide a source to derive new signatures).


BDFL - Memuneh
63895 posts

Uber Geek
+1 received by user: 14360

Administrator
Trusted
Geekzone
Lifetime subscriber

  # 1785783 22-May-2017 09:35
Send private message

I've updated the previous post to show the image - the poster updated over it to show a link. No problem.

 

Folks, remember that now that we are serving only HTTPS if you add images from HTTP these will not appear as most browsers will deem these "unsafe".





436 posts

Ultimate Geek
+1 received by user: 145
Inactive user


  # 1785792 22-May-2017 09:45
Send private message

Yeah sorry saw the image didn't work, so posted the link. It's monday, cold, and caffeine is still kicking in.


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 
View this topic in a long page with up to 500 replies per page Create new topic



Twitter and LinkedIn »



Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Dunedin selects Telensa to deliver smart street lighting for 15,000 LEDs
Posted 18-Jul-2019 10:21


Sprint announces a connected wallet card with built-in IoT support
Posted 18-Jul-2019 08:36


Educational tool developed at Otago makes international launch
Posted 17-Jul-2019 21:57


Symantec introduces cloud access security solution
Posted 17-Jul-2019 21:48


New Zealand government unveils new digital service to make business easier
Posted 16-Jul-2019 17:35


Scientists unveil image of quantum entanglement
Posted 13-Jul-2019 06:00


Hackers to be challenged at University of Waikato
Posted 12-Jul-2019 21:34


OPPO Reno Z now available in New Zealand
Posted 12-Jul-2019 21:28


Sony introduces WF-1000XM3 wireless headphones with noise cancellation
Posted 8-Jul-2019 16:56


Xero announces new smarter tools, push into the North American market
Posted 19-Jun-2019 17:20


New report by Unisys shows New Zealanders want action by social platform companies and police to monitor social media sites
Posted 19-Jun-2019 17:09


ASB adds Google Pay option to contactless payments
Posted 19-Jun-2019 17:05


New Zealand PC Market declines on the back of high channel inventory, IDC reports
Posted 18-Jun-2019 17:35


Air New Zealand uses drones to inspect aircraft
Posted 17-Jun-2019 15:39


TCL Electronics launches its first-ever 8K TV
Posted 17-Jun-2019 15:18



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.


Support Geekzone »

Our community of supporters help make Geekzone possible. Click the button below to join them.

Support Geezone on PressPatron



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.