Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 
4937 posts

Uber Geek
+1 received by user: 1314

Trusted
Microsoft

  Reply # 1783637 17-May-2017 12:36
Send private message

Rikkitic:

 

Does Win 10 require patching? I thought it wasn't vulnerable.

 

 

 

 

The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack.

 

You should install the latest Quality Update for Windows 10.


4937 posts

Uber Geek
+1 received by user: 1314

Trusted
Microsoft

  Reply # 1783639 17-May-2017 12:37
Send private message

gzt: What is the initial vector? Word document or executable?

 

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios that we believe are highly possible explanations for the spread of this ransomware:

 

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer is addressable from other infected machines

 
 
 
 


1438 posts

Uber Geek
+1 received by user: 339


  Reply # 1783706 17-May-2017 14:35
Send private message

Pretty sure you've got it right there. There's a google search you can perform that provides links to infected websites that are used to host the payload as linked to in the email.

I'm not sure iof what is generating the spam in the first place but likely from pwnd mailboxes.

412 posts

Ultimate Geek
+1 received by user: 85

Subscriber

  Reply # 1784107 18-May-2017 12:17
Send private message

nathan:

 

gzt: What is the initial vector? Word document or executable?

 

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios that we believe are highly possible explanations for the spread of this ransomware:

 

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer is addressable from other infected machines

 

Microsoft is it's own worst enemy actively allowing Malware to be advertised within its own products.

 

See current Skype ad below which directs to one of those fake anti-virus malware sites:

 

 

Not to mention the quantity of dubious Apps in the Windows Store last time I looked; unsurprising why people are so concerned about Windows 10 telemetry and increased advertising pushed to the desktop / Explorer.


BDFL - Memuneh
59056 posts

Uber Geek
+1 received by user: 10338

Administrator
Trusted
Geekzone
Subscriber

  Reply # 1784152 18-May-2017 12:21
2 people support this post
Send private message

It's money over sense/responsibility. Same with Stuff, NZ Herald and others running these sponsored links.

 

Meanwhile, someone added Geekzone to the Easylist and blocks everything (not only ads but other scripts too). Not because we distribute malware but because this person thinks he's the only one to dictate what we should show. And yes, he's a Geekzone registered user.





2552 posts

Uber Geek
+1 received by user: 577

Trusted
Subscriber

  Reply # 1784166 18-May-2017 12:31
One person supports this post
Send private message

freitasm:

 

It's money over sense/responsibility. Same with Stuff, NZ Herald and others running these sponsored links.

 

Meanwhile, someone added Geekzone to the Easylist and blocks everything (not only ads but other scripts too). Not because we distribute malware but because this person thinks he's the only one to dictate what we should show. And yes, he's a Geekzone registered user.

 

 

 

 

I bet he also does not pay a subscription :P 


174 posts

Master Geek
+1 received by user: 23


  Reply # 1784588 19-May-2017 08:58
Send private message

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 


4937 posts

Uber Geek
+1 received by user: 1314

Trusted
Microsoft

  Reply # 1785026 20-May-2017 10:17
Send private message

vulcannz:

 

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 

 

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?


BDFL - Memuneh
59056 posts

Uber Geek
+1 received by user: 10338

Administrator
Trusted
Geekzone
Subscriber

  Reply # 1785041 20-May-2017 11:45
Send private message

nathan:

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

From Symantec:

 

"Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates."





4937 posts

Uber Geek
+1 received by user: 1314

Trusted
Microsoft

  Reply # 1785370 21-May-2017 02:28
Send private message

freitasm:

 

nathan:

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

From Symantec:

 

"Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates."

 

 

that's not a signature.  I'm curious to know more about this piece:

 

"Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). " 


174 posts

Master Geek
+1 received by user: 23


  Reply # 1785781 22-May-2017 09:31
Send private message

nathan:

 

vulcannz:

 

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 

 

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

Sure...

 

https://support.sonicwall.com/kb/229442

 

 

If you are a SonicWall customer, and you have an active Gateway Anti-Virus subscription, your SonicWall firewall has been protecting your network from WannaCry (also known as WanaCrypt0r or WannaCrypt) ransomware since April 20, 2017.

 

There are also IPS signatures for the worm side of things...

 

 

 

https://blog.sonicwall.com/2017/05/sonicwall-protects-customers-latest-massive-wannacry-ransomware-attack/

 

 

 

I suspect there will be other vendors with similar stuff, as the IPS signatures were derived from the leaked NSA hacks. And most security vendors having a group where they share signature data. Sandbox technology will also pick up such things (and then provide a source to derive new signatures).


BDFL - Memuneh
59056 posts

Uber Geek
+1 received by user: 10338

Administrator
Trusted
Geekzone
Subscriber

  Reply # 1785783 22-May-2017 09:35
Send private message

I've updated the previous post to show the image - the poster updated over it to show a link. No problem.

 

Folks, remember that now that we are serving only HTTPS if you add images from HTTP these will not appear as most browsers will deem these "unsafe".





174 posts

Master Geek
+1 received by user: 23


  Reply # 1785792 22-May-2017 09:45
Send private message

Yeah sorry saw the image didn't work, so posted the link. It's monday, cold, and caffeine is still kicking in.


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Propel launch Disney Star Wars Laser Battle Drones
Posted 19-Nov-2017 21:26


UFB killer app: Speed
Posted 17-Nov-2017 17:01


The case for RSS — MacSparky
Posted 13-Nov-2017 14:35


WordPress and Indieweb: Take control of your online presence — 6:30 GridAKL Nov 30
Posted 11-Nov-2017 13:43


Chorus reveals technology upgrade for schools, students
Posted 10-Nov-2017 10:28


Vodafone says Internet of Things (IoT) crucial for digital transformation
Posted 10-Nov-2017 10:06


Police and Facebook launch AMBER Alerts system in NZ
Posted 9-Nov-2017 10:49


Amazon debuts Fire TV Stick Basic Edition in over 100 new countries
Posted 8-Nov-2017 05:34


Vodafone VoIP transition to start this month
Posted 7-Nov-2017 12:33


Spark enhances IoT network capability
Posted 7-Nov-2017 11:33


Vocus NZ sale and broadband competition
Posted 6-Nov-2017 14:36


Hawaiki reaches key milestone in landmark deep-sea fibre project
Posted 4-Nov-2017 13:53


Countdown launches new proximity online shopping app
Posted 4-Nov-2017 13:50


Nokia 3310 to be available through Spark New Zealand
Posted 4-Nov-2017 13:31


Nest launches in New Zealand
Posted 4-Nov-2017 12:31



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.