Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 
4952 posts

Uber Geek
+1 received by user: 1316

Trusted
Microsoft

  Reply # 1783637 17-May-2017 12:36
Send private message

Rikkitic:

 

Does Win 10 require patching? I thought it wasn't vulnerable.

 

 

 

 

The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack.

 

You should install the latest Quality Update for Windows 10.


4952 posts

Uber Geek
+1 received by user: 1316

Trusted
Microsoft

  Reply # 1783639 17-May-2017 12:37
Send private message

gzt: What is the initial vector? Word document or executable?

 

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios that we believe are highly possible explanations for the spread of this ransomware:

 

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer is addressable from other infected machines

 
 
 
 


Try Wrike: fast, easy, and efficient project collaboration software
1515 posts

Uber Geek
+1 received by user: 375


  Reply # 1783706 17-May-2017 14:35
Send private message

Pretty sure you've got it right there. There's a google search you can perform that provides links to infected websites that are used to host the payload as linked to in the email.

I'm not sure iof what is generating the spam in the first place but likely from pwnd mailboxes.

468 posts

Ultimate Geek
+1 received by user: 103

Subscriber

  Reply # 1784107 18-May-2017 12:17
Send private message

nathan:

 

gzt: What is the initial vector? Word document or executable?

 

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios that we believe are highly possible explanations for the spread of this ransomware:

 

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer is addressable from other infected machines

 

Microsoft is it's own worst enemy actively allowing Malware to be advertised within its own products.

 

See current Skype ad below which directs to one of those fake anti-virus malware sites:

 

 

Not to mention the quantity of dubious Apps in the Windows Store last time I looked; unsurprising why people are so concerned about Windows 10 telemetry and increased advertising pushed to the desktop / Explorer.


BDFL - Memuneh
60034 posts

Uber Geek
+1 received by user: 11121

Administrator
Trusted
Geekzone
Lifetime subscriber

  Reply # 1784152 18-May-2017 12:21
2 people support this post
Send private message

It's money over sense/responsibility. Same with Stuff, NZ Herald and others running these sponsored links.

 

Meanwhile, someone added Geekzone to the Easylist and blocks everything (not only ads but other scripts too). Not because we distribute malware but because this person thinks he's the only one to dictate what we should show. And yes, he's a Geekzone registered user.





2793 posts

Uber Geek
+1 received by user: 677

Trusted
Lifetime subscriber

  Reply # 1784166 18-May-2017 12:31
One person supports this post
Send private message

freitasm:

 

It's money over sense/responsibility. Same with Stuff, NZ Herald and others running these sponsored links.

 

Meanwhile, someone added Geekzone to the Easylist and blocks everything (not only ads but other scripts too). Not because we distribute malware but because this person thinks he's the only one to dictate what we should show. And yes, he's a Geekzone registered user.

 

 

 

 

I bet he also does not pay a subscription :P 


217 posts

Master Geek
+1 received by user: 37


  Reply # 1784588 19-May-2017 08:58
Send private message

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 


4952 posts

Uber Geek
+1 received by user: 1316

Trusted
Microsoft

  Reply # 1785026 20-May-2017 10:17
Send private message

vulcannz:

 

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 

 

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?


BDFL - Memuneh
60034 posts

Uber Geek
+1 received by user: 11121

Administrator
Trusted
Geekzone
Lifetime subscriber

  Reply # 1785041 20-May-2017 11:45
Send private message

nathan:

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

From Symantec:

 

"Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates."





4952 posts

Uber Geek
+1 received by user: 1316

Trusted
Microsoft

  Reply # 1785370 21-May-2017 02:28
Send private message

freitasm:

 

nathan:

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

From Symantec:

 

"Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates."

 

 

that's not a signature.  I'm curious to know more about this piece:

 

"Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). " 


217 posts

Master Geek
+1 received by user: 37


  Reply # 1785781 22-May-2017 09:31
Send private message

nathan:

 

vulcannz:

 

clinty:


I imagine by now most good AV signatures have been updated

Clint

 

 

 

Signatures were available for both the malware and the SMB attack around mid-April from some security vendors (well before the big outbreaks). For all the frothing at the mouth about this malware suddenly appearing it was known about already.

 

It boils down to people have a combination of : old unpatched OSs/ bad email security-anti-spam / poor network security / and poor desktop AV.

 

 

 

 

do you have a source that shows that the AV signatures to understand "WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY" were available prior to May 12 please?

 

 

Sure...

 

https://support.sonicwall.com/kb/229442

 

 

If you are a SonicWall customer, and you have an active Gateway Anti-Virus subscription, your SonicWall firewall has been protecting your network from WannaCry (also known as WanaCrypt0r or WannaCrypt) ransomware since April 20, 2017.

 

There are also IPS signatures for the worm side of things...

 

 

 

https://blog.sonicwall.com/2017/05/sonicwall-protects-customers-latest-massive-wannacry-ransomware-attack/

 

 

 

I suspect there will be other vendors with similar stuff, as the IPS signatures were derived from the leaked NSA hacks. And most security vendors having a group where they share signature data. Sandbox technology will also pick up such things (and then provide a source to derive new signatures).


BDFL - Memuneh
60034 posts

Uber Geek
+1 received by user: 11121

Administrator
Trusted
Geekzone
Lifetime subscriber

  Reply # 1785783 22-May-2017 09:35
Send private message

I've updated the previous post to show the image - the poster updated over it to show a link. No problem.

 

Folks, remember that now that we are serving only HTTPS if you add images from HTTP these will not appear as most browsers will deem these "unsafe".





217 posts

Master Geek
+1 received by user: 37


  Reply # 1785792 22-May-2017 09:45
Send private message

Yeah sorry saw the image didn't work, so posted the link. It's monday, cold, and caffeine is still kicking in.


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

TCF and Telcos Toughen Up on Scam Callers
Posted 23-Apr-2018 09:39


Amazon launches the International Shopping Experience in the Amazon Shopping App
Posted 19-Apr-2018 08:38


Spark New Zealand and TVNZ to bring coverage of Rugby World Cup 2019
Posted 16-Apr-2018 06:55


How Google can seize Microsoft Office crown
Posted 14-Apr-2018 11:08


How back office transformation drives IRD efficiency
Posted 12-Apr-2018 21:15


iPod laws in a smartphone world: will we ever get copyright right?
Posted 12-Apr-2018 21:13


Lightbox service using big data and analytics to learn more about customers
Posted 9-Apr-2018 12:11


111 mobile caller location extended to iOS
Posted 6-Apr-2018 13:50


Huawei announces the HUAWEI P20 series
Posted 29-Mar-2018 11:41


Symantec Internet Security Threat Report shows increased endpoint technology risks
Posted 26-Mar-2018 18:29


Spark switches on long-range IoT network across New Zealand
Posted 26-Mar-2018 18:22


Stuff Pix enters streaming video market
Posted 21-Mar-2018 09:18


Windows no longer Microsoft’s main focus
Posted 13-Mar-2018 07:47


Why phone makers are obsessed with cameras
Posted 11-Mar-2018 12:25


New Zealand Adopts International Open Data Charter
Posted 3-Mar-2018 12:48



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.