1. Attachments are working again! Check out this thread for more details and to report any other bugs.

Ransomware attack

Discussion in 'Fred's House of Pancakes' started by bwilson4web, Jun 28, 2017.

  1. bwilson4web

    bwilson4web BMW i3 and Model 3

    Joined:
    Nov 25, 2005
    27,124
    15,389
    0
    Location:
    Huntsville AL
    Vehicle:
    2018 Tesla Model 3
    Model:
    Prime Plus


    A MacOS user, I've been somewhat amused to read:
    What is the Petya ransomware spreading across Europe? WIRED explains | WIRED UK

    Security companies are confident the Petya ransomware uses the same software exploit in Microsoft products that WannaCry was able to exploit. Symantec says it has confirmed the ransomware is using the Eternal Blue vulnerability that is believed to have been developed by the NSA.

    Both Symantec and F-Secure say that although Petya does encrypt systems it is slightly different to other types of ransomware. "Petya is a new ransomware with an evil twist: instead of encrypting files on disk, it will lock the entire disk, rendering it pretty much useless," F-Secure says. "Specifically, it will encrypt the filesystem’s master file table (MFT), which means the operating system is not able to locate files."

    Beek adds that Petya has not been disguised with a lot of sophistication. "It is using a fake certificate that is derived from Microsoft's Sysinternal tools," he says. "It's not heavily obfuscated I would say, so it is easy to read through the functionality of the ransomware."

    EternalBlue - Wikipedia

    EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE-2017-0144[7][8] in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows accepts specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.[9]

    I'm a little confused by the term,". . . vulnerability that is believed to have been developed by the NSA." NSA did not define or write the SMB code in Windows. Writing a program to demonstrate the flaw is not what I would call "developed". I would have said ". . . vulnerability that is believed to have been demonstrated by the NSA."

    One reason is when I was working as a network engineer, we got a 'hair on fire' notice of a problem, subsequently fixed, in Cisco IOS. So I wrote a program that verified the exploit if only to make sure we could test the fix when it came out. This was one of the old style, malformed packet overflow that crashed the Cisco IOS.

    So I tend to think of "developed" as what some obscure MicroSoft coder did to create the vulnerability. Showing the exploit is more "demonstrate".

    My understanding is this latest ransomware has no recovery. It demands payment but effectively wipes the disk. So even if the ransom is paid, there is no recovery.

    Bob Wilson
     
    #1 bwilson4web, Jun 28, 2017
    Last edited: Jun 28, 2017
    RCO likes this.
  2. Former Member 68813

    Former Member 68813 Senior Member

    Joined:
    Oct 3, 2010
    3,524
    981
    8
    Location:
    US
    Vehicle:
    Other Hybrid
    Model:
    N/A
    I thought that was patched back in March before the wannacry outbreak?
    BTW, one of the places I work for has operations limited by this attack. It's a healthcare outfit. My wife tells me her company HQ have their systems non-operational, but her local company is fine.

    some say Putin did it: The Petya ransomware is starting to look like a cyberattack in disguise - The Verge

    fortunately there is a way to prevent infection. i'm disappointed media didn't emphasize that: Cybereason’s Principal Security Researcher Amit Serper is First in World to Discover a Killswitch to Stop ‘NotPetya’ Ransomware
     
    #2 Former Member 68813, Jun 28, 2017
    Last edited: Jun 28, 2017
  3. bwilson4web

    bwilson4web BMW i3 and Model 3

    Joined:
    Nov 25, 2005
    27,124
    15,389
    0
    Location:
    Huntsville AL
    Vehicle:
    2018 Tesla Model 3
    Model:
    Prime Plus
  4. bisco

    bisco cookie crumbler

    Joined:
    May 11, 2005
    107,703
    48,947
    0
    Location:
    boston
    Vehicle:
    2012 Prius Plug-in
    Model:
    Plug-in Base
    i hope they don't. if apple gets too popular, the bad guys will start targeting them.
     
  5. RCO

    RCO Senior Member

    Joined:
    Aug 31, 2016
    3,709
    5,183
    0
    Location:
    Cornwall
    Vehicle:
    Other Hybrid
    Model:
    N/A
    Believe the problem continues because certain business are unable to take their systems offline to effect the remedy, eg some airlines and shipping conglomerates without effective machine redundancy.
     
  6. RCO

    RCO Senior Member

    Joined:
    Aug 31, 2016
    3,709
    5,183
    0
    Location:
    Cornwall
    Vehicle:
    Other Hybrid
    Model:
    N/A
    Too late. They already have started.
     
    bisco likes this.
  7. bisco

    bisco cookie crumbler

    Joined:
    May 11, 2005
    107,703
    48,947
    0
    Location:
    boston
    Vehicle:
    2012 Prius Plug-in
    Model:
    Plug-in Base
    :( at least i'm up to date in protection.
     
  8. RCO

    RCO Senior Member

    Joined:
    Aug 31, 2016
    3,709
    5,183
    0
    Location:
    Cornwall
    Vehicle:
    Other Hybrid
    Model:
    N/A
    Thought that was forbidden by the church!
     
    bisco likes this.
  9. bisco

    bisco cookie crumbler

    Joined:
    May 11, 2005
    107,703
    48,947
    0
    Location:
    boston
    Vehicle:
    2012 Prius Plug-in
    Model:
    Plug-in Base
    that's what confession is for.:oops:
     
    RCO likes this.
  10. Rmay635703

    Rmay635703 Senior Member

    Joined:
    Oct 16, 2016
    2,577
    1,601
    0
    Location:
    Somewhere in Wisconsin
    Vehicle:
    2013 Chevy Volt
    Model:
    N/A
    My Windows 98 system still works online just as well today as before the attacks
     
    RCO likes this.
  11. RCO

    RCO Senior Member

    Joined:
    Aug 31, 2016
    3,709
    5,183
    0
    Location:
    Cornwall
    Vehicle:
    Other Hybrid
    Model:
    N/A
    That's great. If it does what you need it to do, what more could you ask for. Mind you, there will be oodles of unpatched security vulnerabilities open to hackers should you ever take it online. It is that way that the so called botnets work.
     
  12. bisco

    bisco cookie crumbler

    Joined:
    May 11, 2005
    107,703
    48,947
    0
    Location:
    boston
    Vehicle:
    2012 Prius Plug-in
    Model:
    Plug-in Base
    my only concern is my charge card number, but i suppose they're more likely to get it from a vendor or even the guv'mint with my ss# than from my hard drive.
     
    RCO likes this.
  13. ETC(SS)

    ETC(SS) The OTHER One Percenter.....

    Joined:
    Oct 28, 2010
    7,673
    6,492
    0
    Location:
    Redneck Riviera (Gulf South)
    Vehicle:
    Other Non-Hybrid
    Model:
    N/A
    upload_2017-7-3_9-57-10.jpeg

    Ransomeware....or planned obsolescence for over priced hardware....

    My vote?

    ...Neither. :)


    Pretty soon Laptops, PCs, and notebooks will have all of the utility of floppy drives and laser disc movies, so perhaps Chrome OS will be a good alternative to those who cannot afford an i-thingy.....or at least so say the "experts."

    I had to resurrect an old winders box for a family member who is on a fixed income, and I decided to just throw him into the pool.
    I wiped his box and put........(scratching head.....) I think it was a Zorin distro and I showed him how to get onto the internet and how to load apps from the library.....and for the last several months he's been happy as a clam.
    The thing is.....you don't have to be a geek to run a Linux box these days and if you have access to a usta-box, then there's no monetary outlay.
    Also....these OS's are fairly hack resistant - something I do NOT say about windows or macs....

    YMMV

    DistroWatch.com: Put the fun back into computing. Use Linux, BSD.
     
    #13 ETC(SS), Jul 3, 2017
    Last edited: Jul 3, 2017
    RCO likes this.