NHS computer systems hacked!?

Last edited:
That is just one aspect of how it works though - the overall package seems to have been crafted with the end goal of getting inside larger networks.

I'll repost Caged's link from before for those that might have missed it and still catching up:

Ah, but the malware at the core of this was developed by the NSA who likely did want that. But the people using it for ransomware are piggy-backing on it and their goals may not be the same.
 
Seems to be the reasoning - but anyone analysing it in a sandbox would quickly discover that and deactivate so seems more like just a way for them to run it for testing but kind of elaborate compared to a simple if statement.

EDIT: These kind of killswitches and controller domains aren't unusual in themselves but this implementation seems a bit odd - not sure if its just amateur work from script kiddies packaging it up or whether there is something more behind it.

Thanks for that. Very interesting.
 
Don't be obtuse... If the systems were funded to be secure/at least updated to something beyond the now ancient WinXP, this would have been incredibly unlikely to have occurred.
They removed funding for XP security, so yes it is THEIR fault.
http://www.mirror.co.uk/news/uk-news/tories-cut-security-support-outdated-10413160
The least they could to do was to keep funding it and force the NHS to update, rather than just leaving it completely undefended and asking a massive organisation to change within 3 years.

Hospital given money for budget, additional money for outdated systems cut, they can spend their money to upgrade any time they want.
Ooft.

So win7 also vulnerable. And firewalling it off the internet only makes the spread worse..

Very interesting.
So not the torys's fault chap who claimed it was lack of funding causing the XP to be exploited.

The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack.

Would suggest it was aimed as reasonably modern machines, forgoing the xp and older vulnerable machines.
Just if you didnt oatch since march you were in trouble.
 
Only if unpatched

Client OS from XP to windows 10 are vulnerable if using SMB v1
Server OS from 2003 to 2012R2 are vulnerable if using SMB v1

Basically anyone who has any form of file share using SMB v1.0 can be impacted by this.

Yet to see whats happening with 2000, I'm hoping we can just shut them down
 
Client OS from XP to windows 10 are vulnerable if using SMB v1
Server OS from 2003 to 2012R2 are vulnerable if using SMB v1

Basically anyone who has any form of file share using SMB v1.0 can be impacted by this.

Yet to see whats happening with 2000, I'm hoping we can just shut them down

from Microsoft
The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack.
 
Patch in question that resolves the exploit https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

more than just 2008 and earlier
for a start you first quoted me when I said unpatched, which nothing you have said backs you up. secondly just because its been patched doesn't mean the worm targeted these systems.
its already been posted but you can have a nice in depth read here
https://blogs.technet.microsoft.com...-ransomware-worm-targets-out-of-date-systems/
 
for a start you first quoted me when I said unpatched, which nothing you have said backs you up. secondly just because its been patched doesn't mean the worm targeted these systems.
its already been posted but you can have a nice in depth read here
https://blogs.technet.microsoft.com...-ransomware-worm-targets-out-of-date-systems/

In terms of the Wanncry itself, yes, thats true, but it wont be the only one out there and has probably been changed and resubmitted and I'm expecting other companies come monday morning to say they have been hit. It's just lucky this was on a Friday rather than a Monday. That's my point of all systems that use SMB1 can be impacted, the worm exploits the EternalBlue issue, which impacts the OSes I've listed.
 
Back
Top Bottom