which again has sod all to the post of mine you had issues with.In terms of the Wanncry itself, yes, thats true, but it wont be the only one out there and has probably been changed and resubmitted and I'm expecting other companies come monday morning to say they have been hit. It's just lucky this was on a Friday rather than a Monday. That's my point of all systems that use SMB1 can be impacted, the worm exploits the EternalBlue issue, which impacts the OSes I've listed.
Of course.Only if unpatched
I'm just surprised it's taken this long for this to happen. Cryptolocker viruses aren't exactly new, and there are plenty of ignorant people infecting their company PCs daily.
I'm also shocked there hasn't been a single reference to Mr Robot in all this, since it's almost the exact same scenario (except the victim wasn't someone like Google/Apple).
Previously they've been less sophisticated and not utilised capabilities like SMB to break out from the initial infection - as I've been saying in some of the threads slowly these are being packaged up with more sophisticated tools and increasingly there is attention being paid to things like infecting IoT devices or hiding copies of it away in device firmware (for instance NAS boxes) to reactivate at a later date when people think the infection has gone, etc. I'm not quite sure at what level and on what timeframe that kind of stuff is making its way into the wild.
I've read accounts on here before of these viruses spreading from PC to PC and encrypting everything, so I thought this was old hat, but I'm not exactly well informed on how this stuff works. I read this was based on a virus stolen from the NSA, but I don't know what it does that other ones don't (I guess the SMB thing you referenced).
I've read accounts on here before of these viruses spreading from PC to PC and encrypting everything, so I thought this was old hat, but I'm not exactly well informed on how this stuff works. I read this was based on a virus stolen from the NSA, but I don't know what it does that other ones don't (I guess the SMB thing you referenced).
Previously crypto-malware spread via email attachments (hey look at this invoice.zip), compromised websites/banner ad networks exploiting browser vulnerabilities to execute code. This was different because it used an RCE vulnerability in SMBv1 that the NSA knew about and kept secret, until it was all leaked. Using this exploit gave the crypto malware worm-like capabilities.
I was working there at the end of last year on a contract when someone in support sent a test email to a new Outlook distribution group which they had accidentally added pretty much the entire NHS staff mailing list to. Then people started doing "Reply All" to the message saying things like "Please remove me from this group"/"You sent me this in error" and this multiplied out into millions(?) of emails and brought the entire NHS email system to a halt. It even ended up on the BBC and I believe The Sun even named the support person who sent the initial email.There will be I.T departments up and down the land dreading tomorrow when the 60% of the PCs in the NHS are switched on and logged into again after being switched off for the weekend.
That is circa a million people.
AFAIK unless you have systems directly exposed to the internet it still needs to get a foot in the door via someone opening an attachment or the recent issue where an attachment could compromise the systems scanning the attachment before anyone even opened it.
There will be I.T departments up and down the land dreading tomorrow when the 60% of the PCs in the NHS are switched on and logged into again after being switched off for the weekend.
That is circa a million people.
That is my understanding as well unless someone is stupid enough to expose SMB ports to the internet. The problem is that lots of enterprises still only focus on protecting the network edge, and consider everything within the network to be trusted. See how it seems that office desktop PCs can have unrestricted access to the systems that run the digital signs on German railway stations.
http://www.bbc.co.uk/news/technology-39913630
Europol think it was just the beginning and more attacks are imminent.
Cynically, it's just talk and they're gearing for more funding like any good little public body does. In the end, it's just another step on the grand road of authority without question.