You're thinking of the older spam emails containing ransomware attachments like "notavirus.pdf.exe", this attack is regarding a worm that can install itself via Windows security flaws leaked by the NSA. The patches being discussed fix the flaw.Patched or not - you forget that you still have to be stupid enough to open the attachment on these emails.
You're thinking of the older spam emails containing ransomware attachments like "notavirus.pdf.exe", this attack is regarding a worm that can install itself via Windows security flaws leaked by the NSA. The patches being discussed fix the flaw.
Patched or not - you forget that you still have to be stupid enough to open the attachment on these emails. In a home you have the small % users opening the attachment and infecting their machine and limited to probably 1 device. In a corporate environment you have a lot of users and it only takes one fool to open it to infect their machine and the malware will then try to infect other machines on the network or shared drives which is a much easier propagation of the malware.
And as with other ransomware it has the headache that an unpatched computer can wreck havoc on a patched computer/server if it has network access to a shared drive/folder.Because of the Windows vulnerability, unless you're specifically patched to protect you against it, you'll get it and all other PCs within the network will as well if not patched.
This particular program infects machines using port 139 or port 445 and exploits a vulnerability within Windows. It doesn't work the same as the other CryptoLocker variants that have been out there recently. Because of the Windows vulnerability, unless you're specifically patched to protect you against it, you'll get it and all other PCs within the network will as well if not patched. It isn't necessarily down to a single person opening up an email.
Here is a good write up from Cisco on the attack:-
http://blog.talosintelligence.com/2017/05/wannacry.html
It attacks using ports 139 / 445 so make sure they are closed as well as installing the required update.
The whole point that a lot of people seem to be missing is that once you are past the firewall/router, you can pretty much what you want if the OS is not secure.You can close ports 139 / 445 on your router / firewall instead of closing them in Windows.
I agree once the worm is running on a network machine it opens up 137/445 connections to other hosts and if vulnerable will infect. To activate the code someone of something needed to have run the attachment - once thats done its a free for all on a network. A simple firewall would block 137/445 inbound connections from the Internet by default to it needed to be transported inside an organisation (via email) and executed from within to be able to spread
You can close ports 139 / 445 on your router / firewall instead of closing them in Windows.
That's a good article, thanks.Here is a good write up from Cisco on the attack:-
http://blog.talosintelligence.com/2017/05/wannacry.html
It attacks using ports 139 / 445 so make sure they are closed as well as installing the required update.
This won't stop PCs from responding on those port numbers from internal requests though, because the router won't be responsible for handling these requests. The router will only block these requests from the outside. So if one of your internal PCs is already compromised, and your other PCs aren't patched against the exploit, they'll be infected as well. Your only protection in this case would be to have the patch on from MS to prevent infection.
If you have a proper firewall it will stop it sending out
This won't stop PCs from responding on those port numbers from internal requests though, because the router won't be responsible for handling these requests. The router will only block these requests from the outside. So if one of your internal PCs is already compromised, and your other PCs aren't patched against the exploit, they'll be infected as well. Your only protection in this case would be to have the patch on from MS to prevent infection.
I have received an email in to my gmail account with a ZIP attachment, be careful people! Have warned people on facebook etc.
Is there anyone left to warn?
If people still open strange e-mails with attachments after the amount of press coverage over the weekend, they are just too plain stupid to be allowed a PC.