Jump to content

NHS hit by major cyber attack with hackers demanding ransom


tao

Recommended Posts

6 minutes ago, 0bin said:

And why such tools can be stolen? Shouldn't be keeped offline?

It don't  matter if they keep them offline some rouge contractor  can copy them off a hard drive  and give them too a hacker Group we really dont if they stole them online or not or someone in there group worked for the NSA or did someone give it too them it or  did they buy them?

Link to comment
Share on other sites


  • Replies 32
  • Views 3.2k
  • Created
  • Last Reply
1 minute ago, 0bin said:

My opinion, those "weapons" were sold to various countries, they copied from the weaken point, not certainly from who created that.

They had them on sale on the darknet for a very long time and no one would  buy them so they release the code in the wild no one seem interested  or ether they already had them or didn't believe them some hackers sell fakes and there a new group from 2016.

Link to comment
Share on other sites


2 minutes ago, 0bin said:

Something told me there is not only eternal blue if they wanna show some magic, 

Rasomware to me is malware for dummies  most of it comes  from Microsoft documents  and spam emails  . It's like the old days in the chatrooms you meet someone you did not know and you allowed them send you file and you got infected with a virus  . Places should not allow people to open there emails  at work without making them taking a safety course on rasomware 1st.

Link to comment
Share on other sites


3 minutes ago, 0bin said:

Like times of nokia bluetooth?

As long as people stay dumb and hackers  can get away with it in emails smart people wont have too worry that much  .But once everyone catches on the hackers will spread it a different way then we may have too worry but rasomware has been back now since 2013 and still they are getting away with it in emails .

Link to comment
Share on other sites


1 minute ago, 0bin said:

This is a channel on yt i follow to see review of ransomware, maybe can be useful to see the pattern, the hollow, the tools

 

https://www.youtube.com/channel/UCv5keDaFSoFO2vK1UJSD-8w/videos

 

 

Over on MAC OS most malware comes from Microsoft Office but even once they had a outbreak of ransomware in Transmission BitTorrent  for MAC  this is a different  that is in Windows and Linux witch is  a fork Transmission QT  .. The ransomware they found on  Linux has always been easily decrypted  so far  and  it only mostly effects Linux Server so it sounds like it may be being spreed trough handling windows files too .because people on server upload and download lots of files for windows.

Link to comment
Share on other sites


Woody

4 hours ago, steven36 said:

I don't want hear no more about  Woody has too say for a few years  hes been promoting not doing updates

 

Fisrtly, the March Windows updates contained the patch (MS17-010) to prevent this recent EternalBlue exploit (and EternalRomance and EternalSynergy), and Woody OK'd those updates long before this ransomware appeared. So, following his advice would have kept you safe.

 

Secondly, he's not promoting not applying updates at all. He's promoting not applying them until they're safe. The dilemma people have is that applying updates immediately to patch any vulnerabilities also runs a significant risk of Microsoft borking something with their less than stellar quality patches.

 

In the fantasy world that Microsoft seems to live in, all patches are perfect. History proves that the real world is quite different.

 

4 hours ago, steven36 said:

He just changed his tune here in last few months after he seen how bad things are again.

 

No he hasn't. He OK'd the April updates early only because the risks (Double Pulsar malware) of NOT applying them outweighed any bugs in them. Again, if people had applied the March updates when Woody ruled them safe, they would have been safely patched against EternalBlue long before this exploit appeared.

 

That's one of the downsides of bundled updates. Gotta take the bad with the good.

 

Oh, and before anyone thinks that Windows 10 is safer because zero Windows 10 devices were affected, the malware developers deliberately avoided infecting Windows 10 devices because they feared that the rampant Windows 10 telemetry may allow them to be identified.

Link to comment
Share on other sites


2 hours ago, Karlston said:

 

https://i.imgur.com/jZF9Sfm.jpg

 

https://i.imgur.com/CjntNoY.jpg

 

Why are you yelling at me about windows 10 man? It's Not my problem,  I don't use Windows 10  anymore. if i go on windows i use windows 8.1 because it works better for me Mostly i just stay on Linux  . I'm no Dummy and I don't need no Windows for Dummies advice. :P

 

 

 

Does  this look like Windows 10 too you ?

https://i.imgur.com/MGmp2tY.png

 

Link to comment
Share on other sites


5 hours ago, Karlston said:

Oh, and before anyone thinks that Windows 10 is safer because zero Windows 10 devices were affected, the malware developers deliberately avoided infecting Windows 10 devices because they feared that the rampant Windows 10 telemetry may allow them to be identified.

That's BS man the only version Windows 10 that wasn't patched was  Redstone  2 because  it was patched as a insiders build 

 

Quote

. The patch was to the Server Message Block (SMB) protocol used by Windows.

https://en.wikipedia.org/wiki/WannaCry_ransomware_attack

 

SMB Zero-Day Affects Several Windows Versions, Including Windows 10

https://www.bleepingcomputer.com/news/security/smb-zero-day-affects-several-windows-versions-including-windows-10/
Quote

 

Microsoft Security Bulletin MS17-010 - Critical

Security Update for Microsoft Windows SMB Server (4013389)

 

https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

https://i.imgur.com/QsPjzOS.png

They patched the SMB) protocol in March on Windows 10 as well just the creators was patched before they released  the ISO  they had suppose too had patched it in Feb.

You need too put you're tinfoil hat away bro ,the only reason you would not got  this patch on windows 10 is if you was blocking updates and didn't do them.

 

See i always blocked updates when i was on Windows 10 with a firewall but I still done the security updates on patch Tuesday  I just didn't always do the OS improvement updates at the end of the month because you was going get them on patch Tuesday anyway.

 

It was a 0day back in Feb patched in March you are vulnerable if you didn't do updates in ether March .April or May  you had 3 mths too patch  it was not a 0 day anymore they infected people who were on OS that didn't get updates or  who had updates blocked or turned off for over 3 mths without doing updates.

 

And I figured it out on my own.  Woody wanted to know was it all Windows 10 versions because  of what Dona Sarkar said but she was just talking about the creators update and latter .. I read about what he said on Wikipedia today. Don't he know how too look it up for himself ? Evidently not! He just  waits for his members too tell him things and reads blog post  from this week. Too find stuff out you must research back to before it was patched and when it was patched. 


 

Quote

 

According to Dona Sarkar, head of the Windows Insider Program at Microsoft, Windows 10 was not affected;however, IT writer Woody Leonhard questioned if this is the case with all Windows 10 systems, or just builds 14393.953 and later.

 

 

 

https://en.wikipedia.org/wiki/WannaCry_ransomware_attack

 

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...