NHS England hit by 'cyber attack'

Discussion in 'other security issues & news' started by clubhouse1, May 12, 2017.

  1. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
    http://www.bbc.co.uk/news/health-39899646
     
  2. plat1098

    plat1098 Guest

    Yeah, clubhouse1, this is very creepy, you know why? Just yesterday, there was an article here about an NYU breach involving military secrets and here was a reply:

    "Time to step back into a prehistoric era: put stuff on paper, make old fashioned Xerox copies, vacuum seal them and bury them somewhere a mile underground, with security mechanisms that include rings of toxic waste and a three-headed dog. Simple is best."

    https://www.wilderssecurity.com/thr...g-computer-project-to-entire-internet.393938/
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  4. Dark Star 72

    Dark Star 72 Registered Member

    Joined:
    May 27, 2007
    Posts:
    778
  5. Robin A.

    Robin A. Registered Member

    Joined:
    Feb 25, 2006
    Posts:
    2,557
  6. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    24,105
    Location:
    UK
    This is having a really, really big impact on hospitals and doctors surgeries across the UK.
    A really bad day.
     
  7. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "Cyberattacks in 12 Nations Said to Use Leaked N.S.A. Hacking Tool

    An extensive cyberattack struck computers across a wide swath of Europe and Asia on Friday, and strained the public health system in Britain, where doctors were blocked from patient files and emergency rooms were forced to divert patients.

    The attack involved ransomware, a kind of malware that encrypts data and locks out the user. According to security experts, it exploited a vulnerability that was discovered and developed by the National Security Agency.

    The hacking tool was leaked by a group calling itself the Shadow Brokers, which has been dumping stolen N.S.A. hacking tools online beginning last year. Microsoft rolled out a patch for the vulnerability last March, but hackers took advantage of the fact that vulnerable targets — particularly hospitals — had yet to update their systems..."

    https://www.nytimes.com/2017/05/12/...n-region&region=top-news&WT.nav=top-news&_r=0
     
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Yes, it is the SMB vulnerability being exploited as I noted in the other thread on the ransomware.

    Really no excuse for this since a patch was available 2 months ago. And if commercial concerns are running XP, they deserve to get nailed.
     
  9. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
    Concerning the NHS I think the first priority is getting systems up and running again then there will undoutably (sic)follow a full enquiry.
     
  10. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    This thing is HUGE !

    "Hack hits computers worldwide, exploiting a vulnerability identified in leaked NSA documents

    Malicious software that blocks access to computers is spreading swiftly across the world, snarling critical systems in hospitals, telecommunications, corporate offices and beyond, apparently with the help of a vulnerability discovered by the National Security Agency, cybersecurity experts say..."

    https://www.washingtonpost.com/worl..._rhp-banner-main_britain-240pm:homepage/story
     
  11. plat1098

    plat1098 Guest

  12. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  13. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Last edited: May 12, 2017
  14. mick92z

    mick92z Registered Member

    Joined:
    Apr 27, 2007
    Posts:
    548
    Location:
    Nottingham
    The only people who deserve to get nailed are the scum who are profiting from this malware, nailed literally to the floor.
     
  15. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    FedEx got hit.

    "...In a statement to NBC News, FedEx said that 'like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible.'

    The Memphis, Tennessee-based global delivery company did not immediately say whether a ransom was demanded for return of their computers' functions..."

    http://www.nbcnews.com/news/world/n...lish-hospitals-hackers-demand-bitcoin-n758516

    https://www.washingtonpost.com/news/worldviews/wp/2017/05/12/what-you-need-to-know-about-the-massive-hack-that-hit-britain-and-11-other-countries/?hpid=hp_rhp-top-table-main_wv-hack-446pm:homepage/story
     
  16. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
  17. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Notice the only place in Africa to get hit so far is South Africa? Whomever is behind this is targeting countries where there is a high likelihood that payment will be made.
     
  18. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,659
    Last edited: May 13, 2017
  19. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,659
    Does anybody know whether there are already decryptors available?
     
  20. plat1098

    plat1098 Guest

    According to the Kaspersky article above, as of 5:30 pm EST, no. I see the attack was enabled by having unpatched SMB servers, OK, no wonder. The payment deadline is three days, the articles say. I'd like to think Fabian Wosar/Emsisoft is working on it, right?

    Edit: Ah, I see hamlet has provided the answer. What a disaster, and many won't pay for various reasons.

    Re-edit: Files will be lost in one week's time, says the ransom messages.
     
    Last edited by a moderator: May 12, 2017
  21. hamlet

    hamlet Registered Member

    Joined:
    May 10, 2005
    Posts:
    229
    The ransomware experts at Emsisoft seem skeptical about a decryptor being possible.

    http://blog.emsisoft.com/2017/05/12/wcry-ransomware-outbreak/

    from the post - "Unfortunately, after evaluating the way WCry performs its encryption, there is no way to restore encrypted files without access to the private key generated by the ransomware. So it’s not likely a free WCry ransomware decrypter will be available for victims."
     
  22. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,659
    Thanks hamlet !!
    Very unfortunate news that it is not likely that there will be a free decryptor!! My first thought, when I heard about this big outbreak, was: let's hope that there will come soon a decryptor (and that it will be available via the site of the NoMoreRansom project). Alas, that looks now very unlikely.

    Another thing in the Emsisoft blog caught my attention:
    It is that "early February 2017". Early February 2017? Were security companies not able to make definitions (and other measures) to prevent that systems got infected?
     
  23. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  24. snerd

    snerd Registered Member

    Joined:
    Dec 8, 2007
    Posts:
    130
    Location:
    Arkansas USA
    Our wonderful NSA................. creating nasty malware to use on the bad guys, but then being too inept to secure their own servers!
     
  25. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    When are people going to catch on to back up backup and Backup
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.