#WannaCry Didn’t Start with Phishing Attacks, Says Malwarebytes

Discussion in 'malware problems & news' started by itman, May 22, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://www.infosecurity-magazine.com/news/wannacry-didnt-start-with-phishing/
     
  2. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,805
    Location:
    .
    Then I have learned an important lesson. To not believe at all the reports, analysis and investigations during the first 15 or 30 days when an important and massive malware campaign is discovered.
     
  3. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
    I take all the investigation\reports from AV and other security tool vendors with a pinch of salt..Kaspersky waying in with figures on what flavours of windows were hit etc..Think I'll wait for a bona fide report\overview from sources without a sales interest.
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    If those networks really have public facing SMB ports open, then WannaCry is not their biggest problem.
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I believe the Malwarebytes assumption that WannaCry was spread via open public facing SMB ports a "bit of a stretch" as I posted in another thread.

    I find it a bit hard to accept that commercial concerns would have had those ports open to Internet access. Even the Win firewall if used on client devices blocks edge transversal on those ports. I am also in the believe that the entry point for the malware was at the server level and it exploited some unknown and yet to be determined vulnerability there to gain access to the network and deploy the NSA exploits.
     
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Think I might be on to something.

    Below is a screen shot of the Win firewall inbound port 445 rule for the domain profile:

    SMB-In-Domain.png

    Below is the same rule for the private profile:

    SMB-In-Private.png

    The Win firewall rule for the domain profile is in stark contrast to third party AV firewalls that specifically restrict inbound port 445 traffic to the local trusted subnet if file and printer sharing is enabled regardless of whether a domain is involved or not.

    So it appears to me that the Win firewall as far as inbound port 445 traffic goes for the domain profile relies entirely on the network perimeter firewall device to block inbound port 445 traffic.
     
    Last edited: May 22, 2017
  7. mWave

    mWave Guest

  8. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  9. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  10. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Also if anyone hasn't read this thread: https://www.scmagazine.com/forgotte...-infect-systems-with-wannacry/article/663435/ , please do. Notably the following excerpt. It explains how WannaCry could enter the server undetected:
     
  11. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Also from the Trend Micro analysis is this:
    As far as MS08-067 goes:
    Connecting the dots, this explains how Win XP devices ended up with WanaCry's ransomware malware without being susceptible to the SMBv1 EternalBlue NSA exploit. Appears the 1500 out of 6500 Win XP boxes used by the NHS had not had the MS-067 patch deployed. Additionally, it appears the patch had not been applied to its Windows Server 2003 and/or Windows Server 2008 boxes.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.