Many firms hit by global cyber-attacks

Discussion in 'malware problems & news' started by clubhouse1, Jun 27, 2017.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  2. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  3. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  4. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
    "The Russian cybersecurity firm Kaspersky Lab reported that it believed the malware was a "new ransomware that has not been seen before" despite its resemblance to Petya.

    As a result, the firm has dubbed it NotPetya. Kaspersky added that it had detected suspected attacks in Poland, Italy, Germany, France and the US in addition to the UK, Russia and Ukraine.

    Andrei Barysevich, a spokesman for security firm Recorded Future told the BBC such attacks would not stop because cyber-thieves found them too lucrative.

    "A South Korean hosting firm just paid $1m to get their data back and that's a huge incentive," he said. "It's the biggest incentive you could offer to a cyber-criminal."

    A bitcoin wallet associated with the outbreak has received several payments since the outbreak began. The wallet currently holds 1.5 bitcoins - equivalent to $3,500.

    An email address associated with the blackmail attempt has been blocked by German independent email provider Posteo.

    It means that the blackmailers have not been able to access the mailbox"

    Above quoted from BBC news^^^^^^^^^^^^^^^





    http://www.bbc.co.uk/news/technology-40416611



     
  5. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "Email Provider Shuts Down Petya Inbox Preventing Victims From Recovering Files

    Posteo, the email provider where the Petya author is hosting an inbox to handle victims from today's massive ransomware outbreak, has announced that it shut down the crook's email account:

    The German email provider's decision is catastrophic news for Petya victims, as they won't be able to email the Petya author in the case they want to pay the ransom to recover sensitive files needed for urgent matters..."

    https://www.bleepingcomputer.com/ne...box-preventing-victims-from-recovering-files/
     
    Last edited: Jun 27, 2017
  6. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "Petya Or NotPetya: Why The Latest Ransomware Is Deadlier Than WannaCry

    ...The malware widely believed to be responsible is called Petya... or NotPetya. It's similar to Petya, but different enough that researchers are saying it's an entirely new form of ransomware, researchers say...

    But NotPetya has some extra powers that security experts say make it deadlier than WannaCry. ...the ransomware finds passwords on the infected computer itself to move to other systems. It does that by extracting passwords from memory or from the local filesystem itself,...

    ...another proliferation technique is NotPetya's abuse of PsExec, a tool usually used for carrying out limited actions on other systems, but in this case for simply spreading the infection by executing malicious code on other computers it can access...

    A similar method is used by NotPetya with the Windows Management Instrumentation (WMI) tool,...

    Perhaps most crucially, thanks to all these added features, the new strain will infect the latest and even patched Windows PCs, including version 10, as one IT professional noted in a blog, whereas WannaCry worked largely on older systems. A Microsoft spokesperson said the company was aware of the reports and was investigating..."

    https://www.forbes.com/sites/thomas...-is-more-powerful-than-wannacry/#54feaa4c532e
     
  7. plat1098

    plat1098 Guest

    What was Posteo thinking?--on the surface, it looks like a gleeful, knee-jerk reaction without fully taking in the ramifications. The victims get burned yet again, remaining stuck with unusable machines for who knows how long. Wonder if any victims of WannaCry were hit by this one?

    If the ransomware overrides Windows boot, I'm intrigued the ransom "request" wasn't higher. Then again, maybe it's not strictly about the money, just like WannaCry. Incredible.

    Add: Maybe it is, just not derived from direct ransom payoffs.
     
  8. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
  9. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,440
    Location:
    Slovakia
    Any detailed report yet? Thus far it seems, that #notpetya uses PsExec.exe, so simply adding it to disallowed apps should do.

    https://twitter.com/hashtag/notpetya?src=hash

    https://www.joesecurity.org/reports/report-71b6a493388e7d0b40c83ce903bc6b04.html

    Code:
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "DisallowRun" /t REG_DWORD /d "1" /f
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun" /v "1" /t REG_SZ /d "wscript.exe" /f
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun" /v "2" /t REG_SZ /d "cscript.exe" /f
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun" /v "3" /t REG_SZ /d "mshta.exe" /f
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun" /v "4" /t REG_SZ /d "PsExec.exe" /f
     

    Attached Files:

    Last edited: Jun 27, 2017
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Would blocking psexec prevent malware "installation" or only spreading to other computers in network?
     
  11. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    98,062
    Location:
    U.S.A.
  12. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,440
    Location:
    Slovakia
    You are right, that just stops spreading. Still waiting to see, how the dropper works, but I expect it is the the same old: vbscript runs powershell and then elevates.
     
  13. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    98,062
    Location:
    U.S.A.
    https://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine/
     
  14. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,440
    Location:
    Slovakia
  15. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    "The end is near!" Head for the fallout bunkers if your downwind and live in Europe:eek:
     
  16. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  17. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK

    You should be their security consultant, a few days of reading other experts analysis and you'll have it in the bag:argh:
     
  18. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    This is going to be an interesting thread to follow;)
     
  19. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
  20. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    New variant locks you out of Windows by rendering it unbootable as well as by encrypting data files - just like original Petya ransomware family did.
     
  21. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I'm pretty sure it is not clear yet. This new unknown variant is suppose to infect even fully patched Windows 10 machines.
     
  22. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,150
    Location:
    Texas
  23. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    So Posteo told victims ****** in the name of protecting them.

    Its not like its going to pay them for lost data and to get their PCs back online.
     
  24. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK

    I think they were a bit hasty with that decision.
     
  25. guest

    guest Guest

    Regarding Posteo:
    https://posteo.de/en/blog/info-on-t...ount-in-question-already-blocked-since-midday
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.