Telefonica Tells Employees to Shut Down Computers Amid Massive Ransomware Outbreak

Discussion in 'malware problems & news' started by itman, May 12, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://www.bleepingcomputer.com/ne...n-computers-amid-massive-ransomware-outbreak/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Of interest is none of the AI solutions on VT are detecting this. Definitely a good source to test against the third party anti-ransomware solutions.
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    https://www.forbes.com/sites/thomas...ed-by-wannacry-ransomware-in-global-explosion

    So much about NOBUS.
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    You've got to be kidding? As the say, "the truth is stranger than fiction."
     
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I do know one thing for sure, we will never know the total impact of this attack. Most nailed concerns will pay up and state anyone who leaks they were nailed will be fired immediately.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  8. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    In this case system update would be best defense. Vulnerability can be exploited to run malware that can do whatever attacker wants (not just ransomware).
    For many sysadmins stability is as important as security so sometimes they don't update critical systems as soon as update is released.
    This can become big problem. Once that other attackers start to "smell blood"...
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    http://www.telegraph.co.uk/technolo...isnt-warning-researcher-found-ransomwarekill/
     
  10. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

    Impressive :thumb:
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Good decision from MS :thumb:
     
  12. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  13. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    You mean installing patches? Yes of course, but what if it was a true "zero day" bug, then it wouldn't have helped. This is a great opportunity for security companies to promote their "next gen" AV systems that can block ransomware and other malware. But I also wonder if a simple white-listing tool would have stopped this attack.
     
  14. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    In playing with malware and scripts, ERP will stop everything, and it has a solution for the click happy users. Set a master password, and then click all the password options and see what you can get past it.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.