steven36 Posted May 15, 2017 Share Posted May 15, 2017 6 minutes ago, 0bin said: And why such tools can be stolen? Shouldn't be keeped offline? It don't matter if they keep them offline some rouge contractor can copy them off a hard drive and give them too a hacker Group we really dont if they stole them online or not or someone in there group worked for the NSA or did someone give it too them it or did they buy them? Link to comment Share on other sites More sharing options...
steven36 Posted May 15, 2017 Share Posted May 15, 2017 1 minute ago, 0bin said: My opinion, those "weapons" were sold to various countries, they copied from the weaken point, not certainly from who created that. They had them on sale on the darknet for a very long time and no one would buy them so they release the code in the wild no one seem interested or ether they already had them or didn't believe them some hackers sell fakes and there a new group from 2016. Link to comment Share on other sites More sharing options...
steven36 Posted May 15, 2017 Share Posted May 15, 2017 2 minutes ago, 0bin said: Something told me there is not only eternal blue if they wanna show some magic, Rasomware to me is malware for dummies most of it comes from Microsoft documents and spam emails . It's like the old days in the chatrooms you meet someone you did not know and you allowed them send you file and you got infected with a virus . Places should not allow people to open there emails at work without making them taking a safety course on rasomware 1st. Link to comment Share on other sites More sharing options...
steven36 Posted May 15, 2017 Share Posted May 15, 2017 3 minutes ago, 0bin said: Like times of nokia bluetooth? As long as people stay dumb and hackers can get away with it in emails smart people wont have too worry that much .But once everyone catches on the hackers will spread it a different way then we may have too worry but rasomware has been back now since 2013 and still they are getting away with it in emails . Link to comment Share on other sites More sharing options...
steven36 Posted May 15, 2017 Share Posted May 15, 2017 1 minute ago, 0bin said: This is a channel on yt i follow to see review of ransomware, maybe can be useful to see the pattern, the hollow, the tools https://www.youtube.com/channel/UCv5keDaFSoFO2vK1UJSD-8w/videos Over on MAC OS most malware comes from Microsoft Office but even once they had a outbreak of ransomware in Transmission BitTorrent for MAC this is a different that is in Windows and Linux witch is a fork Transmission QT .. The ransomware they found on Linux has always been easily decrypted so far and it only mostly effects Linux Server so it sounds like it may be being spreed trough handling windows files too .because people on server upload and download lots of files for windows. Link to comment Share on other sites More sharing options...
Karlston Posted May 16, 2017 Share Posted May 16, 2017 Woody 4 hours ago, steven36 said: I don't want hear no more about Woody has too say for a few years hes been promoting not doing updates Fisrtly, the March Windows updates contained the patch (MS17-010) to prevent this recent EternalBlue exploit (and EternalRomance and EternalSynergy), and Woody OK'd those updates long before this ransomware appeared. So, following his advice would have kept you safe. Secondly, he's not promoting not applying updates at all. He's promoting not applying them until they're safe. The dilemma people have is that applying updates immediately to patch any vulnerabilities also runs a significant risk of Microsoft borking something with their less than stellar quality patches. In the fantasy world that Microsoft seems to live in, all patches are perfect. History proves that the real world is quite different. 4 hours ago, steven36 said: He just changed his tune here in last few months after he seen how bad things are again. No he hasn't. He OK'd the April updates early only because the risks (Double Pulsar malware) of NOT applying them outweighed any bugs in them. Again, if people had applied the March updates when Woody ruled them safe, they would have been safely patched against EternalBlue long before this exploit appeared. That's one of the downsides of bundled updates. Gotta take the bad with the good. Oh, and before anyone thinks that Windows 10 is safer because zero Windows 10 devices were affected, the malware developers deliberately avoided infecting Windows 10 devices because they feared that the rampant Windows 10 telemetry may allow them to be identified. Link to comment Share on other sites More sharing options...
steven36 Posted May 16, 2017 Share Posted May 16, 2017 2 hours ago, Karlston said: Why are you yelling at me about windows 10 man? It's Not my problem, I don't use Windows 10 anymore. if i go on windows i use windows 8.1 because it works better for me Mostly i just stay on Linux . I'm no Dummy and I don't need no Windows for Dummies advice. Does this look like Windows 10 too you ? Link to comment Share on other sites More sharing options...
steven36 Posted May 16, 2017 Share Posted May 16, 2017 5 hours ago, Karlston said: Oh, and before anyone thinks that Windows 10 is safer because zero Windows 10 devices were affected, the malware developers deliberately avoided infecting Windows 10 devices because they feared that the rampant Windows 10 telemetry may allow them to be identified. That's BS man the only version Windows 10 that wasn't patched was Redstone 2 because it was patched as a insiders build Quote . The patch was to the Server Message Block (SMB) protocol used by Windows. https://en.wikipedia.org/wiki/WannaCry_ransomware_attack SMB Zero-Day Affects Several Windows Versions, Including Windows 10 https://www.bleepingcomputer.com/news/security/smb-zero-day-affects-several-windows-versions-including-windows-10/ Quote Microsoft Security Bulletin MS17-010 - Critical Security Update for Microsoft Windows SMB Server (4013389) https://technet.microsoft.com/en-us/library/security/ms17-010.aspx They patched the SMB) protocol in March on Windows 10 as well just the creators was patched before they released the ISO they had suppose too had patched it in Feb. You need too put you're tinfoil hat away bro ,the only reason you would not got this patch on windows 10 is if you was blocking updates and didn't do them. See i always blocked updates when i was on Windows 10 with a firewall but I still done the security updates on patch Tuesday I just didn't always do the OS improvement updates at the end of the month because you was going get them on patch Tuesday anyway. It was a 0day back in Feb patched in March you are vulnerable if you didn't do updates in ether March .April or May you had 3 mths too patch it was not a 0 day anymore they infected people who were on OS that didn't get updates or who had updates blocked or turned off for over 3 mths without doing updates. And I figured it out on my own. Woody wanted to know was it all Windows 10 versions because of what Dona Sarkar said but she was just talking about the creators update and latter .. I read about what he said on Wikipedia today. Don't he know how too look it up for himself ? Evidently not! He just waits for his members too tell him things and reads blog post from this week. Too find stuff out you must research back to before it was patched and when it was patched. Quote According to Dona Sarkar, head of the Windows Insider Program at Microsoft, Windows 10 was not affected;however, IT writer Woody Leonhard questioned if this is the case with all Windows 10 systems, or just builds 14393.953 and later. https://en.wikipedia.org/wiki/WannaCry_ransomware_attack Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.