Jump to content


Photo

WannaCry Ransomware: Latest windows patch/s

ransomware wannacry windows patch

  • Please log in to reply
9 replies to this topic

#1 esme

esme

    Member

  • Member
  • PipPip
  • 299 posts

Posted 15 May 2017 - 08:13 AM

http://www.computerw...annaCry-attacks

 

OK this is aimed at businesses but I doubt wannacry cares who owns the system it encrypts

If you are at all concerned the tl;dr is you need the MS17-010 patch on your system, if you use windows update you should get it automatically, not everyone keeps their systems up to date though

You can check the details on the Microsoft site here https://technet.micr...y/ms17-010.aspx



#2 duzenko

duzenko

    Advanced Member

  • Active Developer
  • PipPipPip
  • 827 posts

Posted 15 May 2017 - 08:22 AM

 

The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States.
Read more at https://blogs.micros...IjfybffUCc92.99

What THE HELL do they mean by "exploits stolen from NSA"?



#3 esme

esme

    Member

  • Member
  • PipPip
  • 299 posts

Posted 15 May 2017 - 08:31 AM

It's a zero day windows exploit that the NSA discovered & instead of telling Microsoft about it so it could be fixed they developed a hacking tool so they could pwn any windows PC they liked

 

A huge bunch of hacking tools were stolen from the NSA not long ago

 

https://www.theregis...kers_data_dump/



#4 stumpy

stumpy

    Advanced Member

  • Member
  • PipPipPip
  • 1679 posts

Posted 15 May 2017 - 11:50 AM

the exploit has been around for around for 10 years,

 

if you are on windows vista, 7, 8, 8.1, 10 the patch should have been added in march 2017 unless you've got critical microsoft updates turned off. windows xp no longer supported so there's no patch for that.


Edited by stumpy, 16 May 2017 - 10:33 AM.


#5 Bikerdude

Bikerdude

    Mod hero

  • Member
  • PipPipPipPipPip
  • 18924 posts

Posted 15 May 2017 - 01:58 PM

if you are on windows vista, 7, 8, 8.1, 10 the patch should have been added in march 2017 unless you've got critical microsoft updates turned off. windows xp no longer supported so there's no patch for that.

Well I thought my recent Win7 rebuild was upto date but the KB4012212 wasn't installed... :blink:

 

@Esme, I should have listed this info myself, so thanks for doing that. I have pinned the thread for the time being, as all users should be aware of this.



#6 Aosys

Aosys

    Member

  • Member
  • PipPip
  • 182 posts

Posted 15 May 2017 - 04:11 PM

https://support.micr...ver-2008-r2-sp1

 

Note this:

 

 

This Security Only Quality Update is not applicable for installation on a computer where the Security Monthly Quality Rollup or Preview of Monthly Quality Rollup from March 2017 (or a later month) is already installed, because those updates contain all of the security fixes that are included in this Security Only Quality Update.



#7 esme

esme

    Member

  • Member
  • PipPip
  • 299 posts

Posted 16 May 2017 - 05:35 AM

One thing you should all be aware of, this patch fixes a hole in the SMB server which is used for file sharing.

 

It will not stop someone sending you a malicious email with an exe attached or trying to get you to download & execute a package from some dodgy website.

 

As I understand it, Wannacry it has two modes of infection, the first is by the owner of the machine activating the virus by running it, so be careful when opening packages from other machines, keep your virus scanners up to date etc... and you should be OK

 

The second mode is what makes it spread so fast, if an infected machine is connected to a network with unpatched machines on it, it will use the SMB server hole to directly infect those machines and I believe no human interaction is required for this, so if you have guests & allow them access to your WiFi they could infect your machines just by connecting to the local network

 

This stops a Wannacry infected PC from infecting other PC's via a network connection, it's not a magic bullet to prevent you getting it by other means.


Edited by esme, 16 May 2017 - 05:36 AM.

  • Aosys likes this

#8 stumpy

stumpy

    Advanced Member

  • Member
  • PipPipPip
  • 1679 posts

Posted 16 May 2017 - 10:23 AM

looks like the attack came from north korea, cyber crime lot says there's clues in the code that points it coming from that country.

 

apparently the patch is also available for computers using the xp operating system and other computers that are no longer getting up dates as a one off thing, according to microsoft website.


Edited by stumpy, 16 May 2017 - 10:30 AM.

  • Anderson likes this

#9 esme

esme

    Member

  • Member
  • PipPip
  • 299 posts

Posted 17 May 2017 - 06:41 AM

Yep, the only reason XP machines are affected so badly is because they are obsolete & don't get security patches in the normal course of updates.

 

So pretty much every banks ATM, every supermarket POS till, every piece of major hospital equipment like MRI scanners have XP embedded in them & very few get updates if any, there are rumours that the Trident fleet runs on XP too.

 

Plus the NHS standardised their software on XP ages ago & yes the government warned them about it being insecure, but then the UK Government denied them any means of dealing with it by cancelling support, bit like strapping them to a train track, telling them a train is coming & preventing them undoing the straps.

 

But any windows machine is vulnerable if the patch hasn't already been applied, so anyone who doesn't like Microsoft telemetry (spyware) for example may have turned updates off & missed this patch when applying security updates by hand

 

I've also seen the NK rumours I've also seen rumours pointing at Russia


  • CarltonTroisi likes this

#10 teh_saccade

teh_saccade

    Member

  • Member
  • PipPip
  • 485 posts

Posted 17 May 2017 - 09:01 PM

Trident use Submarine Command System New Generation (SCS-NG) that is nicknamed "windows for submarines". Perhaps this is from where stems the rumour

There's also the fact that, by design, this is an isolated system. Underwater, where you don't get 4G and the wifi's not so good.

50-odd nukes are not controlled by windows xp.

 

False-flag.

 

// It's youtube level to penetrate a site with a proxy-chain, VMware Kali, that makes it look like it came from your local MP's office (just email them and get the IP from the traceroute). It's the social engineering and what is the motivation of such action and response on behalf of "the good guys" that worries me more than anything.


Edited by teh_saccade, 17 May 2017 - 09:06 PM.

  • esme likes this





Also tagged with one or more of these keywords: ransomware, wannacry, windows, patch

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users