1

I imagine you already know, by now, of the WannaCry ransomware that spreads using the SMB1 file sharing protocol in Windows, XP through 7.

Yes, I said XP. MS have even issued a patch for it (thereby proving themselves to be ransomware merchants of a kind too). Whatever version of Windows you own, patch it, if you haven't yet.

The vulnerability exploited came from the NSA, and was in the Shadow Broker dump. Ransomware, once implanted using this vector, encrypts your stuff and demands payment. MS made patches available before the vulnerability hit, so any sensible person won't have been infected, but this was still immensely damaging, including to the NHS in the UK (which our Tory government is busily trying to sabotage through underfunding, for ideological reasons). And yes the NHS was, in part, still dependent on XP, and the trusts had not renewed their XP agreements. I do believe the security argument for moving on is thus definitely proved. Yet, between the NSA hoarding secret vulnerabilities, the government always blaming the attacker and not the incompetent victim, the radical market fundamentalism of governments, security professionals and the software industry who refuse to raise the bar for secure coding and endorse full disclosure but instead make real money from the vulnerabilities in software, Microsoft's own private agreements which they knew must have been necessary but which people did not benefit from without large sums of money until it was far too late, and just plain incompetence and stupidity, this is a sad story to behold. For God's sake patch.

Just myself, as usual.

Thumbs up

2

Yeah, and get off XP, Jesus Christ its 14 years old, the fuck is wrong with people. This was a big one though and MS knew it, they released a patch for XP even though it was EOL and not supported. Also, if you have any version of win 10, the vulnerability doesn't exist, but disable smb 1 anyway, you don't need it, if by chance, you're using it, smb 2 and 3 are more secure.

Friend me on Steam
and follow me on Twitter

Thumbs up

3

I am triing to update my windows but I do not know if my sistem works or not.
It is windows 7 ultimate but it is bad installed and I lost some sistem 32 files.

I am your friend, your spam bot reporter, I am what ever do you wan a be to you, but if it is not good, I will not be!
And please, give me a tumbsup, it makes me happy to see one.
Thanks.
Angel Productions, the producer of nothing :)

Thumbs up

4

As it turns out WCry [doesn't effect WinXP], or more specifically the worm doesn't, but the ransomware does if you manually copy and run it on your computer. Some security researchers have been able to crack the ransom encryption on XP installs because of previously overlooked limitations in the OS.

-BrushTone v1.3.0: Accessible Paint Tool
-AudiMesh3D v1.0.0: Accessible 3D Model Viewer

Thumbs up

5

Patch... where!
I've been monitoring network usage on my machines - and other than one of them pulling some updates for microsoft antimalware, I'm not seeing any patches.
In other news, I also can't find a way to disable SMB, at least in services.msc.

Thumbs up

6

If you install latest updates, you are already patched. SMB is located in Windows Features, not services.msc.

And thus the beast grew powerful, and fire and thunder swept the land. But Mammon stirred in their hearts, and the beast Foundered, and its Corpse arose, and commanded "thou shalt not fly in my name." And the blazes shall freeze cold, and the souls of the followers of Mammon shall learn to tremble in the
face of ice as they did before the fire.
from The Book of Ice, 10:13

Thumbs up

7

Most recent OS's will already be patched if your up to date, but you can read more about it and manually download the patches [here].

-BrushTone v1.3.0: Accessible Paint Tool
-AudiMesh3D v1.0.0: Accessible 3D Model Viewer

Thumbs up

8

You are awesome!
Clarification much appreciated.
I shall now go figure out how to remove smb.

Thumbs up

9

I am slightly confused and worried actually, because I don't know if I'm protected. For some reason, I have not received an automatic updates for ages and I'm using windows 7. Yet when I check services the windows update is set to automatic delayed start, but I'm wondering if it relies on some other sevices that could ahve been accidentally disabled. You see, i had a clearout a while back and a program was having issues with not being able to start it's service, and stupdily I started it's service but managed to cause some sort of chain reaction that disabled others, due to the way I went about it, and I also forgot to create a restore point. Annoyingly, I don't know what settings all my services were on because you've got automatic, automatic delayed star, and manual. I'm wondering if I've accidnetally disabled windows update or something.

Thumbs up

10

this might be of interest:

http://thehackernews.com/2017/05/wannac … -tool.html

You can follow me on twitter @cartertemm

Thumbs up

11

The good news is as of yet, I haven't been infected it seems.

Thumbs up

12

Hm? Didnt hear about this virus. Move on to Linux guys!

Raduvay se, raduvay
Raduvay se domaki ne
Kolko liste po gorach
Tolko zdrave na taz kyshcha

Thumbs up

13

@aaron
If your not sure or concerned check the link in my last post, it goes into the detaila and you can manually download and install the necessary security patches from there to make sure your covered.

-BrushTone v1.3.0: Accessible Paint Tool
-AudiMesh3D v1.0.0: Accessible 3D Model Viewer

Thumbs up

14

psht; yeah, because moving onto linux wouldn't be a lot like thieves locking you out of your own house and you buying a new one because you're not willing to put up a fight.  I won't switch operating systems because of script kiddies.

I do not know what my future holds, but I do know who holds my future.

Thumbs up +1