1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Education WannaCrypt ransomware

Discussion in 'General' started by Isitari, 13 May 2017.

  1. Isitari

    Isitari Minimodder

    Joined:
    6 May 2009
    Posts:
    411
    Likes Received:
    90
    One of the best articles so far I've read on it with links to the dissected malware to tracking it in real time.
    https://www.theregister.co.uk/2017/05/13/wannacrypt_ransomware_worm/

    One line that particularly stands out: 'A large part of the organisation's systems are still using Windows XP, which is no longer supported by Microsoft, and Health Secretary Jeremy Hunt cancelled a pricey support package in 2015 as a cost-saving measure.'

    Also it seems likely that the NHS was hit as Telefonica (a Spanish company) runs a lot of NHS comms. Telefonica staff were told to go home on Friday, shut down all the computers and not use any Telefonica based comms at all, so therefore its quite possible it spread from them to the NHS.

    Regards,

    Isitari.

    P.S. I hope our resident Doc is doing alright under the current circumstances.
     
  2. Kernel

    Kernel Likes cheese

    Joined:
    29 Sep 2003
    Posts:
    1,195
    Likes Received:
    47
    I keep seeing the mention of XP being the vector of attack, and while I agree the NHS and government have no excuses to be running massively out of date software that has no support. It's been documented that the vulnerability is present in Vista and on wards.

    edit: Although thinking about it, this maybe because there is no update for XP...

    For anyone wanting to check whether they or their systems are safe.

    For people using the following versions of Windows, make sure you have the following patches installed on your machine:

    • Windows Vista and Windows Server 2008 - KB4012598
    • Windows 7 and Windows Server 2008 R2 - KB4012212 (standalone) OR KB4012215 (update rollup)
    • Windows Server 2012 - KB4012214 (standalone) OR KB4012217 (update rollup)
    • Windows 8.1 and Windows Server 2012 R2 - KB4012213 (standalone) OR KB4012216 (update rollup). NOTE: Later security updates may incorporate and replace KB4012216. Haven't done the research on this yet.
    • Windows 10 (you can check your installed version and build by pressing Win-R and running winver)
    • Pre-version 1511 - KB4012606
    • Version 1511 - KB4013198
    • Version 1607 and Windows Server 2016 x64 - KB4013429 (OS build 14393.953). NOTE: If you have any of the following patches installed, you're good: KB4015438 (14393.969), KB4016635 (14393.970), KB4015217 (14393.1083), and KB4019472 (14393.1198). All of these replace KB4013429.
    • Version 1703 already has this update
     
  3. Isitari

    Isitari Minimodder

    Joined:
    6 May 2009
    Posts:
    411
    Likes Received:
    90
    Any Windows OS from Vista to 10 is vulnerable if March's patches were not applied.
     
  4. Isitari

    Isitari Minimodder

    Joined:
    6 May 2009
    Posts:
    411
    Likes Received:
    90
    Microsoft have now released a patch for XP even if you didn't pay for the extra (very extra) longterm support.

    Sent from my SM-N915FY using Tapatalk
     
  5. Yadda

    Yadda Minimodder

    Joined:
    25 Jul 2003
    Posts:
    3,217
    Likes Received:
    49
    Last edited: 13 May 2017
  6. Corky42

    Corky42 Where's walle?

    Joined:
    30 Oct 2012
    Posts:
    9,648
    Likes Received:
    388
    Can we recoup the costs from the NSA?

    For anyone concerned Microsoft have released an emergency patch today for all versions of Windows from XP onwards.
     
    Last edited: 13 May 2017
  7. Isitari

    Isitari Minimodder

    Joined:
    6 May 2009
    Posts:
    411
    Likes Received:
    90
  8. Corky42

    Corky42 Where's walle?

    Joined:
    30 Oct 2012
    Posts:
    9,648
    Likes Received:
    388
    That doesn't surprise me as the bean counters, who normally count their beans via internet connected devices, show XP with a tiny market share so 7 was undoubtedly the largest attack vector, especially as it seems many people have been avoiding updating 7 because of the inclusion of what some people see as unwanted updates.
     
  9. tk421

    tk421 Idiot.

    Joined:
    15 Jan 2002
    Posts:
    2,401
    Likes Received:
    11
    i spent the bulk of last weekend manually patching gold images and recomposing the better part of our VDI farms ... found out about it at 3:45 friday afternoon ...
     
  10. Anfield

    Anfield Multimodder

    Joined:
    15 Jan 2010
    Posts:
    7,062
    Likes Received:
    970
    http://www.nextpowerup.com/news/36108/vast-majority-of-wannacrypt-victims-have-been-on-windows-7/
     
  11. crazyg1zm0

    crazyg1zm0 Minimodder

    Joined:
    20 Feb 2007
    Posts:
    2,334
    Likes Received:
    55
    Saw something similar last night, seems a bunch of researchers were having a hard time getting it to behave as expected in XP environments. If what i read was correct and I understood the limited info. It would appear that SP3 on XP helped to protect xp machines due to SHA256 being used on it where as SP2 doesnt force the use of it.

    Not sure but interesting reading.
     
  12. Xir

    Xir Modder

    Joined:
    26 Apr 2006
    Posts:
    5,412
    Likes Received:
    133
    Yah...I'm contacting every vendor to make sure they okay the XP patch. :rolleyes:
    Most don't know as the machines aren't made anymore.
     

Share This Page