Author

Topic: 2017-05-13 btcmanager.com Ransomware Infects 200,000 Globally Despite Killswitch (Read 404 times)

sr. member
Activity: 672
Merit: 251
Content| Press Releases | Articles | Strategy
Now the media will go crying all day about how Bitcoin is being used for such bad, illegal activities. Though it is weird to me why asking for only $300 in Bitcoin – seems way too small for such attacks on 'important companies and institutions.' These companies still hold responsibility for their own security.

It is a good point you made here ,it is extremely ""small potatoes" for s stunt so HUGE.  It's baffling that nobody is scrutinizing the gentleman who they say is the hero who discovered the fix. I will explore that in a soon coming update

I don't know how the hackers are targeting these systems, but could it be that they're asking for $300 worth of Bitcoin for each computer affected on the network?

And this is exactly why Apple never wanted to provide a backdoor to the NSA for the San Bernardino attacks. The NSA created one anyways (https://www.theguardian.com/technology/2016/mar/28/apple-fbi-case-dropped-san-bernardino-iphone). How naive must an agency be if they truly believe that there are not experts out there that know systems better than them.

I don't think this will become a hit against cryptocurrency. The media is not nearly knowledgeable about cryptos enough to build an attack against it or sensationalize it.

There are rumors that this was a distraction method to divert the eyes from the disturbing beneficiaries of this event.  Look at the "victims" there only common problem was the exposed, soft under bellies of Windows operating systems. In March they put out a security update that patched the very security flaw that made systems vulnerable.  So the message (in part, and implied ) was  "Hey everyone ! You better let us run our security and system updates automatically from now on,for your safety! Oh and just to be safe you better send us info constantly, for your protection, and it will happen automatically unless you find and obscure setting deep in the scary parts of the control panel  and opt out."  Also, they sent the message that "crypto currency is for the bad guys " while also saying "these bozos are low on the worth scale since they set the price so low"
It worked, I guess, to an extent at least.
Nobody is looking at Microsoft. Nobody is looking at the fact that WannaCry is rumored to use an exploit called Eternal Blue, allegedly created by the U.S. National Security Agency to attack Microsoft Windows operating systems.
Hmm.
newbie
Activity: 51
Merit: 0
Now the media will go crying all day about how Bitcoin is being used for such bad, illegal activities. Though it is weird to me why asking for only $300 in Bitcoin – seems way too small for such attacks on 'important companies and institutions.' These companies still hold responsibility for their own security.

It is a good point you made here ,it is extremely ""small potatoes" for s stunt so HUGE.  It's baffling that nobody is scrutinizing the gentleman who they say is the hero who discovered the fix. I will explore that in a soon coming update

I don't know how the hackers are targeting these systems, but could it be that they're asking for $300 worth of Bitcoin for each computer affected on the network?

And this is exactly why Apple never wanted to provide a backdoor to the NSA for the San Bernardino attacks. The NSA created one anyways (https://www.theguardian.com/technology/2016/mar/28/apple-fbi-case-dropped-san-bernardino-iphone). How naive must an agency be if they truly believe that there are not experts out there that know systems better than them.

I don't think this will become a hit against cryptocurrency. The media is not nearly knowledgeable about cryptos enough to build an attack against it or sensationalize it.
legendary
Activity: 1806
Merit: 1090
Learning the troll avoidance button :)
Now the media will go crying all day about how Bitcoin is being used for such bad, illegal activities. Though it is weird to me why asking for only $300 in Bitcoin – seems way too small for such attacks on 'important companies and institutions.' These companies still hold responsibility for their own security.

Sigh two steps forward one step backwards in the end we are still progressing forward and we will reach our Climbers High.
Time is waiting for no one if people get afraid now it is their loss in the end the wind is sailing Bitcoin adoption forward in the end the real responsibility for the security is the companies who were slow to update their software. With note to the XP corporate users who really are in a crunch since they are non-supported except for this rare exception patch.

I do like that the killswitch was accidentally made because of the way sandbox vector viruses work ha-ha it's a beauty of accidental coding.
sr. member
Activity: 672
Merit: 251
Content| Press Releases | Articles | Strategy
Now the media will go crying all day about how Bitcoin is being used for such bad, illegal activities. Though it is weird to me why asking for only $300 in Bitcoin – seems way too small for such attacks on 'important companies and institutions.' These companies still hold responsibility for their own security.

It is a good point you made here ,it is extremely ""small potatoes" for s stunt so HUGE.  It's baffling that nobody is scrutinizing the gentleman who they say is the hero who discovered the fix. I will explore that in a soon coming update
sr. member
Activity: 1344
Merit: 288
Now the media will go crying all day about how Bitcoin is being used for such bad, illegal activities. Though it is weird to me why asking for only $300 in Bitcoin – seems way too small for such attacks on 'important companies and institutions.' These companies still hold responsibility for their own security.
sr. member
Activity: 672
Merit: 251
Content| Press Releases | Articles | Strategy
https://btcmanager.com/wannacry-ransomware-infects-computers-across-the-globe-despite-kill-switch-discovery/


WannaCry Ransomware Infects Computers Across The Globe, Despite Kill Switch Discovery

Lori BrownMay 13, 2017 19:04
WannaCry ransomware, a malicious malware tool, initiated a worldwide cyber attack that was launched 12 May, 2017, infecting upwards of 200,000 computers in 99 countries asking for ransoms in the cryptocurrency bitcoin.

In nearly 30 languages the ransomware is reportedly holding its digital victim’s operating systems hostage, with a demand of a substantial amount of bitcoin equivalent to $300 in order to regain access and ownership of their own computers and networks. The attack has been deemed “The Worst Ever Recorded” attack and continues to lock up computers despite the reports of a digital cure to this vicious virus.

Tom Robinson, co-founder of Elliptic, a company that monitors and identifies illegal or illicit activities associated with anonymous Bitcoin transactions explains:

“Everyone’s efforts at the moment are being focused on getting relevant malware and getting systems up and running again. In terms of identifying the attacker, what we can see at the moment is that around $20,000 worth of ransoms have been paid to these addresses.”

On May 13, one Redditor posted the addresses linked to the attack, wondering how much bitcoin will be sent to the three addresses in the next 48 hours and six days, two deadlines of the ransomware attack.

The attack has affected such companies as Britain's National Health Service (NHS), FedEx and Deutsche Bahn amongst a shocking list that is still growing. Over 1,000 computers belonging to Russian Interior Ministry, the Russian Emergency Ministry and the Russian telecommunications company MegaFon, have also fallen victim according to reports from the BBC.

WannaCry is rumored to use an exploit called Eternal Blue, allegedly created by the U.S. National Security Agency to attack Microsoft Windows operating systems and leaked by the Shadow Brokers in August 2016. Although a patch had been issued on 14 March 2017 to secure the weakness that allowed the attack to get in, postponed updates or ignored update installation alerts left massive numbers of computers vulnerable and WannaCry malware slithered right in as if an invited guest.

A kill switch, or a cure, has been discovered that disables the malicious code and reportedly prevents new infections. However, the public is being warned of the high potential for mutation and repeated attacks. Microsoft is urging the public to patch the vulnerability immediately.


Citations available on the published site of article
Jump to: