Pages:
Author

Topic: WannaCry Ransomware Extorts 39 Payments Worth 6.49 BTC – TODAY - page 3. (Read 3763 times)

legendary
Activity: 3080
Merit: 1500
Whatever happened is not good for the bitcoin community. Bitcoin will now be seen as a crime for most of the enforcement agencies and if they start cracking down the innocent bitcoin users, then we are doomed. Most of us try to earn bitcoin legally and not by any other means here. But these hackers have made a bad name for bitcoin now.

The attack is widespread and almost 72 countries effected. This way the respective government will think twice before legalizing bitcoin now. Whatever the good reputation earned by bitcoin, is all gone now and more governments will now be aware about bitcoin circulation in their country. Not good for us!
sr. member
Activity: 1288
Merit: 253
In my country, two big hospitals have this virus, it's very disturbing. There is a suggestion that tomorrow does not directly turn on the PC, this is a recommendation from the government. The positive impact is that some people are curious about the BTC, but the negative impact of BTC impresses the currency used for crime. Hopefully, does not endanger the current BTC price.

This virus focuses on the server because most are still using windows 8 and below version, ordinary workers are accustomed to receive email every day so do not accidentally get this virus. It's disastrous and hard to decrypt manually if it's already infected. Hopefully the antivirus do their best in the next few days.
legendary
Activity: 3556
Merit: 9709
#1 VIP Crypto Casino
Isn't the deadline for payments on this Friday? There aren't too many payments at the moment but this thread will be very interesting to track as the week goes on.

Surely payments will have to be madr? The NHS can't let patients medical records be deleted surely?
legendary
Activity: 3514
Merit: 1280
English ⬄ Russian Translation Services
If these guys get their 1000's of BTC they are demanding from the NHS they will likely be the ones selling it to them, then receiving it back to their wallets before reselling it on the market. IDK.

Sketchy. The ETF is 100% sure to be disapproved.
That ETF portion doesn't even make sense. Why would the ETF not be approved because there are some people who clicked on something they shouldn't have or got everyone's machines infected by bringing something in? Considering that they were only asking for $300 it shows it wasn't a targeted attack and was a generic ransomware that infected their systems.

The SEC was worried about the pricing of the ETF - it would have been based on the price on the many exchanges, and those exchanges were unregulated.

Now throw into the mix that the price might be manipulated upwards by ransonware attacks (where people are forced to buy bitcoin). Yes, some ransomware demands cash, but that cash is such a small proportion of all the dollars in circulation, it has no effect on the USD/EUR level. But there are so few bitcoins, and it has such a low market price that a small amount of buying due to ransomware can move the price.

So they're going to refuse on the grounds that the price can be manipulated by criminals.

This claim just won't hold water

First, a few bitcoins (which is what the hackers got so far) won't affect the price in any meaningful way, and if you doubt that, you may want to visit Bitfinex and see for yourself. Further, you implicitly assume that the hackers are never going to cash out, which is a very, very far-stretched assumption. As to me, they are going to cash out as fast as possible since it just makes no sense to keep the bitcoins which are of no particular use to them. Therefore, these bitcoins aren't going to change anything in respect to Bitcoin prices
legendary
Activity: 1652
Merit: 1088
CryptoTalk.Org - Get Paid for every Post!
If these guys get their 1000's of BTC they are demanding from the NHS they will likely be the ones selling it to them, then receiving it back to their wallets before reselling it on the market. IDK.

Sketchy. The ETF is 100% sure to be disapproved.
That ETF portion doesn't even make sense. Why would the ETF not be approved because there are some people who clicked on something they shouldn't have or got everyone's machines infected by bringing something in? Considering that they were only asking for $300 it shows it wasn't a targeted attack and was a generic ransomware that infected their systems.

The SEC was worried about the pricing of the ETF - it would have been based on the price on the many exchanges, and those exchanges were unregulated.

Now throw into the mix that the price might be manipulated upwards by ransonware attacks (where people are forced to buy bitcoin). Yes, some ransomware demands cash, but that cash is such a small proportion of all the dollars in circulation, it has no effect on the USD/EUR level. But there are so few bitcoins, and it has such a low market price that a small amount of buying due to ransomware can move the price.

So they're going to refuse on the grounds that the price can be manipulated by criminals.
hero member
Activity: 1106
Merit: 502
Got that trash on my PC yesterday. I just laughed, did a full format and a quick reinstall of Windows. I strive to keep my PC as empty and free of important stuff as possible, and this finally paid off! I gotta say I'm kinda proud. Shame about my collection of porn though Sad
Haha funny .... do not be in the format of this virus can still be destroyed. Prevention is better for now. Save your movie collection securely. Cheesy Cheesy
hero member
Activity: 1106
Merit: 502
In my country, two big hospitals have this virus, it's very disturbing. There is a suggestion that tomorrow does not directly turn on the PC, this is a recommendation from the government. The positive impact is that some people are curious about the BTC, but the negative impact of BTC impresses the currency used for crime. Hopefully, does not endanger the current BTC price.
legendary
Activity: 1806
Merit: 1090
Learning the troll avoidance button :)
Microsoft released patch on March 13, 2017 to fix this on all supported OS versions!

https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

This means, people who pay ransom are noobs and:

a) never did a backup. Just one image of C: drive plus rar/zip whatever, of data drives, per MONTH would have been needed (at 20% of the cost, for a nice Acronis or Ghost imaging tool)

and

b) badly neglected Windows updates or, even worse, use unsupported old Windows version

I look at it as a penalty for stupidity.... Wink

WORST THING IT MAKES BTC LOOK BAD!!! Angry

The joke is that they can pay so much for doctors in the healthcare system but not to secure their IT infrastructure.
A good IT person has a very important role in the hospital system it's a playground where they can mod efficiency XD.

Got that trash on my PC yesterday. I just laughed, did a full format and a quick reinstall of Windows. I strive to keep my PC as empty and free of important stuff as possible, and this finally paid off! I gotta say I'm kinda proud. Shame about my collection of porn though Sad

Would have tried a linux boot just to see what porn was encrypted out of curiosity ha-ha

Most of the affected systems had Windows XP (perhaps more than 90%). It was quite irresponsible from the part of Microsoft to end their support for Windows XP. The severity of this particular attack could have been significantly reduced if there was support.

I agree, Win XP was working nicely and they should provide support, at least for critical fixes!

I'm glad that it forced them to do an XP patch though

https://askubuntu.com/questions/914623/microsofts-wanna-cry-ransomware-possible-impact-on-linux-users

May 13th, 2017 Update 2 Today Microsoft took the extraordinary step of releasing a patch for Windows XP which has been off of support for 3 years.

No word if wine is doing anything about a security update. It was reported in a comment below that Linux can be infected too when users run wine.

An "accidental hero" registered a domain name that acted as a kill-switch to the ransomware. I presume the non-existant domain was used by the hackers on their private intranet so they didn't infect themselves. Next time they will be smarter so don't rely on this current kill-switch. Installing the Microsoft patch, which prevents exploiting a vulnerability in the SMBv1 protocol, is the best method.

https://www.theverge.com/2017/5/13/15635006/microsoft-windows-xp-security-patch-wannacry-ransomware-attack

-
https://www.ncsc.gov.uk/blog-post/finding-kill-switch-stop-spread-ransomware-0

Cancel switch AN HERO Appeared from a sinkhole flub XD
newbie
Activity: 28
Merit: 0
Got that trash on my PC yesterday. I just laughed, did a full format and a quick reinstall of Windows. I strive to keep my PC as empty and free of important stuff as possible, and this finally paid off! I gotta say I'm kinda proud. Shame about my collection of porn though Sad
sr. member
Activity: 333
Merit: 250
Looks like 6,5+ BTC buying on market wasn't making any difference on price.
News however were talking all day long about BTC and outcome will be neutral IMO.
legendary
Activity: 2282
Merit: 1050
Monero Core Team
I read that today, it’s pretty interesting to see that people are willing to try to patch the software even after they get hit by the ransomware. I am pretty sure that once those people that get the ransomware installed into their computer the system is pretty much corrupted. My suggestion would be just get a new computer instead of trying to buy out a virus lol.

Paying a hacker or a software has no real point to it, it’s all just credibility.

The data is gone unless on pays the ransom and gets the decryption key.  Also network drives that the infected Microsoft Windows computer has write access to are also vulnerable. The best solution is to avoid the real cause of the problem in the first place by using GNU/Linux instead of Microsoft Windows. It is also important to ensure that the Microsoft Windows computers do not have write access to  Samba shares on the GNU/linux computers or servers.
legendary
Activity: 1512
Merit: 1012
hero member
Activity: 891
Merit: 500
I read that today, it’s pretty interesting to see that people are willing to try to patch the software even after they get hit by the ransomware. I am pretty sure that once those people that get the ransomware installed into their computer the system is pretty much corrupted. My suggestion would be just get a new computer instead of trying to buy out a virus lol.

Paying a hacker or a software has no real point to it, it’s all just credibility.
legendary
Activity: 1652
Merit: 1007
That's why I have backups of all important data.
legendary
Activity: 1372
Merit: 1014
Most of the affected systems had Windows XP (perhaps more than 90%). It was quite irresponsible from the part of Microsoft to end their support for Windows XP. The severity of this particular attack could have been significantly reduced if there was support.

I agree, Win XP was working nicely and they should provide support, at least for critical fixes!
legendary
Activity: 1372
Merit: 1014
Microsoft released patch on March 13, 2017 to fix this on all supported OS versions!

https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

This means, people who pay ransom are noobs and:

a) never did a backup. Just one image of C: drive plus rar/zip whatever, of data drives, per MONTH would have been needed (at 20% of the cost, for a nice Acronis or Ghost imaging tool)

and

b) badly neglected Windows updates or, even worse, use unsupported old Windows version

I look at it as a penalty for stupidity.... Wink

WORST THING IT MAKES BTC LOOK BAD!!! Angry
hero member
Activity: 1260
Merit: 524
some months back one of my friend faced the same problem in his laptop that all his files are not opening and when he came to me i saw the same message of asking the ransomware to open the files , and he told me that he used the tor browser and downloaded some files and this problem faced it, he was lucky that he had his backup of his laptop so immediately we deleted the partition and rebuild new one and installed fresh copy of win 8 and now he is happy and not installing or downloading any unwanted files
legendary
Activity: 1218
Merit: 1006
There is already a thread which is constantly monitoring total bitcoin collected through this ransomeware here https://bitcointalksearch.org/topic/monitoring-wannacry-hackers-bitcoin-addresses-in-real-time-1916199

I have heard that atleast Windows 10 is safe from this, am i right? (source : http://thehackernews.com/2017/05/wannacry-ransomware-unlock.html)
legendary
Activity: 1512
Merit: 1012
Most of the affected systems had Windows XP (perhaps more than 90%). It was quite irresponsible from the part of Microsoft to end their support for Windows XP.

the problem is not WinXP ... but the WinCE deployed on industrial platform.  Grin




that's why most developpers use Raspberry Pi 3 (or VGA output) to develop display and industrial process now (since 3 years).

but, it's new.
need 10 years to adapt old industry.
sr. member
Activity: 350
Merit: 250
make mmoney is not very hard lol. Spend 10 years learning about computer and then make a good malware to obtain money and Bitcoin. WEll, I have to protect myself in this case. Everyone please buy window 10 or your computer will be totally elimated.
Pages:
Jump to: