Started By
Message

Calling IT Security Experts: anything we should be aware of?

Posted on 5/15/17 at 9:27 am
Posted by WONTONGO
Member since Oct 2007
4295 posts
Posted on 5/15/17 at 9:27 am
Seems like there is a massive worldwide randsomware virus out there. Anything in particular we should watch out for or stay away from?

What should we know?

Posted by jefforize
Member since Feb 2008
44072 posts
Posted on 5/15/17 at 9:34 am to
here's a blog update from MS about it

LINK

quote:

Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. A month prior, on March 14, Microsoft had released a security update to patch this vulnerability and protect our customers. While this protected newer Windows systems and computers that had enabled Windows Update to apply this latest update, many computers remained unpatched globally. As a result, hospitals, businesses, governments, and computers at homes were affected.


more info

LINK
This post was edited on 5/15/17 at 9:38 am
Posted by XanderCrews
Member since Mar 2009
774 posts
Posted on 5/15/17 at 9:41 am to
(no message)
This post was edited on 12/21/21 at 11:04 am
Posted by DoubleDown
New Orleans, Louisiana
Member since Oct 2008
12846 posts
Posted on 5/15/17 at 9:53 am to
From my limited understanding:
Windows 10 = ok
Windows 8.1/8 = ok
Windows 7 = ok

Anything other than these need to get patched via MS Windows Update process NOW.
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 5/15/17 at 10:25 am to
Make sure you instsll these patches and you should be good.

SMB patch
This post was edited on 5/15/17 at 10:26 am
Posted by mastersleestak
Foul's Creche
Member since Dec 2014
395 posts
Posted on 5/15/17 at 10:58 am to
Any idea how it was being delivered? I assume email but can't confirm.

Was there an attachment or a URL?
Posted by TigerinATL
Member since Feb 2005
61420 posts
Posted on 5/15/17 at 11:06 am to
There are certainly things you can do to reduce your risk like anti-virus/malware software and staying up to date on your patches. But I wonder what the backup strategy was for these organizations that got hit. If you don't have a backup plan with offsite storage in place you should look into one. That can be a 3rd party cloud service like Carbonite but it can also be as simple as running Windows backup on an external hard drive and/or burning to a blu ray once a month (or more often depending on your data).
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 5/15/17 at 11:08 am to
quote:

Any idea how it was being delivered? I assume email but can't confirm.

Was there an attachment or a URL?



i know it's phishing but not sure of the payload yet...
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 5/15/17 at 11:09 am to
quote:

There are certainly things you can do to reduce your risk like anti-virus/malware software and staying up to date on your patches. But I wonder what the backup strategy was for these organizations that got hit. If you don't have a backup plan with offsite storage in place you should look into one. That can be a 3rd party cloud service like Carbonite but it can also be as simple as running Windows backup on an external hard drive and/or burning to a blu ray once a month (or more often depending on your data).



true, but easier said than done...

most large organization use some form of replication in their backup solution. it doesnt take long at all to start replicating encrypted assets
Posted by TigerinATL
Member since Feb 2005
61420 posts
Posted on 5/15/17 at 11:14 am to
quote:

most large organization use some form of replication in their backup solution. it doesnt take long at all to start replicating encrypted assets


True, but Replication =/= backup is like IT 101 level knowledge. Like you said, easier said than done, but I think this ransomware epidemic is underscoring that maybe a true backup solution is worth the small amount of time and money they weren't willing to budget for before.
This post was edited on 5/15/17 at 11:15 am
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 5/15/17 at 11:19 am to
quote:

True, but Replication =/= backup is like IT 101 level knowledge. Like you said, easier said than done, but I think this ransomware epidemic is underscoring that maybe a true backup solution is worth the small amount of time and money they weren't willing to budget for before.



agree with everything you said, but the reality is lots of large organizations replicate to a different site and call it their backup.

In most DR scenarios that replicated "backup" is what they consider ideal...but like you said, get hit with ransomeware and you realize why replication is an awful solution
This post was edited on 5/15/17 at 11:21 am
Posted by Carson123987
Middle Court at the Rec
Member since Jul 2011
66371 posts
Posted on 5/15/17 at 12:07 pm to
If you have a decent sized business, chances are one of your employees already fricked you.

Vigilant patching cycles, people
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 5/15/17 at 12:50 pm to
quote:

i know it's phishing but not sure of the payload yet...



nevermind... this is a true worm.
Posted by 3nOut
Central Texas, TX
Member since Jan 2013
28780 posts
Posted on 5/15/17 at 2:23 pm to
quote:

Vigilant patching cycles, people



the greatest virus headache i've ever had in my 15 years of jobs of IT security could have been avoided by a single windows patch. (and some a-hole not checking a button on our AV console)

This post was edited on 5/15/17 at 2:24 pm
Posted by 50_Tiger
Dallas TX
Member since Jan 2016
39883 posts
Posted on 5/15/17 at 2:39 pm to
On any windows machine including Server 2012

in cmd run

wmic qfe|find "KB4012212"

If this does not send back a hyperlink and a shown support file KB4012212. Download that package IMMEDIATELY.
Posted by jdd48
Baton Rouge
Member since Jan 2012
22037 posts
Posted on 5/15/17 at 3:58 pm to
quote:

nevermind... this is a true worm.


Yes it is, as it can propagate across the network with no user intervention. What I am hearing is there's two main infection vectors: 1 - infected attachments/zip files via spear phishing campaigns; 2 - direct infection via servers with SMB directly exposed to the internet.

This post was edited on 5/15/17 at 3:59 pm
Posted by Tigeralum2008
Yankees Fan
Member since Apr 2012
17124 posts
Posted on 5/15/17 at 4:25 pm to
We run Applocker and BitLocker but since this was ransomware built on some CIA bullshite would it have been able to work around it?
This post was edited on 5/15/17 at 4:27 pm
Posted by jdd48
Baton Rouge
Member since Jan 2012
22037 posts
Posted on 5/15/17 at 7:15 pm to
quote:

We run Applocker and BitLocker but since this was ransomware built on some CIA bullshite would it have been able to work around it?


Probably not, unless you've got unpatched XP/7/8.1/2003 PC's or servers. From what I understand, besides utilizing the ETERNALBLUE exploit, the exploit code itself wasn't super sophisticated.

Make no mistake though, NOTHING is ever bullet proof when it comes to network security. There are documented AppLocker and Bitlocker bypass methods.
Posted by ColdDuck
BR via da Parish
Member since Sep 2006
2755 posts
Posted on 5/16/17 at 7:38 am to
quote:

Windows 8.1/8 = ok


Windows 8, not 8.1 is officially unsupported, so you have to patch it, Vista and XP manually. As well as 2003 Server.
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 5/16/17 at 9:19 am to
quote:

Yes it is, as it can propagate across the network with no user intervention. What I am hearing is there's two main infection vectors: 1 - infected attachments/zip files via spear phishing campaigns; 2 - direct infection via servers with SMB directly exposed to the internet.



I've yet to see any evidence suggesting phishing as an attack vector.
first pageprev pagePage 1 of 2Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram