Month: May 2017

ComputerWorldIndependent

WannaCry ransomware attacks won't be the last

Credit to Author: Lucian Constantin| Date: Mon, 15 May 2017 10:39:00 -0700

Thousands of organizations from around the world were caught off guard by the WannaCry ransomware attack launched Friday. As this rapidly spreading threat evolves, more cybercriminals are likely to attempt to profit from this and similar vulnerabilities.

As a ransomware program, WannaCry itself is not that special or sophisticated. In fact, an earlier version of the program was distributed in March and April and, judging by its implementation, its creators are not very skilled.

To read this article in full or to leave a comment, please click here

Read More
MalwareBytesSecurity

Wanna Cry some more? Ransomware roundup special edition

Credit to Author: Malwarebytes Labs| Date: Mon, 15 May 2017 21:25:02 +0000

A special compilation of security news related to the recent Worldwide outbreak of ransomware which has caused chaos for multiple organizations.

Categories:

Tags:

(Read more…)

The post Wanna Cry some more? Ransomware roundup special edition appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

China pays for Windows XP addiction as 'WannaCry' hits

Credit to Author: Gregg Keizer| Date: Mon, 15 May 2017 12:34:00 -0700

The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP runs one in five systems, local reports said Monday.

More than 23,000 IP addresses in the People’s Republic of China (PRC) show signs of infection, the country’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) told Xinhua, the state-run news agency, on Monday.

“Intranets in many industries and enterprises involving banking, education, electricity, energy, healthcare and transportation have been affected in different extents,” CNCERT said.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

New WannaCry variant being monitored, DHS official says

Credit to Author: Matt Hamblen| Date: Mon, 15 May 2017 11:40:00 -0700

A variant of the WannaCry ransomware that emerged Monday has been able to infect some of the computers patched after the original malware struck last week, according to a top cyber official at the Department of Homeland Security (DHS).

“We’re working on how to address that [variant] and sharing as we can,” said the official who asked not to be named. The official did not say how many computers have been affected by the variant, other than to say “some.” The original WannaCry attack hit more than 200,000 computers starting Friday in more than 150 countries, UK officials said over the weekend.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

WikiLeaks posts user guides for CIA malware implants Assassin and AfterMidnight

Credit to Author: Darlene Storm| Date: Mon, 15 May 2017 11:25:00 -0700

The latest WikiLeaks release of CIA malware documentation was overshadowed by the WannaCry ransomware attack sweeping across the world on Friday.

WikiLeaks maintains that “Assassin” and “AfterMidnight” are two CIA “remote control and subversion malware systems” which target Windows. Both were created to spy on targets, send collected data back to the CIA and perform tasks specified by the CIA. Both are persistent and can be scheduled to autonomously uninstall on a specific date and time.

The leaked documents pertaining to the CIA malware frameworks included 2014 user’s guides for AfterMidnight, AlphaGremlin – an addon to AfterMidnight – and Assassin. When reading those, you learn about Gremlins, Octopus, The Gibson and other CIA-created systems and payloads.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Why “Just Patch It!” Isn’t as Easy as You Think

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Mon, 15 May 2017 16:30:02 +0000

At the Zero Day Initiative (ZDI), we see patches in a way few do. We get the initial report from a researcher, we verify the issue internally, we notify the vendor, and finally we publish some details once a patch is released. Those patches represent the best method for preventing cyber attacks. Recently, an issue…

Read More