Security

ComputerWorldIndependent

China pays for Windows XP addiction as 'WannaCry' hits

Credit to Author: Gregg Keizer| Date: Mon, 15 May 2017 12:34:00 -0700

The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP runs one in five systems, local reports said Monday.

More than 23,000 IP addresses in the People’s Republic of China (PRC) show signs of infection, the country’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) told Xinhua, the state-run news agency, on Monday.

“Intranets in many industries and enterprises involving banking, education, electricity, energy, healthcare and transportation have been affected in different extents,” CNCERT said.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

New WannaCry variant being monitored, DHS official says

Credit to Author: Matt Hamblen| Date: Mon, 15 May 2017 11:40:00 -0700

A variant of the WannaCry ransomware that emerged Monday has been able to infect some of the computers patched after the original malware struck last week, according to a top cyber official at the Department of Homeland Security (DHS).

“We’re working on how to address that [variant] and sharing as we can,” said the official who asked not to be named. The official did not say how many computers have been affected by the variant, other than to say “some.” The original WannaCry attack hit more than 200,000 computers starting Friday in more than 150 countries, UK officials said over the weekend.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

WikiLeaks posts user guides for CIA malware implants Assassin and AfterMidnight

Credit to Author: Darlene Storm| Date: Mon, 15 May 2017 11:25:00 -0700

The latest WikiLeaks release of CIA malware documentation was overshadowed by the WannaCry ransomware attack sweeping across the world on Friday.

WikiLeaks maintains that “Assassin” and “AfterMidnight” are two CIA “remote control and subversion malware systems” which target Windows. Both were created to spy on targets, send collected data back to the CIA and perform tasks specified by the CIA. Both are persistent and can be scheduled to autonomously uninstall on a specific date and time.

The leaked documents pertaining to the CIA malware frameworks included 2014 user’s guides for AfterMidnight, AlphaGremlin – an addon to AfterMidnight – and Assassin. When reading those, you learn about Gremlins, Octopus, The Gibson and other CIA-created systems and payloads.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Why “Just Patch It!” Isn’t as Easy as You Think

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Mon, 15 May 2017 16:30:02 +0000

At the Zero Day Initiative (ZDI), we see patches in a way few do. We get the initial report from a researcher, we verify the issue internally, we notify the vendor, and finally we publish some details once a patch is released. Those patches represent the best method for preventing cyber attacks. Recently, an issue…

Read More
ComputerWorldIndependent

'Perfect storm' of ransomware and network worm hits unprotected computers globally

Credit to Author: Matt Hamblen| Date: Mon, 15 May 2017 07:59:00 -0700

The cruel reality of a global ransomware attack that crippled computer systems in 150 countries on Friday is this: Attackers took advantage of under-prepared computer users and their organizations.

 

Enterprises — including manufacturers, car makers, hospitals and government agencies — were running older versions of Windows or hadn’t patched even the newest Windows versions with a patch that Microsoft released in March.

 

And, truth be told, some unsuspecting users evidently clicked on email links or, more likely, a suspected compressed Zip file attachment that launched the ransomware known as WannaCry, also known as WannaCrypt or WannaCrypto.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

WannaCry and the Executive Order

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Mon, 15 May 2017 13:08:41 +0000

Last week, The White House released its long awaited Executive Order (EO), Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, ironically enough during the same week we experienced the largest single ransomware attack that, by some estimates, has affected more than 200,000 victims across 150 countries. My intentions were to highlight the EO in…

Read More