Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Crippling cyberattack continues to spread around the world
L A Times ^ | 05/13/2017 6:45 pm Pacific

Posted on 05/13/2017 10:11:46 PM PDT by BenLurkin

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-31 last
To: BenLurkin
Saw this online this morning...if you can't patch, disable SMBV1.0


21 posted on 05/15/2017 6:37:25 AM PDT by mac_truck (aide toi et dieu t'aidera)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia
Phishing and spear-phishing represent the majority of malicious exploit distributions around the world today. Despite being "shouted down" by other FReepers calling me a Microsoft fanboi, which I freely admit I am, Microsoft isn't the problem here. This is a user education issue.

No, that's not correct. The attacking software probes for SNMP v1 on listening computers and exploits the bug. There is no user involvement at all.

22 posted on 05/15/2017 6:50:38 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 17 | View Replies]

To: rarestia

Sorry, that should say SMB v.1 not SNMP.


23 posted on 05/15/2017 6:53:29 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Cen-Tejas
Thought I had the best anti virus!

Anti-virus can't stop the attack. The attacking software connects directly to the vulnerable service and all that anti-virus does is stop execution of downloaded malware, clicking on attachments, etc. The only way to stop the attack is to stop incoming connections with a firewall. Windows firewall will do it, either stopping all incoming connections or just port 139 which has the vulnerability. You can also turn off SMB v1 compatability which stops it. Or apply the patch. I never patch so I have to do one of the other things to stop it.

24 posted on 05/15/2017 6:57:22 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 20 | View Replies]

To: mac_truck

Yep, that’s right. I did that (disabled SMB v.1) But I also stopped incoming connections, then realized I needed one. So I stopped incoming to port 139 instead using Windows firewall.


25 posted on 05/15/2017 6:58:50 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 21 | View Replies]

To: palmer

It was also mentioned close down port 445.


26 posted on 05/15/2017 7:02:15 AM PDT by bar sin·is·ter
[ Post Reply | Private Reply | To 23 | View Replies]

To: palmer

SMB (over TCP 445) is not something most businesses have wide open to the Internet. There’s no evidence that the infection is spread through direct injection via SMB exposed to the Internet. The infection has to be introduced into an environment and can spread from there. If SMBv1 is available (and MS17-010 is not distributed), it makes lateral movement all that much easier.

There are 2 compromises here: SMBv1, addressed by MS17-010, and WannaCry(pt). WannaCry(pt) is your typical run-of-the-mill ransomware with logic built into it to look for SMBv1 to compromise. That’s new. Otherwise, the infection has to start by someone stupid enough to let it loose in an environment, and I stand by my original post.


27 posted on 05/15/2017 7:23:36 AM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: V1Rotate

My thoughts exactly.

I have multiple back ups of every file.


28 posted on 05/15/2017 7:26:47 AM PDT by Skooz (Gabba Gabba we accept you we accept you one of us Gabba Gabba we accept you we accept you one of us)
[ Post Reply | Private Reply | To 16 | View Replies]

To: palmer

..........just saw this this Sunday morning!

What my tech guy told me to do is just “turn it off” and it will go away. In my case, this threat was precisely known to him and all IT guys/gals. Namely, the culprits put a window saying EMERGENCY...........call Microsoft. Well, I bit and called the number. They sounded totally legit and even with background noise etc etc. But they were not Microsoft. They were crooks.


29 posted on 05/21/2017 7:23:30 AM PDT by Cen-Tejas (it's the debt bomb stupid)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Cen-Tejas
The EMERGENCY: CALL MS window is completely fake, put up by a rogue website usually using Flash. That venerable scam has zero relation to the port 139 attack, although they may claim otherwise. Usually they want you to call so they can "fix" your computer remotely. If you turn on remote desktop for them, you are pretty much cooked. If you do not, and do not do anything else they recommend, then you are safe.

They will claim otherwise and give you "proof" that you have been hacked which is all lies. I have salvage computers that they were let into via someone turning on remote desktop. But it's not easy or pretty (I often end up with broken drivers as I try to remove various infections).

30 posted on 05/21/2017 10:43:53 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 29 | View Replies]

To: palmer

...........very good info to know. I’m a self taught guy and can use them well as long as they work and no outsider rocks the boat. I did suspect BS when this happened and though I did call the number (it looked so authentic), and I did talk to someone (she sounded REAL), I did not give them CC info or let them take over my computer.

All I did was turn it off and unplug it until I could talk to my teckie!


31 posted on 05/21/2017 6:33:15 PM PDT by Cen-Tejas (it's the debt bomb stupid)
[ Post Reply | Private Reply | To 30 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-31 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson