Posted on 05/13/2017 8:04:39 AM PDT by Ernest_at_the_Beach
The massive cyber attack on NHS left the everyone thinking about the origin of hackers. Now, according to the latest report, the gang could have alleged links to Russia. The cyber attack is possibly a reprisal for attacks on Syria by the US.
In April, a mysterious hacker group called Shadow Brokers went on claiming that it has stolen a cyber weapon from an American spying agency. The group claimed that the tool would give it an open access to all the systems running Microsoft Windows operating system. Thes stolen cyber weapon belonged to the National Security Agency (NSA), which is Americas most powerful military intelligence unit. NSA developed the Eternal Blue hacking weaponry to fetch access to systems used by extremist groups and enemy states.
**************************************************CLIP***********************************************
Much more at website.
Wikileaks: CIA can make cyberattacks look like they originate from Russia
http://www.theamericanmirror.com/wikileaks-cia-can-make-cyberattacks-look-like-originate-russia/
Hard to tell what’s the truth anymore.
*******************************************************************
From the bottom of the article:
***************************************
People using Microsoft computers must install MS17-010 fix right now. We would like to urge our readers to be extremely careful of all the e-mails they get, specifically the ones with attachments.
I read that Russia was hit especially hard by the ransom ware due to the use of potato computers and outdated OS use.
After hacking our election, this must have been a piece of cake.
ransomware execute as ordinary programs that need neither privileged access nor a “security hole” in order to function. They run just fine even in a limited user account that has zero privileged access. So I really don’t know what all of this “patch” nonsense is about.
For any windows system that has been “patched” or not, all one has to do is stupidly click the wrong link (or stupidly open an attachment) in an email and any ransomware program will land in the user’s temp file area and execute, accessing every user data file with designated filetypes, reading said files and then writing them back with an unbreakable encryption.
If one has file shares that said user can access and/or usb attached files, then those get encrypted as well.
This has been going on for years. I had one client where one click of one email link encrypted every file on every file share.
so-called antivirus programs basically just recognize signature patterns in the virus executable and if they haven’t seen a particular signature before then they are helpless.
microsoft systems are inherently insecure no matter how many “patches” they issue because they allow all users to execute any ordinary program from any location in the user’s file tree. even worse, by default, all users on a microsoft system are supersusers with full privileged access at all times.
microsoft systems can be secured only by making ordinary user accounts limited-privilege accounts by default, and taking all execute privilege from limited users except for programs that have been installed by the system itself into system areas of the file system that are not write-accessible by limited users, but microsoft refuses to do that.
As a consequence, almost all microsoft home systems are riddled with viruses sooner or later and most people find it cheaper to buy a new computer (with a new microsoft operating system and office program) than to have their system restored to factory state, all updates applied, all programs reinstalled and all data copied and restored. Thus, microsoft (and its oem partners) profit enormously from selling grossly unsecured systems, which means selling insecure systems is a deliberate profit-making strategy by microsoft.
” a day after President Trump set off the chemical attack on Syria. “
i stopped reading right there ...
Anyhow, these guys were after money.
This attack was stopped by a malware tech registering a website that the virus was trying to contact. Failed contact sent it into encrypt mode. The guy registered the site and let the viruses phone home and then they were defeated. Sadly this virus will be back shortly with the feature removed.
I suspect the mortality rates of those covered by the NHS will go down.
Gonna get serious in working on putting up a virtual OS named QUBES,,,Linux based...but it's objective is security thru isolating Virtual Machines,.
May need some newer power machines.
The rumored new AMD Whitehaven 16 core workstation ought just be a nice rig,.....
Imagine that, making it look like Clinton and Wasserman Schultz had things rigged?
I like that big map,...but I am assuming that the blue dots represent sites attackers have hit,.
Not even that much money either, like $300 per incident.
Cyberpunks on a joyride....
Yeah, real cheap, India maybe?
Last Update: 2016-12-14 13:37 UTC
OS Type: Linux
********************************************************
You would run windows in a Virtual Machine...
Sharing FILES across Domains would normally NOT be allowed.
i read that too- hospitals were especially targetted too because they usually havent; switched over ot windows 10 aND MANY still use xp i guess-
Bkmrk.
Not for all incidences, I know of one company that paid over $500k. Depending on the size and type of company, they will ask for more ransom.
Because, as we all know, Russia is also behind those Nigerian scams, too.
This is the sole method Russia has to stay financially afloat.
/sarcasm
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.