| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 143918 | 2017-05-12 22:02:00 | Cyber attacks/Ransomware | tingle (6539) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 1435262 | 2017-05-14 22:06:00 | Welcome to Press F1 If your system is fully up to date you should be OK. It is always a good practice to back your data (and perhaps an image of your operating system) up to an external drive and keep that disconnected except when actually backing up. That way if you do get an infection you can reinstall your operating system then replace your data. Very good advice. You/We MUST have a backup of our data NOT connected to our computer system. I got hit by ransomware two years ago, and it works it way through Al of your files on ALL drives connected. So you Must have a backup off site and not connected. So luckily I only lost 2 weeks data. I was not going to pay them, as it will only encourage them. And they do not give you much time in which to buy their BITCOINS. They need to be caught and SHOT as a warning to others. |
Digby (677) | ||
| 1435263 | 2017-05-14 22:22:00 | What about the ones still clinging to win7 You mean the Luddites who are missing out on new features etc? |
Digby (677) | ||
| 1435264 | 2017-05-14 22:26:00 | This latest ransom wear WCRY was developed after finding the vulnerabilities on Wikileaks after they published the results of work done by American Security forces to find vulnerabilities! | Digby (677) | ||
| 1435265 | 2017-05-14 22:27:00 | Very good advice. You/We MUST have a backup of our data NOT connected to our computer system. I got hit by ransomware two years ago, and it works it way through Al of your files on ALL drives connected. So you Must have a backup off site and not connected. So luckily I only lost 2 weeks data. I was not going to pay them, as it will only encourage them. And they do not give you much time in which to buy their BITCOINS. They need to be caught and SHOT as a warning to others. I assume that cloud backups would also be compromized?? |
paulw (1826) | ||
| 1435266 | 2017-05-14 22:49:00 | MS have already put out an Update/ patch on March 14, as long as all security updates are installed people should be covered ( famous last words) ;) heres the stupid thing If you havnt installed the Mar patch of Mar update rollup, then running the usual Winupdates : check for ups wont give you the mar rollup, you get the May update Does the May rollup include that patch , God only knows . (I wouldnt count on it) Does each monthy rollup include all missed rollups ? I you miss a monthly rollup, missed rollups arnt offered up via WindowsUpadte |
1101 (13337) | ||
| 1435267 | 2017-05-14 23:10:00 | Obviously you haven't thought it through, or actually don't know how the infection actually works, and required what conditions to be present . 1 . Microsoft DID know about the vulnerability, April 14, that's why they made a patch, it wasn't till it was made public ( via the update in March being put out) that someone exploited it . 2 . Microsoft Patched the vulnerability, so even if it were laying in wait, it COULDN"T run and do damage because the vulnerability was no longer there that it required . 1 . Oh I see . Microsoft knew about the vulnerability in April so they made a patch for it and backdated it to March . :confused: Do they have a Time Machine? 2 . Whether the patch stops further entry or any exit I have no idea, and suggest you dont either, but the problem is, as I see it, is that if the Clone of the system was made prior to the patch and the effect of the virus was delayed, then youre dead meat again upon System Restoration . All this aside it is pretty poor form when a company like Microsoft find it necessary to put out endless security patches now done cumulatively there are that many of them . In short, we now have more patches than Tyre and a new Tyre in required . I got a couple of new tyres for free, different make though and am as happy as a dog with two tails . :) |
B.M. (505) | ||
| 1435268 | 2017-05-14 23:24:00 | 1. Oh I see. Microsoft knew about the vulnerability in April so they made a patch for it and backdated it to March. :confused: Do they have a Time Machine? 2. Whether the patch stops further entry or any exit I have no idea, and suggest you don’t either, but the problem is, as I see it, is that if the Clone of the system was made prior to the patch and the effect of the virus was delayed, then you’re dead meat again upon System Restoration. All this aside it is pretty poor form when a company like Microsoft find it necessary to put out endless security patches now done cumulatively there are that many of them. In short, we now have more patches than Tyre and a new Tyre in required. I got a couple of new tyres for free, different make though and am as happy as a dog with two tails. :) In the link provided, which is where just some of the information is provided. ( more then likely you haven't read it all) this is what I was referring to, then you'll see. en.wikipedia.org EternalBlue,sometimes stylized as ETERNALBLUE,is an exploit developed by the U.S. National Security Agency (NSA). It was released by the Shadow Brokers hacker group on April 14, 2017. So MS knew about the problem in March and fixed and it was then announced in April. My wording, I may have put that date in the wrong place, couldn't edit as PF1 AGAIN went tits up and wouldn't load, ( other sites fine) guess the Linux servers again playing up. It still comes back to one basic item, No matter what the OS, Windows, Linux, iOS, the companies put out security patches to fix vulnerability's, if a person decides not to close possible points of attack on their computer that their fault. They don't put out patches just for fun. While it is completely possible that a imaged OS will have some bug, its the old story, why wait till its fixed - Anyone who does this sort of attacks is out to cause as much trouble as they can, waiting till a lot of computers are patched is simply defeating the objective. As Kame posted in #37 Attacks can sit for a while, usually they give them a chance to fix the problem and if they ignore the issue, they make them fix it promptly after the attacks run wild MS did fix it, the problem was made public a month later, and some places/people still didn't update the security fixes - so they paid the price now. Part of a systems Admin is to look out for these types of problems, one patch is all it takes to stop it in its tracks. Then again I spose if places cut back on IT again they pay the price. |
wainuitech (129) | ||
| 1435269 | 2017-05-15 01:07:00 | It still comes back to one basic item, No matter what the OS, Windows, Linux, iOS, the companies put out security patches to fix vulnerability's, if a person decides not to close possible points of attack on their computer that their fault. . At least MS is very active in patching bugs, even on very old systems. Plenty of other Vendors do the least possible and abandon products very early & wont patch them (eg home modem/routers, security cams, etc etc) So BM should give some credit to MS for at least trying, rather than look they other way & pretend (as per other some Brands) My phone & tablet have a known security hole that will NEVER get patched, both abandoned by Android & Samsung within a year . |
1101 (13337) | ||
| 1435270 | 2017-05-15 01:20:00 | At least MS is very active in patching bugs, even on very old systems . Plenty of other Vendors do the least possible and abandon products very early & wont patch them (eg home modem/routers, security cams, etc etc) So BM should give some credit to MS for at least trying, rather than look they other way & pretend (as per other some Brands) . I think HELL would freeze over before that happened :lol: |
wainuitech (129) | ||
| 1435271 | 2017-05-15 01:45:00 | So BM should give some credit to MS for at least trying. They're "Trying" alright, very bloody trying. :D |
B.M. (505) | ||
| 1 2 3 4 5 6 7 | |||||