World hacker attack in progress

http://www.independent.co.uk/news/uk/home-news/nhs-cyber-attack-hospitals-hack-england-emergency-patients-divert-shut-down-a7732816.html

https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html

And more news

Be careful to open mail (ramsoware attack), and make sure you have the updated pc.
They take advantage of an old security breeze windows

I opened this 3d given the severity of the situation, are talking about the Italian news

Hospital computers across Britain shut down by cyberattack, hackers demanding ransom

https://www.rt.com/uk/388115-nhs-hospitals-cyber-attack/

It probably doesn’t help that the UK NHS is still using XP I believe, they paid a large sum to Micro$oft to provide further support. Certainly doctors surgeries or outpatient departments that I have seen recently were still using it.

I’m also certain that the further support for XP expired in May 2015.

I don’t have the exact dates, but given what I have seen they are still using XP and I would imaging they would still be paying through the nose for support.

Only system that don’t have this fix can become victim of the attacks
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

Latest status is that over 45.000 attacks have taken place spread out over 74 countries.
Most attacks where against Russian companies/institutions.

so the question is… does a paid version of Avast find it?

Paid or free doesn’t matter they are using the same detection methods.

https://www.avast.com/virus-update-history

The thing that I don’t get it is that why don’t they install newer version of Windows Operating System. I understand that some or most of their programs that they use may or may not work on new windows OS. Their IT department should make compatibility as quickly as possible. Even here (NZ) whenever i go places like banks,shops, university, hospitals they all moved to Windows 10 why can’t those affected countries can’t move to new windows OS :o

Are we safe now that Avast is up to date?

How does this thing spread?

Is is dangerous to be online now?

It is always dangerous to be online.
On a average day 1 million new threats are emerging.

All Windows versions that are not patched are vulnerable.
There is no patch for XP, only for Vista and newer.

Will avast stop the attack?

@bingvarstand: Use common sense

a) Make sure you have the latest Windows OS System and make sure it’s fully up-to-date via Windows Update.
b) Make sure you have the latest version of Avast.
c) Only download programs software from official website.
d) Make sure all your other browsers (google chrome, Firefox, internet explorer are up-to-date) and other program such as java, flash player, adobe reader. Including your graphics drivers. Including your other programs that you use i.e. other editing program such as AutoCAD and etc are fully up-to-date.
e) Install a second anti malware scanner such as MalwareBytes.
f) Don’t click on links/ads that is too good to be true that appear in the browser. Install AdBlock Plus to block these annoying messages.
g) Don’t click on links/attachment in emails from unknown senders. If a friend or a company sends a attachment or links that you are not sure about contact them to make sure.
h) Install Unchecky so whenever you install a program it won’t install potential unwanted software/program along with the program you want to install, because at present when you want to install a program, it also installs other programs that is not necessary.
i) Scan your whole computer once every week by Avast and MalwareBytes.
j) Don’t install other optimizer/system registry/ etc because they will cause more harm in your computer.
k) Make sure you install patches/updates/bug fixes/etc that is delivered through your machine manufacturer i.e. HP, DELL, and etc. They use HP Support Assistant and DELL Support Assist to transfer these updates to your computer.

See reply #7

Great advice, thanks.

It says so on the list so yes?

Your welcome :). Yes Avast will stop these attacks. Just make sure you keep it always up-to-date (program version)

Given that there were at least 4 major rollups today and many more streaming updates today (DavidR would be able to say roughly how many streaming updates) the answer would be yes.

PEBKAC would be the rule: :smiley: It is the user that provides most of the risk.

Agree with you mchain, but we still haven’t woken up to the situation we have now in our part of the world.
First the global puppet masters worked hand in foot with governments and big global corps to spy on their own citizens.

They also dumbed them down to a level where they won’t even have to fear the least form of any futile resistence.

I see youngsters now that haven’t even learnt how to discern between even and uneven month days on the knuckles of their two hands. What do these Mrs Robinsons learn these kids these days? They cannot fence for themselves whatoever.

Same in the digital world. Gaping holes in propriety software. Windows defender holed, cannot be patched because many AV have it disabled by default. You have a problem with global ransomeware now as the goodies wrought by NSA, CIA, FBI also finally land with the bad and the ugly. IT has not learned to protect us. All clever d*ckies have to leave the office as they form a threat to their ruling dumb but greedy manager class. Staff, that are too dumb to p**p, but greedy and manipulative enough to rule the meek out of all of their money. I do not see a solution for the near future, I only see the situation detoriating further. Who’s gonna save us? A Russian tree saint like Kaspersky or DrWeb’s?

Make America great again, and if you have to admit you dumbed them down yourself and worked your infrastructure down the drain. Then your leaders start whining and blame the Russkies and other well educated people. Like the end-times of Imperial Rome it is. I cannot feel pity for them anymore now, and I laugh when I see al the hospital and police sites having to be taken down against the global ransomeware threat we have at her hands now. When will the people learn to go back and fence for themselves again.

polonus

Oh and now away from the more negative complaints
to some more practical tips in the light of the threat of WannaCry ransomeware!

  1. Patch, patch, patch, and keep patching.
  2. Perform vulnerability scanning.
  3. Block Tor onion networking for your firm’s network.
  4. Make that ports 137-139 and 445 can never be reached from the Interwebs.
  5. Use 2FA and IP restriction whenever RDP has to be available from the Internet.
  6. Use anti-exploit products onto your end-points.
  7. Work SMB through your local FW.
  8. Filter all outgoing traffic and use IPS.
  9. Block all mail related scripts and executables… (info credits go to SecGuru_OTX).

Read: http://blog.talosintelligence.com/2017/05/wannacry.html#more

https://www.bleepingcomputer.com/news/security/wana-decryptor-wanacrypt0r-technical-nose-dive/

polonus

And perhaps the best tip.

Stay away from computers if you haven’t got a clue about security.
I still see that most people are using a account with admin rights for daily use.