Microsoft Releases Emergency Windows XP Update to Block WannaCry Ransomware
Hi Eddy,
The ironic part of it is that when you take your computer from the Internet the ransomeware cannot see the killswitch. ;D :o
The problem is everything (all systems) works with Microsoft software, that is our problem.
When are they gonna hold these folks at Redmond responsible for our predicaments,
and what they do to our parts of the world?
polonus
‘Accidental hero’ finds kill switch to stop spread of ransomware cyber-attack
This would have done it also > http://www.turnofftheinternet.com/ ;D
Hi Eddy,
But these escaped NSA tools now further escaped and has gotten into the hands of cybercriminals and have hit victims in 74 countries so far.
They knew it all along that Microsoft (from initial versions henceon) never was fit to be hung unto the Internet, and they kept all the now vicitims in the dark over the years.
Every patient that dies in hospital because of this, every western defense plane that makes a crash landing because of this
should hold these folks that creates such insecurity on purpose or by sheer incompetence responsible. And we aren’t out of the woods yet, folks, far from that. Bunch of greedy clowns putting us all at risk.
polonus
@ polonus
Your list in Reply #18 is missing one function and probably the most important.
Backup, backup, backup and don’t forget to backup. I think that you get the picture.
A robust backup and recovery strategy is crucial to combat ‘any eventuality’ not just virus/ransomeware.
Hi DavidR,
Cannot but agree with you there!
That was why it was not “my list”, but some-one else’s.
Of cource the first thing to perform on firing up any device is to make a complete back-up.
And then for those that hesitate the ‘cloud’ is never far off from your keyboard.
A pity however we will get more of these M$ A1 denial stories, they have never told it like it really was.
But we grown-ups here have known this all of the time.
Pity really this vulnerable Microsoft Software comes in large department store cash machines, and also in defense systems the freedom of our world relies on. So I hope they have that first priority also on the top of their priority list.
Damian
Follow the misery the guv spooks and cybercriminals created for us: https://intel.malwaretech.com/botnet/wcrypt
polonus
If you click the link above, a nice redirect before getting to the page.
- Does Avast protect against this ransomware?
- Does is require the victim to download some kind of file, or can it infect a device even without that?
Ehmen, go read the posts in this thread (and the others about this subject) and go read the links that have been posted.
Having this patch makes one immune to the threat, or it just reduces the chances of getting it?
But no-one here saw a link with the new positioning of Microsoft in the market. Recent blocking of torrenting, no more right to tinker (resource hacking), making the switch to linux harder: https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#Secure_boot_criticism
First they had to fear the anti-monopoly EU measures that guaranteed browser choice for you end-user. Now they come with more of the same or you have to pay for the Premium version. The globalists dictating on your choice, your freedom of information.
All platforms are gonna look the same like on an android and not everyone can afford a Mac or Premium Windows.
Just a couple more of these NSA inspired cybercriminal ransomeware attacks and they can further their agenda(s) much easier.
Dumb down the masses and feed them more of the same, away with Modern Renaissance, hello back Dark Feudal Middle Ages.
Time for the Rise of Dajjal :o
polonus
‘Like letting Tomahawk missiles get stolen’: Microsoft slams NSA mishandling of exploits
https://www.rt.com/usa/388374-microsoft-ransomware-tomahawk-attack/
Just stumbled unto this info online: Hi,
Just to have it stopped before anything can do it’s work:
In powershell and leave powershell open:
https://gist.github.com/N3mes1s/afda0da98f6a0c63ec4a3d296d399636
$createdNew = $False;
$mutex = New-Object -TypeName System.Threading.Mutex($true, “MsWinZonesCacheCounterMutexA”, [ref]$createdNew);
It blocks the process that encrypts.
Infocredits go to: Alex Warmerdam
polonus
For good explanation of how it works see this
Block those WannaCry IP’s: https://secure.dshield.org/forums/diary/WannaCry+Do+your+own+data+analysis/22424/
List:
‘188.166.23.127’,‘91.219.236.222’,‘46.101.166.19’,‘193.23.244.244’,‘62.210.124.124’,‘2.3.69.209’,
‘144.76.92.176’,‘91.121.65.179’,‘146.0.32.144’,‘148.244.38.101’,‘91.219.237.229’,‘50.7.161.218’,
‘149.202.160.69’,‘217.79.179.177’,‘87.7.10.93’,‘163.172.149.155’,‘212.47.232.237’,‘192.42.115.101’,
‘171.25.193.9’,‘81.30.158.223’,‘178.62.197.82’,‘195.22.26.248’,‘79.172.193.32’,‘212.47.244.98’,
‘197.231.221.221’,‘38.229.72.16’,‘5.35.251.247’,‘198.96.155.3’,‘46.101.166.19’,‘128.31.0.39’,
‘213.61.66.117’,‘23.254.167.231’
polonus
I have to say that trying to block individual IPs which are likely to be constantly changing is like trying to shoot a moving target. Unless there is some form of updated browser add-on, trying to update these manually is a bit crazy.