World hacker attack in progress

Hi DavidR,

Yes, know there are other ways to skin this proverbial animal, but as I stumbled upon the IP blocking by DShield, I would not like to have the info withheld from our users, just to be complete on the Wannacry related info and some here may appreciate this info. I know some of our good friends on these forums here are into IP blocking. That’s all and why.

Damian

Decryptor tool for WannaCry-ransomeware on XP: https://github.com/aguinet/wannakey

polonus

Going over the Ooniprobe censorship and blocking reported IPs:
http://money.cnn.com/2017/02/08/technology/ooniprobe-censorship-mobile-app/

I stumbled upon this in Germany:
https://explorer.ooni.torproject.org/measurement/20170520T002129Z_AS680_bOmWCjhuoFhTdDyTbkO5o7QsVTzozuSQLhW0RebwGY2GsqStrN?input=128.31.0.39:9131

setting out clearly that the initial NSA tools were being positioned against tor-users, read also this:

https://security.stackexchange.com/questions/42751/attack-on-tor-with-stolen-private-keys-of-main-nodes

See also: https://otx.alienvault.com/indicator/ip/128.31.0.39/ & http://www.malware-traffic-analysis.net/2015/09/18/index.html
and this report: http://trapx.com/wannacry-thoughts-and-threat-intelligence/ (info credits for links by, Moshe Ben Simon, VP ofServices and TrapX Labs, StackOverflow’s trankvilezator on insider NSA attacks against the general public’s infrastructure.

Now after this has been going on for 5 years, we all should be aware what the proliferation of such official guv malware used in these actions has brought us all: threats and threats and new threats. These spooks have turned the Interwebs in an even more insecure place for all users.

polonus

WannaCry - Don’t get caught, be prepared.
https://youtu.be/6Ad-eXoQVIk

WannaCry - An Easy Fix
https://youtu.be/1p62X8MBpF4

Hi bob3160,

Apparently mankind does not learn from history. This should never have happened after what we remember of the Blaster disaster.
It still did. There were people that were willingly sitting on exploits, they better had shared with the community to be patched.
And I asume also in the AV industry there is insecurity that has not been shared with those it should have been shared with.

polonus

The aftermath of this has not left us with 16.000 servers still infested and some 91.000 unpatched:

https://blog.shodan.io/analyzing-post-wannacry-smb-exposure/

NSA oversight really has some explanation to do towards the global community and to those whom they endangered
with their schemes, and not only think ‘about the glory of the bold and the free’. :frowning: >:(

Good Google launched a back-up tool for us all. :wink:

polonus

New attack

http://www.independent.co.uk/life-style/gadgets-and-tech/news/nhs-hack-cyber-attack-wannacry-world-global-ukraine-russia-rosneft-maersk-a7810656.html

Petya-based ransomware is spreading and infecting computers around the world
https://blog.avast.com/petya-based-ransomware-using-eternalblue-to-infect-computers-around-the-world