Users Online Now:
Back to Forum
Back to Thread
REPLY TO THREAD
Q just hit the panic switch. Qanon drop
Ms Sans Serif
In accordance with industry accepted best practices we ask that users limit their copy / paste of copyrighted material to the relevant portions of the article you wish to discuss and no more than 50% of the source material, provide a link back to the original article and provide your original comments / criticism in your post with the article.
[quote:Anonymous Coward 78161330:MV80MTg3NjQ5Xzc2MTQ5OTk5X0I3NDc3MDlC] Another major revelation came in in early 2017 when one bit of Internet-based criminal activity made headlines worldwide for reasons that took a while to emerge, both to the general public and Internet security professionals. The incident began with the activation of ransomware malware called WannaCry. What made WannaCry so dangerous was that it made use of several capabilities including a hidden (but findable) backdoor program that tried to spread WannaCry to Microsoft Windows computers that had a known vulnerability but were not updated to remove the vulnerability. This automatic spread of malware is called a worm and it depends on other computers being vulnerable to allowing malware to be automatically installed. With WannaCry local PC networks run by Microsoft server software were vulnerable if the latest patches were not installed. What made this newsworthy was that the worm depended on information stolen from the NSA (American National Security Agency) and made public by Wikileaks earlier in 2017. The NSA tool was called EternalBlue and it used a ZDE (Zero Day Exploit) stockpiled by the NSA for possible Cyber War operations. This particular ZDE exploited a flaw in Windows network software allowing the EternalBlue program to quietly insert itself into other PCs on the same network as the PC infected (probably via a spearfishing attack) with WannaCry. All this was news for several reasons. First, the attack could have been a lot more effective than it was except for a hidden flaw (a kill switch) that was soon discovered and activated because of the efforts of an international network of White Hat hackers. Then the incident became even more mysterious. While at least a quarter million PCs in 150 countries were infected with Wannacry and had their hard drive contents encrypted, only about one in a thousand of these PCs paid the $300 (in bitcoin) ransom. But those who paid the ransom did not receive the decryption information and the bitcoin payments (worth nearly $100,000) were sent to three bitcoin “wallets” that had apparently been abandoned. [/quote]
Get down and lick it.
link to www.youtube.com (secure)
Pictures (click to insert)
Big Round Smilies
Aliens and Space
Friendship & Love
Misc Small Smilies
View All Categories
Next Page >>
Disclaimer / Copyright Info
with questions or comments about this site.
"Godlike Productions" & "GLP" are registered trademarks of Zero Point Ltd. Godlike™
Website Design Copyright © 1999 - 2020 Godlikeproductions.com
Page generated in 0.03s (5 queries)