Blogger Accidental Hero solves cyber hack issue... finds kill switch | |
Anonymous Coward User ID: 74879272 United States 05/13/2017 10:03 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 57618523 Canada 05/13/2017 10:07 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 57618523 Canada 05/13/2017 10:08 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 74756964 United States 05/13/2017 10:34 AM Report Abusive Post Report Copyright Violation | Bullshit, government cover up. The virus was the governments doing and did exactly what they wanted it to do, cause and effect. They got what they wanted or killed who they wanted then they stopped the virus and they give this lame story. Bullshit. Watch the shiny keys and pay no attention to the man behind the curtain. |
Anonymous Coward User ID: 74841941 United States 05/13/2017 10:40 AM Report Abusive Post Report Copyright Violation | Or more likely, this guy just took notice of the virus trying to make a TCP connection to a non-existent domain and put two and two together. |
Only Original Documents User ID: 73798215 United States 05/13/2017 10:43 AM Report Abusive Post Report Copyright Violation | |
Toprance1 User ID: 70287640 United States 05/13/2017 10:47 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 69126413 United States 05/13/2017 10:47 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 63339047 United States 05/13/2017 10:50 AM Report Abusive Post Report Copyright Violation | Have you made a personal chart taking care to note who appear to be the “leaders” versus who appear to be the “followers”? Have you attempted to gauge the “temperature” of the forum’s users? In other words, the prevailing social psychology of the forum’s members? Have you been more successful with one or the other XStart methods that were demonstrated in N-7015A.DOC? Have more technical members (Computer Programmers, Administrators, or Moderators) of the forum deduced or accused you of hiding behind a proxy? Would you gain more trust and/or credibility if you were to use one of the Agency’s allotted “HOME” pools? (most often needed when handling EVTS that are more sensitive to the pop. of a specific locale but also location centered web sites such as FB or Patch) Has your PREDEV “persona” been successful or do you gauge that the users find you to be too obtrusive? Accusations of being “ever present” are. |
Anonymous Coward User ID: 74866510 Germany 05/13/2017 10:51 AM Report Abusive Post Report Copyright Violation | [link to www.theguardian.com (secure)] Quoting: deplorable granny basket less than 50% snip An “accidental hero” has halted the global spread of the WannaCry ransomware, reportedly by spending a few dollars on registering a domain name hidden in the malware. The ransomware has wreaked havoc on organizations including FedEx and Telefonica, as well as the UK’s National Health Service (NHS), where operations were cancelled, x-rays, test results and patient records became unavailable and phones did not work. However, a UK cybersecurity researcher tweeting as @malwaretechblog, with the help of Darien Huss from security firm Proofpoint, found and activated a “kill switch” in the malicious software. Live Cyber-attack: May says 'no evidence' NHS patient records compromised – live British prime minister thanks NHS staff for working overnight after attack of ‘unprecedented’ scale Read more The switch was hardcoded into the malware in case the creator wanted to stop it spreading. This involved a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading. Who would "accidently" register a domain name, that is hidden in the program code and that is exactly how to stop the virus. And its the same guy, whos website became famous, because of the virus. What a coincidence. I hope someone has a good long look a this. |
Bluebird1 User ID: 66433951 United States 05/13/2017 10:54 AM Report Abusive Post Report Copyright Violation | Bullshit, government cover up. The virus was the governments doing and did exactly what they wanted it to do, cause and effect. They got what they wanted or killed who they wanted then they stopped the virus and they give this lame story. Bullshit. Quoting: Anonymous Coward 74756964 Watch the shiny keys and pay no attention to the man behind the curtain. I totally agree with you. |
Anonymous Coward User ID: 72620164 Mexico 05/13/2017 10:55 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 71572715 United States 05/13/2017 11:00 AM Report Abusive Post Report Copyright Violation | [link to www.theguardian.com (secure)] Quoting: deplorable granny basket less than 50% snip An “accidental hero” has halted the global spread of the WannaCry ransomware, reportedly by spending a few dollars on registering a domain name hidden in the malware. The ransomware has wreaked havoc on organizations including FedEx and Telefonica, as well as the UK’s National Health Service (NHS), where operations were cancelled, x-rays, test results and patient records became unavailable and phones did not work. However, a UK cybersecurity researcher tweeting as @malwaretechblog, with the help of Darien Huss from security firm Proofpoint, found and activated a “kill switch” in the malicious software. Live Cyber-attack: May says 'no evidence' NHS patient records compromised – live British prime minister thanks NHS staff for working overnight after attack of ‘unprecedented’ scale Read more The number of his name indicated by his alleged initials makez me suspicious. The switch was hardcoded into the malware in case the creator wanted to stop it spreading. This involved a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading. Who would "accidently" register a domain name, that is hidden in the program code and that is exactly how to stop the virus. And its the same guy, whos website became famous, because of the virus. What a coincidence. I hope someone has a good long look a this. |
Anonymous Coward User ID: 73070705 Canada 05/13/2017 11:01 AM Report Abusive Post Report Copyright Violation | The part that sucks... even if it is 100% fabricated bullshit (this hero blogger story), 98% of the public will buy it, and they'll continue their shenanigans. Over and over and over and over... And we'll continue to be tormented knowing there is nothing we can do about it. The real truth is that people are too consumed in their minuscule lives to give a shit. |
Anonymous Coward User ID: 74829802 Australia 05/13/2017 11:05 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 74867746 Canada 05/13/2017 11:07 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73690216 United States 05/13/2017 11:08 AM Report Abusive Post Report Copyright Violation | [link to www.theguardian.com (secure)] Quoting: deplorable granny basket less than 50% snip An “accidental hero” has halted the global spread of the WannaCry ransomware, reportedly by spending a few dollars on registering a domain name hidden in the malware. The ransomware has wreaked havoc on organizations including FedEx and Telefonica, as well as the UK’s National Health Service (NHS), where operations were cancelled, x-rays, test results and patient records became unavailable and phones did not work. However, a UK cybersecurity researcher tweeting as @malwaretechblog, with the help of Darien Huss from security firm Proofpoint, found and activated a “kill switch” in the malicious software. Live Cyber-attack: May says 'no evidence' NHS patient records compromised – live British prime minister thanks NHS staff for working overnight after attack of ‘unprecedented’ scale Read more The switch was hardcoded into the malware in case the creator wanted to stop it spreading. This involved a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading. Who would "accidently" register a domain name, that is hidden in the program code and that is exactly how to stop the virus. And its the same guy, whos website became famous, because of the virus. What a coincidence. I hope someone has a good long look a this. ^^This Next we will here that our govts are going to have to control the internet because of this, and many changes will be be forthcoming. I don't think this was just a random person doing this, and I would suspect despite the writing in broken English, that English is their first language. |
The Comedian :D User ID: 71072792 United States 05/13/2017 11:13 AM Report Abusive Post Report Copyright Violation | If the virus was written in a managed language where it was that easy to look under the hood and see what it was doing, it wasn't a very advanced hacker who wrote the virus. I professional would use a low level language and obfuscate the code. Quoting: R. Wordsworth Or more likely, this guy just took notice of the virus trying to make a TCP connection to a non-existent domain and put two and two together. Stop harshing the hacker mystique, man! Saint Comedian, Patron Saint of Bringing the Butthurt to Dipshits ‘There are some assholes in the world that just need to be shot.’ - General Mattis, USMC, Secretary of Defense [link to www.godlikeproductions.com] "Subterfuge and social pressure are the wheel and fire of the 21st century" - Some asshole Legal Disclaimer: All comments are intended as humor and/or fiction and not advice, and not to be confused with any event or person, living or dead. |
Anonymous Coward User ID: 71598638 United States 05/13/2017 11:21 AM Report Abusive Post Report Copyright Violation | If the virus was written in a managed language where it was that easy to look under the hood and see what it was doing, it wasn't a very advanced hacker who wrote the virus. I professional would use a low level language and obfuscate the code. Quoting: R. Wordsworth Or more likely, this guy just took notice of the virus trying to make a TCP connection to a non-existent domain and put two and two together. Stop harshing the hacker mystique, man! :debbiedowner: :youreafag: |
Double O Dan User ID: 74614117 United States 05/13/2017 11:22 AM Report Abusive Post Report Copyright Violation | |
The GWAIN User ID: 71188840 Costa Rica 05/13/2017 11:22 AM Report Abusive Post Report Copyright Violation | This place never ceases to amaze me. Some kid attaches existing ransomware to an known vulnerability with a published exploit and it becomes a government psyop. There was nothing sophisticated about this. People panic in groups and recover individually. |
SmoothSailing User ID: 71448021 United States 05/13/2017 11:30 AM Report Abusive Post Report Copyright Violation | "A nation can survive its fools, and even the ambitious. But it cannot survive treason from within. An enemy at the gates is less formidable, for he is known and carries his banner openly. But the traitor moves amongst those within the gate freely, his sly whispers rustling through all the alleys, heard in the very halls of government itself. For the traitor appears not a traitor; he speaks in accents familiar to his victims, and he wears their face and their arguments, he appeals to the baseness that lies deep in the hearts of all men. He rots the soul of a nation, he works secretly and unknown in the night to undermine the pillars of the city, he infects the body politic so that it can no longer resist. A murderer is less to fear." Marcus Tullius Cicero |
Anonymous Coward User ID: 74872507 United States 05/13/2017 11:34 AM Report Abusive Post Report Copyright Violation | Bullshit, government cover up. The virus was the governments doing and did exactly what they wanted it to do, cause and effect. They got what they wanted or killed who they wanted then they stopped the virus and they give this lame story. Bullshit. Quoting: Anonymous Coward 74756964 Watch the shiny keys and pay no attention to the man behind the curtain. Agreed! |
The GWAIN User ID: 71188840 Costa Rica 05/13/2017 11:39 AM Report Abusive Post Report Copyright Violation | Bullshit, government cover up. The virus was the governments doing and did exactly what they wanted it to do, cause and effect. They got what they wanted or killed who they wanted then they stopped the virus and they give this lame story. Bullshit. Quoting: Anonymous Coward 74756964 Watch the shiny keys and pay no attention to the man behind the curtain. Agreed! Why would the government (assume you mean U.S.) use this shitty ransomware? It made a lot of fucking noise out of the gate. Would they have not release it quietly into the public and then do their damage? People panic in groups and recover individually. |
Anonymous Coward User ID: 73465623 United States 05/13/2017 11:40 AM Report Abusive Post Report Copyright Violation | This place never ceases to amaze me. Some kid attaches existing ransomware to an known vulnerability with a published exploit and it becomes a government psyop. Quoting: The GWAIN There was nothing sophisticated about this. There was nothing intelligent about the digital security services of 99 countries either - if this story is to be believed. It should have taken a maximum of 10 malware defense guys a maximum of 1 hour to find the killswitch - especially if the url it was checking for was hardcoded and not a moving target. I call bullshit. |
Anonymous Coward User ID: 6147536 United States 05/13/2017 11:41 AM Report Abusive Post Report Copyright Violation | |
deplorable granny basket (OP) User ID: 27086049 United States 05/13/2017 11:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 6147536 United States 05/13/2017 11:42 AM Report Abusive Post Report Copyright Violation | This place never ceases to amaze me. Some kid attaches existing ransomware to an known vulnerability with a published exploit and it becomes a government psyop. Quoting: The GWAIN There was nothing sophisticated about this. There was nothing intelligent about the digital security services of 99 countries either - if this story is to be believed. It should have taken a maximum of 10 malware defense guys a maximum of 1 hour to find the killswitch - especially if the url it was checking for was hardcoded and not a moving target. I call bullshit. nothing sophisticated about STUXNET either... I know |
Luxen User ID: 72359105 United States 05/13/2017 11:42 AM Report Abusive Post Report Copyright Violation | |
ScoutsOUT User ID: 70544232 United States 05/13/2017 11:49 AM Report Abusive Post Report Copyright Violation | Bullshit, government cover up. The virus was the governments doing and did exactly what they wanted it to do, cause and effect. They got what they wanted or killed who they wanted then they stopped the virus and they give this lame story. Bullshit. Quoting: Anonymous Coward 74756964 Watch the shiny keys and pay no attention to the man behind the curtain. Sounds more than plausible "Be polite, be professional, be prepared to kill everyone you meet." What keeps you awake at night? "Nothing, I keep other people awake at night." Secretary of Defense, James Mattis |