Jump to content

Near all WannaCry ransomware infected users were running Windows 7

GoodBytes
1 minute ago, SpaceGhostC2C said:

Exactly. So it didn't matter which OS you were running.

But because one OS forces updates on you, and the other leaves the choice to you, let us all jump to conclusions and praise Big Brother for doing What's Best For Us (TM) rather than letting us choose the risks we take and the time to do things like grown ups.

Who cares that this doesn't take into account the pool of potential targets (i.e., market share, but not just in general: market share among institutions worth targeting), etc. The obvious conclusion is that less choice is better, and the less you decide for yourself, the happier you will be.

what are you on about? for a start off most people dont know the risks of not updating all they see is another update that they cant be arsed to install secondly how is that big brother? there not trying to tell you what to do there trying to help........as for the rest of your rant, you think they targeted anything? it was an infected email, thats not targeting thats carpet bombing

 

"if nothing is impossible, try slamming a revolving door....." - unknown

my new rig bob https://uk.pcpartpicker.com/b/sGRG3C#cx710255

Kumaresh - "Judging whether something is alive by it's capability to live is one of the most idiotic arguments I've ever seen." - jan 2017

Link to comment
Share on other sites

Link to post
Share on other sites

Will this work? 

 

Ck76x6SWEAERcBB.jpg

 

On a serious note, I have a windows 7 thinkpad, scared to turn it on lol.

|EVGA 850 P2| |1440p PG279Q| |X570 Aorus Extreme| |Ryzen 9 3950x WC| |FE 2080Ti WC|TridentZ Neo 64GB| |Samsung 970 EVO M.2 1TB x3

 |Logitech G900|K70 Cherry MX Speed|  |Logitech Z906 |  |HD650|  |CaseLabs SMA8 (one of the last ones made)

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, GoodBytes said:

Maybe it was targeting Windows 7. It is the most used version of Windows, especially in businesses. Ransomware makers seeks companies more than individuals, as they can pay the big bucks. It takes advantage of the fact that many businesses have poor backup, and system recovery procedures in place, and take advantage of the fact that many businesses and many people follow the "If it works, I don't update" mentality, which is wrong.

I'm using 7 x64 on every machine under my ownership, not one of them has had issues so far.

 

I don't even use antivirus.

 

I have a large HOSTS file (1,000,000+ entries) and I use AdBlock, but that's it.

 

I've disabled Windows Defender because it sucks.

 

Basically the only defenses I have are my network firewall and my extremely slow hosts resolve...

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, SpaceGhostC2C said:

Exactly. So it didn't matter which OS you were running.

But because one OS forces updates on you, and the other leaves the choice to you, let us all jump to conclusions and praise Big Brother for doing What's Best For Us (TM) rather than letting us choose the risks we take and the time to do things like grown ups.

Who cares that this doesn't take into account the pool of potential targets (i.e., market share, but not just in general: market share among institutions worth targeting), etc. The obvious conclusion is that less choice is better, and the less you decide for yourself, the happier you will be.

If you're referring to forced updates on W10, then I personally see no reason whatsoever to be pissed off about it. I can't understand why someone would want to delay security patches in the first place, and you can defer feature updates in W10 if you're worried about MS releasing a feature update which installs their shit all up your ass 

 

You can also defer security updates for a lesser amount of time than feature updates. 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, H0R53 said:

I'm using 7 x64 on every machine under my ownership, not one of them has had issues so far.

 

I don't even use antivirus.

 

I have a large HOSTS file (1,000,000+ entries) and I use AdBlock, but that's it.

 

I've disabled Windows Defender because it sucks.

 

Basically the only defenses I have are my network firewall and my extremely slow hosts resolve...

I won't criticize your setup, as this is off topic. You do what you want, I don't care.

 

But as mentioned, AGAIN, if your system is updated, you are safe. The problem is for those who don't update their Windows. If you keep Windows 7 up to date, you are safe from it.

 

The chart does NOT say "98% of windows 7 uses" It says "98% who WERE affected are running Windows 7", see the difference.

Link to comment
Share on other sites

Link to post
Share on other sites

24 minutes ago, tlink said:

whoa i thought wannacry was mostly targeted at win xp.

It exploited a vulnerability that was present in all versions of Windows. It wasn't a targeted attack, but rather a loose worm infecting whatever it could on its way.

22 minutes ago, weed said:

Shit. I run Windows 7 Ultimate on my Desktop and laptop.

How would you get infected, though?

 

1 minute ago, jaggysnake57 said:

what are you on about? for a start off most people dont know the risks of not updating all they see is another update that they cant be arsed to install secondly how is that big brother? there not trying to tell you what to do there trying to help........

They are not trying to tell you, of course not. They are not even trying to tell you what to do: they are just directly doing it.

Regarding the res of your paternalistic rant, that's just your point of view. I have a different one, which dislikes the "it's for your own sake" mentality, and likes the freedom to live and let die when it comes to computers, even if it means opening the "Iamavirus.exe" i got as an attachment from a wealthy Nigerian Prince.

 

1 minute ago, jaggysnake57 said:

as for the rest of your rant, you think they targeted anything? it was an infected email, thats not targeting thats carpet bombing

 

I know. But how did it got released, and who is going to have anything worth paying for?

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, GoodBytes said:

I won't criticize your setup, as this is off topic. You do what you want, I don't care.

 

But as mentioned, AGAIN, if your system is updated, you are safe. The problem is for those who don't update their Windows. If you keep Windows 7 up to date, you are safe from it.

 

The chart does NOT say "98% of windows 7 uses" It says "98% who WERE affected are running Windows 7"

I update the second I get the notification. The security patch was released by microsoft two months before the attack back in March and was included in their monthly rollup.

Link to comment
Share on other sites

Link to post
Share on other sites

11 minutes ago, Iggledude said:

That's very interesting how it's made to look (in this report) as if Windows 7 was the intended target of the attack.

 

And I wanna be clear, I'm not doubting the validity of this report at all.  Kaspersky has no reason to be bias in any way.

 

Any conspiracy theorists out there?  Hmm...

It did not target Windows 7 specifically. The malware literally generated random IPs that it tried to connect to and infect.

 

4 minutes ago, jaggysnake57 said:

it was an infected email, thats not targeting thats carpet bombing

No it wasn't. It spread by making SMB connections.

 

3 minutes ago, AUniqueName said:

I can't understand why someone would want to delay security patches in the first place

Because security patches has broken things in the past, and Microsoft has pushed out "security updates" which for example contained ads for Windows 10 upgrades.

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, SpaceGhostC2C said:

They are not trying to tell you, of course not. They are not even trying to tell you what to do: they are just directly doing it.

Regarding the res of your paternalistic rant, that's just your point of view. I have a different one, which dislikes the "it's for your own sake" mentality, and likes the freedom to live and let die when it comes to computers, even if it means opening the "Iamavirus.exe" i got as an attachment from a wealthy Nigerian Prince.

yeah but your a PC enthusiast most pc users are not and thats the thing

"if nothing is impossible, try slamming a revolving door....." - unknown

my new rig bob https://uk.pcpartpicker.com/b/sGRG3C#cx710255

Kumaresh - "Judging whether something is alive by it's capability to live is one of the most idiotic arguments I've ever seen." - jan 2017

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, LAwLz said:

 

Because security patches has broken things in the past, and Microsoft has pushed out "security updates" which for example contained ads for Windows 10 upgrades.

WannaCry is a ransomware computer worm that targets computers running the Microsoft Windows operating system.

The "payload" works in the same fashion as most modern ransomware: it finds and encrypts a range of data files, then displays a "ransom note" informing the user and demanding a payment in bitcoin. It is considered a network worm because it also includes a "transport" mechanism to automatically spread itself. This transport code scans for vulnerable systems, then uses the EternalBlue exploit to gain access, and the DoublePulsar exploit to install and execute a copy of itself.

 

EternalBlue

The network infection vector, EternalBlue, was released by the hacker group The Shadow Brokers on 14 April 2017, along with other tools apparently leaked from Equation Group, which is widely believed to be part of the United States National Security Agency.

EternalBlue exploits vulnerability MS17-010 in Microsoft's implementation of the Server Message Block (SMB) protocol. This Windows vulnerability was not a zero-day flaw, but one for which Microsoft had released a "critical" advisory, along with a security patch to fix the vulnerability two months before, on 14 March 2017. The patch was to the Server Message Block (SMB) protocol used by Windows, and fixed several client versions of the Microsoft Windows operating system, including Windows Vista onwards (with the exception of Windows 8), as well as server and embedded versions such as Windows Server 2008 onwards and Windows Embedded POSReady 2009 respectively, but not the older Windows XP, according to Microsoft. According to Dona Sarkar, head of the Windows Insider Program at Microsoft, Windows 10 was not affected.

 

DoublePulsar

DoublePulsar is a backdoor tool, also released by The Shadow Brokers on 14 April 2017, Starting from 21 April 2017, security researchers reported that computers with the DoublePulsar backdoor installed were in the tens of thousands. By 25 April, reports estimated the number of infected computers to be up to several hundred thousands, with numbers increasing exponentially every day. The WannaCry code can take advantage of any existing DoublePulsar infection, or installs it itself.

 

"Kill switch"


The software contained a URL that, when discovered and registered by a security researcher to track activity from infected machines, was found to act as a "kill switch" that shuts down the software, stopping the spread of the ransomware. The researcher speculated that this had been included in the software as a mechanism to prevent it being run on quarantined machines so that it is harder for anti-virus researchers to investigate the software; he observed that some sandbox environments will respond to all queries with traffic in order to trick the software into thinking that it is still able to access the internet, so the software queried an "intentionally unregistered domain" to verify it was receiving traffic that it should not. He also noted that it was not an unprecedented technique, having been observed in the Necurs trojan.

 

Attribution


Although cybersecurity companies Kaspersky Lab and Symantec have both said the code has some similarities with that previously used by the Lazarus Group, (believed to have carried out the cyberattack on Sony Pictures in 2014 and a Bangladesh bank heist in 2016 – and linked to North Korea), this may be either simple re-use of code by another group, or an attempt to shift blame – as in a false flag operation.

Link to comment
Share on other sites

Link to post
Share on other sites

14 minutes ago, AUniqueName said:

If you're referring to forced updates on W10, then I personally see no reason whatsoever to be pissed off about it.

I do, for two reasons:

1) choosing what and when to update is better than having no choice

2) the update philosophy makes no distinction: any change MS decides to make to the OS gets pushed through forced update, no matter if it's a life & death security patch or a cosmetic change to the UI. I would always prefer to have the choice, but if I was given the choice, and could trust MS about it, to set these things separately, I would be much more likely to set the security part to auto (of course, provided they don't embarrass themselves with surprise reboots as in the early Win10 days. But it should be better by now).

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, jaggysnake57 said:

yeah but your a PC enthusiast most pc users are not and thats the thing

Well, if you are trying to tell me that Windows is becoming less enthusiast-firendly, then maybe, I don't know.

Still, when we think about all those corporate PCs infected, we are not talking about the decisions made by "most PC users", but professional sysadmins... (including the possible sysadmin decision of running all corporate PCs as if they were home computers with no centralized management tools).

 

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, SpaceGhostC2C said:

I do, for two reasons:

1) choosing what and when to update is better than having no choice

2) the update philosophy makes no distinction: any change MS decides to make to the OS gets pushed through forced update, no matter if it's a life & death security patch or a cosmetic change to the UI. I would always prefer to have the choice, but if I was given the choice, and could trust MS about it, to set these things separately, I would be much more likely to set the security part to auto (of course, provided they don't embarrass themselves with surprise reboots as in the early Win10 days. But it should be better by now).

 

 

Capture.JPG.245a33a714b3ceccb412856ae5052d92.JPG

 

Link to comment
Share on other sites

Link to post
Share on other sites

39 minutes ago, GoodBytes said:

Maybe it was targeting Windows 7. It is the most used version of Windows, especially in businesses. Ransomware makers seeks companies more than individuals, as they can pay the big bucks. It takes advantage of the fact that many businesses have poor backup, and system recovery procedures in place, and take advantage of the fact that many businesses and many people follow the "If it works, I don't update" mentality, which is wrong.

Can confirm this... At my last job I was baffled at the amount of updates some of the servers there were lacking and the same for one of the clients. The OS was so outdated that when new software had to be installed that they had to update the OS and it made everything painful to do.

CPU: Intel i7 7700K | GPU: ROG Strix GTX 1080Ti | PSU: Seasonic X-1250 (faulty) | Memory: Corsair Vengeance RGB 3200Mhz 16GB | OS Drive: Western Digital Black NVMe 250GB | Game Drive(s): Samsung 970 Evo 500GB, Hitachi 7K3000 3TB 3.5" | Motherboard: Gigabyte Z270x Gaming 7 | Case: Fractal Design Define S (No Window and modded front Panel) | Monitor(s): Dell S2716DG G-Sync 144Hz, Acer R240HY 60Hz (Dead) | Keyboard: G.SKILL RIPJAWS KM780R MX | Mouse: Steelseries Sensei 310 (Striked out parts are sold or dead, awaiting zen2 parts)

Link to comment
Share on other sites

Link to post
Share on other sites

12 minutes ago, AUniqueName said:

Capture.JPG.245a33a714b3ceccb412856ae5052d92.JPG

 

Several important words:

-"includes" (we also get "quality rollups" in Win 7 - actually, it's supposed to be the only thing we get)

-"deferred" (non-security related updated can be just that: delayed)

and of course "trust" :P 

 

In any case, I explained why I'm against forced, non optional updates. Obviously, the closer Windows 10 gets to solving my 2 issues, the better, from my point of view.

Link to comment
Share on other sites

Link to post
Share on other sites

26 minutes ago, SpaceGhostC2C said:

I do, for two reasons:

1) choosing what and when to update is better than having no choice

2) the update philosophy makes no distinction: any change MS decides to make to the OS gets pushed through forced update, no matter if it's a life & death security patch or a cosmetic change to the UI. I would always prefer to have the choice, but if I was given the choice, and could trust MS about it, to set these things separately, I would be much more likely to set the security part to auto (of course, provided they don't embarrass themselves with surprise reboots as in the early Win10 days. But it should be better by now).

 

 

This is why you run the pro version of windows 10, you can change all of that through a group policy

CPU: Intel i7 7700K | GPU: ROG Strix GTX 1080Ti | PSU: Seasonic X-1250 (faulty) | Memory: Corsair Vengeance RGB 3200Mhz 16GB | OS Drive: Western Digital Black NVMe 250GB | Game Drive(s): Samsung 970 Evo 500GB, Hitachi 7K3000 3TB 3.5" | Motherboard: Gigabyte Z270x Gaming 7 | Case: Fractal Design Define S (No Window and modded front Panel) | Monitor(s): Dell S2716DG G-Sync 144Hz, Acer R240HY 60Hz (Dead) | Keyboard: G.SKILL RIPJAWS KM780R MX | Mouse: Steelseries Sensei 310 (Striked out parts are sold or dead, awaiting zen2 parts)

Link to comment
Share on other sites

Link to post
Share on other sites

Hey, @GoodBytes, the thread title has a typo in it: "radnsomeware"

F#$k timezone programming. Use UTC! (See XKCD #1883)

PC Specs:

Ryzen 5900x, MSI 3070Ti, 2 x 1 TiB SSDs, 32 GB 3400 DDR4, Cooler Master NR200P

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Qub3d said:

Hey, @GoodBytes, the thread title has a typo in it: "radnsomeware"

That's a typo!? I thought this was about awesome thrift stores. 

:ph34r: Please don't ban me, Goodbytes...

 

 

7 minutes ago, XenosTech said:

This is why you run the pro version of windows 10, you can change all of that through a group policy

I don't see the issue with the update system. There's the Pro that lets you define parameters for any updates and the Home version usually allows a week or two before it updates itself automatically.

Cor Caeruleus Reborn v6

Spoiler

CPU: Intel - Core i7-8700K

CPU Cooler: be quiet! - PURE ROCK 
Thermal Compound: Arctic Silver - 5 High-Density Polysynthetic Silver 3.5g Thermal Paste 
Motherboard: ASRock Z370 Extreme4
Memory: G.Skill TridentZ RGB 2x8GB 3200/14
Storage: Samsung - 850 EVO-Series 500GB 2.5" Solid State Drive 
Storage: Samsung - 960 EVO 500GB M.2-2280 Solid State Drive
Storage: Western Digital - Blue 2TB 3.5" 5400RPM Internal Hard Drive
Storage: Western Digital - BLACK SERIES 3TB 3.5" 7200RPM Internal Hard Drive
Video Card: EVGA - 970 SSC ACX (1080 is in RMA)
Case: Fractal Design - Define R5 w/Window (Black) ATX Mid Tower Case
Power Supply: EVGA - SuperNOVA P2 750W with CableMod blue/black Pro Series
Optical Drive: LG - WH16NS40 Blu-Ray/DVD/CD Writer 
Operating System: Microsoft - Windows 10 Pro OEM 64-bit and Linux Mint Serena
Keyboard: Logitech - G910 Orion Spectrum RGB Wired Gaming Keyboard
Mouse: Logitech - G502 Wired Optical Mouse
Headphones: Logitech - G430 7.1 Channel  Headset
Speakers: Logitech - Z506 155W 5.1ch Speakers

 

Link to comment
Share on other sites

Link to post
Share on other sites

9 minutes ago, ARikozuM said:

That's a typo!? I thought this was about awesome thrift stores. 

:ph34r: Please don't ban me, Goodbytes...

You're the one with the Grammar Nazi avatar... Then again, this is spelling, not grammar.

 

In regards to everyone who is flabbergasted that Prod. environments don't update on schedule with consumer/standard user PCs, see my earlier post. The short and sweet version of it is:

Most updates require restarts, restarts can take time, when a server is restarting it isn't serving files = lost time, and therefore lost money for a business.

 

Edit: Hey! This was my πX102 post!

F#$k timezone programming. Use UTC! (See XKCD #1883)

PC Specs:

Ryzen 5900x, MSI 3070Ti, 2 x 1 TiB SSDs, 32 GB 3400 DDR4, Cooler Master NR200P

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Qub3d said:

Edit: Hey! This was my πX101 post!

To the 2nd power of 10...

 

Going to get a photo of Euler and put a certain mustache on said photo...

Cor Caeruleus Reborn v6

Spoiler

CPU: Intel - Core i7-8700K

CPU Cooler: be quiet! - PURE ROCK 
Thermal Compound: Arctic Silver - 5 High-Density Polysynthetic Silver 3.5g Thermal Paste 
Motherboard: ASRock Z370 Extreme4
Memory: G.Skill TridentZ RGB 2x8GB 3200/14
Storage: Samsung - 850 EVO-Series 500GB 2.5" Solid State Drive 
Storage: Samsung - 960 EVO 500GB M.2-2280 Solid State Drive
Storage: Western Digital - Blue 2TB 3.5" 5400RPM Internal Hard Drive
Storage: Western Digital - BLACK SERIES 3TB 3.5" 7200RPM Internal Hard Drive
Video Card: EVGA - 970 SSC ACX (1080 is in RMA)
Case: Fractal Design - Define R5 w/Window (Black) ATX Mid Tower Case
Power Supply: EVGA - SuperNOVA P2 750W with CableMod blue/black Pro Series
Optical Drive: LG - WH16NS40 Blu-Ray/DVD/CD Writer 
Operating System: Microsoft - Windows 10 Pro OEM 64-bit and Linux Mint Serena
Keyboard: Logitech - G910 Orion Spectrum RGB Wired Gaming Keyboard
Mouse: Logitech - G502 Wired Optical Mouse
Headphones: Logitech - G430 7.1 Channel  Headset
Speakers: Logitech - Z506 155W 5.1ch Speakers

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, ARikozuM said:

To the 2nd power of 10...

 

Going to get a photo of Euler and put a certain mustache on said photo...

Um, yeah. Right. Listen, it's summer for us collegiates, OK?

F#$k timezone programming. Use UTC! (See XKCD #1883)

PC Specs:

Ryzen 5900x, MSI 3070Ti, 2 x 1 TiB SSDs, 32 GB 3400 DDR4, Cooler Master NR200P

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Qub3d said:

In regards to everyone who is flabbergasted that Prod. environments don't update on schedule with consumer/standard user PCs, see my earlier post. The short and sweet version of it is:

Most updates require restarts, restarts can take time, when a server is restarting it isn't serving files = lost time, and therefore lost money for a business.

That is why your server, you run it under VM's, and have redundancy. Update one while the other is providing service, once done, you test, switch, test, and update second one. This also give you load balancing abilities so that things always flow and no "Sorry, the system is loading... please stand by.... " like I am sure some people here has encountered in their life time when dealing with a company (tech support, bank, etc.)

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, GoodBytes said:

The chart says: 98% of those who WHERE affected ran Windows 7, NOT 98% of Windows 7 users are/can be infected. The Ransomware affects all version of Windows. A patch were made before the attack even started and delivered for all version of Windows. If you have Windows 10 not updated at all, day 1 release, you could have been very well infected as much as Windows 7 user with their update also disabled.

The nice thing about the older releases of Windows being hit (Windows XP, 7 and 2003?) is that there appears to be a tool that works around and breaks the encryption if the system has not been restarted.  Of course I wonder how long before somebody writes into the code to have the system restart after running the encryption...

 

https://arstechnica.com/security/2017/05/more-people-infected-by-recent-wcry-worm-can-unlock-pcs-without-paying-ransom/

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, GoodBytes said:

That is why your server, you run it under VM's, and have redundancy. Update one while the other is providing service, once done, you test, switch, test, and update second one. This also give you load balancing abilities so that things always flow and no "Sorry, the system is loading... please stand by.... " like I am sure some people here has encountered in their life time when dealing with a company (tech support, bank, etc.)

I work in a small business in the manufacturing sector. While our systems are in VMs, our hypervisor doesn't have enough headroom for redundancy across the board (seriously our SAN sends me emails every 6 hours telling me we have >90% disk usage!). That's actually on our list for this quarter though!

 

The big businesses have this sort of thing covered. Wannacry gets their bread and butter off of companies our size, because they take advantage of an IT "department" (really just 1 or 2 people) that the rest of the company doesn't even think needs to exist.

F#$k timezone programming. Use UTC! (See XKCD #1883)

PC Specs:

Ryzen 5900x, MSI 3070Ti, 2 x 1 TiB SSDs, 32 GB 3400 DDR4, Cooler Master NR200P

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×