Microsoft officially confirms @NSAGov developed the flaw that brought down hospitals this weekend.
https://blogs.microsoft.com/on-the-i...-cyberattack/#
Microsoft officially confirms @NSAGov developed the flaw that brought down hospitals this weekend.
https://blogs.microsoft.com/on-the-i...-cyberattack/#
Troy Hunt: Everything you need to know about the WannaCry / Wcry / WannaCrypt ransomware
https://www.troyhunt.com/everything-...t-ransomware/#
Ransomware hits small number of U.S. critical infrastructure operators: official
http://reut.rs/2pNAgIR
Last edited by OUTLAW 09; 05-15-2017 at 04:34 PM.
Patriarch of Russian Orthodox church making sure that the Ministry of Internal Affairs computers won't get affected by WannaCry virus attack
The National Cyber Security Centre, the NCSC (UK and part of GCHQ), has publishedtechnical guidance, which includes specific software patches to use that will prevent uninfected computers on your network from becoming infected with the “WannaCry” Ransomware:https://www.ncsc.gov.uk/guidance/ran...-ncsc-guidance
For additional in-depth technical guidance on how to protect your organisation from ransomware, details can be found here:https://www.ncsc.gov.uk/guidance/pro...ion-ransomware
The Soufan Group's commentary:http://www.soufangroup.com/tsg-intel...omware-attack/
Last edited by davidbfpo; 05-15-2017 at 10:45 PM.
davidbfpo
Massive cryptocurrency botnet used leaked NSA exploits weeks before WCry
https://arstechnica.com/?post_type=post&p=1098281#
The three bitcoin wallets tied to #WannaCry ransomware have received 216 payments totaling 34.6200695 BTC ($58,821.36 USD).
Last edited by OUTLAW 09; 05-16-2017 at 07:33 AM.
@DAlperovitch on lessons learned from the #WannaCry cyberattacks:
http://www.atlanticcouncil.org/blogs...ave-your-data#
Russia suffered the highest number of registered WannaCry attacks globally and now suddenly they did not.....
Deputy secretary for Russia's National Security Council says WannaCry ransomware caused minimal damage in Russia.
That is not the story carried by their state media in the first days of the attack....
Over 100K computers got hit....as Russian runs largely illegal MS XP copies ......and illegal copies of MS Server 2003....
Average Russian OS's are XP and MS Server 03?
That's crazy.
I think I also read that Russian banks only invest a fraction of that spent by major US/Western banks on IT/Cyber security.
Is the Russian banking sector seriously vulnerable to a non attributable proxy attack campaign?
Last edited by OUTLAW 09; 05-23-2017 at 03:41 PM.
Bookmarks