Thursday, May 18th 2017

WannaCry: Its Origins, and Why Future Attacks may be Worse

WannaCry, the Cryptographic Ransomware that encrypted entire PCs and then demanded payment via Bitcoin to unlock them, is actually not a new piece of technology. Ransomware of this type has existed nearly as long as the cryptocurrency Bitcoin has. What made headlines was the pace with which it spread and the level of damage it caused to several facilities dependent on old, seldom-updated software (Hospitals, for example). It's not a stretch to say this may be the first cyberattack directly attributable to a civilian death, though that has not been concluded yet as we are still waiting for the dust to settle. What is clear however is WHY it spread so quickly, and it's quite simple really: Many users don't have their PCs up to date.
Indeed, the bug that WannaCry utilized to spread this rather old-school ransomware tech had been patched in Windows for about 2 months at the date of the outbreak. But many users were still not patched up. To be clear, this is not just hospital equipment and such that may be difficult to directly patch, but also end user PCs that simply aren't patched due to user ignorance or outright laziness. That as a cultural issue can be fixed relatively easily (and to some degree already is with the push of Windows 10 which handles this automatically for the user). But there is a more sinister twist to this story, one that indicates future outbreaks may be worse. The bug that enabled this to happen was leaked directly from the NSA, and had been known for much much longer than the patch for it has existed. In other words, this bug had been stockpiled by the US government for use in cyberwarfare, and its leak caused this attack.

Let me play you a theoretical scenario, one not so farfetched I would think. What if Microsoft had NOT had a patch ready at the time of this outbreak? What if the bug (which exists in the file sharing stack and has most Windows PC vulnerable by default) was exposed and we had to wait a couple days for a patch. What can you do to protect yourself then?

This seemingly nightmarish scenario is a good illustration of why stockpiling vulnerabilities in common software rather than reporting them is a bad practice rather than a good one. Of course, in the above situation, you could just turn your PC off until it all blows over, or turn off SMB1 file sharing in Windows (google will help you here). Or best yet, you could use a decent firewall setup that does NOT expose SMB ports to the internet (you can even block the ports in Windows Firewall, google again has the answers). But not all of us are power users. Most out there aren't, actually. A lot of users actually plug their computers directly into their modems. I know, because I've worked IT. I've seen it. And what about when someone finds a worse vulnerability, like in the TCP/IP stack? What then? Do you unplug your computer from the internet entirely? Ok, but who got infected first to tell you to do that? Someone had to take one for the team. Either way, damage has been done people.

This is why the practice of stockpiling exploits has to stop. The US government (and others, for that matter) should report exploits, not store them as cyber weapons. As weapons of war, they are as likely to hurt us in the end as our enemies, and that makes them very bad weapons in the perspective of one of the first rules of warfare; Don't hurt your own team.

Call me crazy, but that just seems like a weapon I'd rather not use. If a weapon hurts as many of your own team as your enemy or even close to that number, its time to retire that weapon. Of course, we aren't talking a literal injury or body count here, but the concept is the same. This is just a bad practice, and it needs to stop.
Add your own comment

57 Comments on WannaCry: Its Origins, and Why Future Attacks may be Worse

#26
RejZoR
TotallyAlso the only people who were affected were the ones who weren't up to date on patches. Pointing out choice of AV at this point is like discussing what dental dam to use after going at it raw. Pointing out which AV being used is like telling car owner who's left all their doors unlocked with the keys in the ignition and as a result had their car stolen, people who were using x security system didn't get their car stolen.
Your logic is flawed on so many levels... You could have totally unpatched system, but if it you had AV on it, you'd be fine. The car and dental care analogy you used just doesn't work with this one...
Posted on Reply
#28
Totally
RejZoRYour logic is flawed on so many levels... You could have totally unpatched system, but if it you had AV on it, you'd be fine. The car and dental care analogy you used just doesn't work with this one...

If they were up to date on patches it wouldn't matter what av you used, same thing if you don't lock your doors it doesn't matter what security you have. How is that logic flawed? Where did you get dental from?
Posted on Reply
#29
Frick
Fishfaced Nincompoop
R-T-Btechnet.microsoft.com/en-us/library/security/ms17-010.aspx

That's the issue report. You'll note patches were issued for Windows 10.
I know, and I think it is a different thing. They really should clarify what they mean, cause they would not say Win10 would not be affected by a certain aspect of the worm if it weren't true.

About IoT: different topic, but here goes: correctly implemented it could be amazing, and in fact it already is pretty great in the right context, such as industry and engines.
Posted on Reply
#30
R-T-B
FrickI know, and I think it is a different thing. They really should clarify what they mean, cause they would not say Win10 would not be affected by a certain aspect of the worm if it weren't true.
As one who followed the history of this bug extensively, it's not a different issue. This is the same bug. They are probably just assuming Windows 10 would've autopatched (under normal circumstances it would have).

Or perhaps Windows 10 ships with a more sensible out of the box firewall config. That could explain it too, I guess.
Posted on Reply
#31
dcf-joe
So, I have my PC directly hooked up to my cable modem. I was not aware there is any other way to get hardwire internet to the only PC in my house?
Posted on Reply
#32
rtwjunkie
PC Gaming Enthusiast
dcf-joeSo, I have my PC directly hooked up to my cable modem. I was not aware there is any other way to get hardwire internet to the only PC in my house?
That's baaad, really bad. :) You need a router, regardless, for security. the built in firewall is necessary, as well as IP-hiding.
Posted on Reply
#33
Caring1
dcf-joeSo, I have my PC directly hooked up to my cable modem. I was not aware there is any other way to get hardwire internet to the only PC in my house?
Is it a combined modem/ router?
Posted on Reply
#34
Frick
Fishfaced Nincompoop
R-T-BAs one who followed the history of this bug extensively, it's not a different issue. This is the same bug. They are probably just assuming Windows 10 would've autopatched (under normal circumstances it would have).

Or perhaps Windows 10 ships with a more sensible out of the box firewall config. That could explain it too, I guess.
Or a slightly tweaked SMB server. I don't think they assume it is patched in that context.
Posted on Reply
#35
dcf-joe
Caring1Is it a combined modem/ router?
No, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
Posted on Reply
#36
DeathtoGnomes
TotallyThat's crazy talk. If they were really working with spy agencies, it be far more easier for them simply to place a backdoor somewhere or write tailor-made software that defeats the OS security.
Yep I love crazy talk. :kookoo: A back door would be too easy for just about anyone to find, and who says they havent written "tailor-made" software, or are all the hundreds of 0Days totally on accident? Even if they are accidental, that means there is almost zero quality control @m$
Posted on Reply
#37
RichardHeartYouTube
Evil Ransomware improvements we may see:
1. Infect a friend. Get a discount on your ransom if you infect a friend and they pay.
2. Phone numbers directly to bitcoin vendors. (people running insecure systems love phones.)
3. Phone number to tech support company that bills your credit card to walk you through paying the ransom.
4. Delayed symptoms. Secretly encrypt backups (windows efs might be able to do it nonobviously) Then once all your backups are secretly encrypted, it encrypts the key, and now you can't use backups to save yourself.
5. Deterministic wallet stores all profit in a simple 12 word seed "password"
6. Advertise affiliated antivirus (I hear this is what cloudflare does by hosting bad actors, they inflate their demand from protection from bad actors, just a rumor though.)
7. New address per machine (easier to detect payments made, hides profit total.)
8. Lock computer out in addition to encrypting. (Makes it harder for them to buy bitcoin though.)
$2000 bitcoin sure is crazy. Stay safe, Richard Heart on Youtube.
Posted on Reply
#38
Octavean
I totally agree with the sentiment but governments play by a different set of rules. Fair play simply isn't a consideration and if , the US government for example, didn't exploit vulnerabilities as weapons some other government would without compunction. Same thing with stem-cell research and just about anything else you can shake a stick at,....

This is quasi cold war methodologies though. I would rather have this then real weapons being used and I think most people would agree.

Having said that, it doesn't mean that there can't be a middle ground. For example, the US government, can and should advise the software / firmware companies of the vulnerability but have a standing agreement that such quasi weaponized vulnerabilities would be patched in a stealthy way only within the US and possibly within regions of its friends and allies. This would only be for a predefined period of time though because nothing lasts forever and therefore the genie will eventually get out of the bottle. American companies shouldn't have too much of an issue with this although clearly some would.

Part of the problem though is that the US likely wanted to use these vulnerabilities not just outside of the US but rather on their own population. That kind of mindset makes such problems an inevitability.

Other nations have rejected Windows on some level due to these issues and you really can't blame them for it.
Posted on Reply
#39
DeathtoGnomes
OctaveanI totally agree with the sentiment but governments play by a different set of rules. Fair play simply isn't a consideration and if , the US government for example, didn't exploit vulnerabilities as weapons some other government would without compunction. Same thing with stem-cell research and just about anything else you can shake a stick at,....

This is quasi cold war methodologies though. I would rather have this then real weapons being used and I think most people would agree.

Having said that, it doesn't mean that there can't be a middle ground. For example, the US government, can and should advise the software / firmware companies of the vulnerability but have a standing agreement that such quasi weaponized vulnerabilities would be patched in a stealthy way only within the US and possibly within regions of its friends and allies. This would only be for a predefined period of time though because nothing lasts forever and therefore the genie will eventually get out of the bottle. American companies shouldn't have too much of an issue with this although clearly some would.

Part of the problem though is that the US likely wanted to use these vulnerabilities not just outside of the US but rather on their own population. That kind of mindset makes such problems an inevitability.

Other nations have rejected Windows on some level due to these issues and you really can't blame them for it.
The USG's attitude is "its us, or its them, and we need to keep our jobs.".
Posted on Reply
#40
Static~Charge
dcf-joeNo, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
In other words, your PC is directly attached to the Internet, and dangerously exposed. You need a good firewall (software or hardware) a.s.a.p.
Posted on Reply
#41
R-T-B
DeathtoGnomesYep I love crazy talk. :kookoo: A back door would be too easy for just about anyone to find, and who says they havent written "tailor-made" software, or are all the hundreds of 0Days totally on accident? Even if they are accidental, that means there is almost zero quality control @m$
If you understood how C compilers worked, you'd know why this happens and realize what you are saying is indeed crazy talk.

Buffer overflow attacks are almost par for the course with any lower level language such as C. Cost of entry.
RichardHeartYouTubeEvil Ransomware improvements we may see:
1. Infect a friend. Get a discount on your ransom if you infect a friend and they pay.
2. Phone numbers directly to bitcoin vendors. (people running insecure systems love phones.)
3. Phone number to tech support company that bills your credit card to walk you through paying the ransom.
4. Delayed symptoms. Secretly encrypt backups (windows efs might be able to do it nonobviously) Then once all your backups are secretly encrypted, it encrypts the key, and now you can't use backups to save yourself.
5. Deterministic wallet stores all profit in a simple 12 word seed "password"
6. Advertise affiliated antivirus (I hear this is what cloudflare does by hosting bad actors, they inflate their demand from protection from bad actors, just a rumor though.)
7. New address per machine (easier to detect payments made, hides profit total.)
8. Lock computer out in addition to encrypting. (Makes it harder for them to buy bitcoin though.)
$2000 bitcoin sure is crazy. Stay safe, Richard Heart on Youtube.
Much of what you describe has already happened, just not with this variant.
Posted on Reply
#42
wiyosaya
As a power user, I have had all incoming and outgoing SMB ports blocked on my firewall for at least 10-years now. Who knows what else might come along that might exploit some other vulnerability that may or may not be blocked by my firewall. Fortunately, I have never gotten a virus in my 20+ years of internet use.

However, since the Windows 10 update that was released in July of 16', I have disabled updates on my HTPC. Perhaps there will be those in this thread who will jump all over me for that, however, every time I have tried to update my HTPC since July of last year, something has broken that I use and consider essential that it functions every time I use that PC. Before anyone jumps on me for disabling updates, search for things like "Windows 10 black screen" (a particularly nasty one which a co-worker and I experienced) or "Windows 10 update breaks WiFi". Solutions for many of the issues do not exist, and going to Microsoft's support site is almost worthless when the supposed experts almost always respond with inane responses that often amount to "Is your computer on?"

Everyone may not realize this, however, Windows 10 updates are riddled with bugs some of which are serious enough to make a PC completely unusable, and it appears to be random as to whether or not your particular configuration of hardware and software will be impacted when a 10 update is applied. I simply do not want to spend the time to test an update, and ensure that it works when I apply it. That is supposed to be the job of Microsoft. Fortunately, I disk image before I attempt an update, so reverting is not that much of a time consumer; however, the update itself usually is a big time consumer.

So there is a tough choice here. Apply a 10 update, and potentially end up with a computer that is completely unusable, or apply the update and be safe from potential vulnerabilities if you are lucky enough not to encounter a bug in the update that breaks the PC.

To me, if an Update renders a PC unusable, then the update is much worse than a virus. I started with Win 3.1, and as I see it, 10 updates have been as bad as NT updates which could almost always be counted on to blue screen any PC on which they were installed. As I see it, Microsoft needs to stop pushing out Windows 10 updates that break either the entire computer or any subsystem that may be in use.

If Microsoft had wanted to, they could have their own people testing all the OS releases for vulnerabilities, and, as I see it (since they did not) they now want to pass the buck to the NSA for the release of this vulnerability. I realize that testing is expensive, but one thing that I don't think anyone in their right mind will argue is that with Big Bill's Billions, vulnerability testing would have been a drop in the bucket to his bank account.

As I see it, Microsoft should be doing a better job with update testing and vulnerability testing, and they have no excuse for the lackadaisical job they are currently doing with each.
Posted on Reply
#43
wiyosaya
dcf-joeNo, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
Hmm, if those two outputs (or more if they exist) are Ethernet ports, to me at least, suggests that it may be a modem with a router. I suggest double-checking. Typically, the modem only devices, such as the one that I have, have only one Ethernet port.
Posted on Reply
#44
Evildead666
dcf-joeNo, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
If you open the start menu and type "CMD", then run an "IPCONFIG /ALL" (without the quotes each time), do you get an IP like 192.168.x.x , or something else ?
Do NOT post your full IP here, but you can post the first two numbers pretty safely (the first two numbers might give out your location (country) or service provider, if you're worried, don't post any of it.)

My original ADSL modem (years ago) used to be plugged in the USB port of the PC, never used it, bought a Netgear Modem/router instead ;) and configured it to work.
Posted on Reply
#45
Caring1
dcf-joeNo, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
Usually ISP's cheap out with the units they supply, but generally they are combined modem/ router, that's why I asked.
Posted on Reply
#46
TheMailMan78
Big Member
Um, you guys understand there is a back door built into almost everyone of your CPUs on a hardware level don't ya?

Also the logic of this editorial is flawed. As long as defence systems are not effected, security agencies will ALWAYS stockpile. Think about our nuclear arsenal. Difference is they didn't protect it like the should have. They need to stop scouring this stuff out to contractors and keep it at a military level like we do our nukes. If they did, this wouldn't have happened.
Posted on Reply
#47
DeathtoGnomes
TheMailMan78Um, you guys understand there is a back door built into almost everyone of your CPUs on a hardware level don't ya?

Also the logic of this editorial is flawed. As long as defence systems are not effected, security agencies will ALWAYS stockpile. Think about our nuclear arsenal. Difference is they didn't protect it like the should have. They need to stop scouring this stuff out to contractors and keep it at a military level like we do our nukes. If they did, this wouldn't have happened.
You got proof about those back doors? Or are ya just wearing a condom for no reason?
Posted on Reply
#50
TheMailMan78
Big Member
DeathtoGnomesOk that explains ... Intel.
AMD does it to bubba.
Posted on Reply
Add your own comment
Nov 27th, 2024 19:31 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts