• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Editorial WannaCry: Its Origins, and Why Future Attacks may be Worse

Also the only people who were affected were the ones who weren't up to date on patches. Pointing out choice of AV at this point is like discussing what dental dam to use after going at it raw. Pointing out which AV being used is like telling car owner who's left all their doors unlocked with the keys in the ignition and as a result had their car stolen, people who were using x security system didn't get their car stolen.

Your logic is flawed on so many levels... You could have totally unpatched system, but if it you had AV on it, you'd be fine. The car and dental care analogy you used just doesn't work with this one...
 
Your logic is flawed on so many levels... You could have totally unpatched system, but if it you had AV on it, you'd be fine. The car and dental care analogy you used just doesn't work with this one...

If they were up to date on patches it wouldn't matter what av you used, same thing if you don't lock your doors it doesn't matter what security you have. How is that logic flawed? Where did you get dental from?
 
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

That's the issue report. You'll note patches were issued for Windows 10.

I know, and I think it is a different thing. They really should clarify what they mean, cause they would not say Win10 would not be affected by a certain aspect of the worm if it weren't true.

About IoT: different topic, but here goes: correctly implemented it could be amazing, and in fact it already is pretty great in the right context, such as industry and engines.
 
I know, and I think it is a different thing. They really should clarify what they mean, cause they would not say Win10 would not be affected by a certain aspect of the worm if it weren't true.

As one who followed the history of this bug extensively, it's not a different issue. This is the same bug. They are probably just assuming Windows 10 would've autopatched (under normal circumstances it would have).

Or perhaps Windows 10 ships with a more sensible out of the box firewall config. That could explain it too, I guess.
 
So, I have my PC directly hooked up to my cable modem. I was not aware there is any other way to get hardwire internet to the only PC in my house?
 
So, I have my PC directly hooked up to my cable modem. I was not aware there is any other way to get hardwire internet to the only PC in my house?

That's baaad, really bad. :) You need a router, regardless, for security. the built in firewall is necessary, as well as IP-hiding.
 
So, I have my PC directly hooked up to my cable modem. I was not aware there is any other way to get hardwire internet to the only PC in my house?
Is it a combined modem/ router?
 
As one who followed the history of this bug extensively, it's not a different issue. This is the same bug. They are probably just assuming Windows 10 would've autopatched (under normal circumstances it would have).

Or perhaps Windows 10 ships with a more sensible out of the box firewall config. That could explain it too, I guess.

Or a slightly tweaked SMB server. I don't think they assume it is patched in that context.
 
Is it a combined modem/ router?

No, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
 
That's crazy talk. If they were really working with spy agencies, it be far more easier for them simply to place a backdoor somewhere or write tailor-made software that defeats the OS security.
Yep I love crazy talk. :kookoo: A back door would be too easy for just about anyone to find, and who says they havent written "tailor-made" software, or are all the hundreds of 0Days totally on accident? Even if they are accidental, that means there is almost zero quality control @m$
 
Evil Ransomware improvements we may see:
1. Infect a friend. Get a discount on your ransom if you infect a friend and they pay.
2. Phone numbers directly to bitcoin vendors. (people running insecure systems love phones.)
3. Phone number to tech support company that bills your credit card to walk you through paying the ransom.
4. Delayed symptoms. Secretly encrypt backups (windows efs might be able to do it nonobviously) Then once all your backups are secretly encrypted, it encrypts the key, and now you can't use backups to save yourself.
5. Deterministic wallet stores all profit in a simple 12 word seed "password"
6. Advertise affiliated antivirus (I hear this is what cloudflare does by hosting bad actors, they inflate their demand from protection from bad actors, just a rumor though.)
7. New address per machine (easier to detect payments made, hides profit total.)
8. Lock computer out in addition to encrypting. (Makes it harder for them to buy bitcoin though.)
$2000 bitcoin sure is crazy. Stay safe, Richard Heart on Youtube.
 
I totally agree with the sentiment but governments play by a different set of rules. Fair play simply isn't a consideration and if , the US government for example, didn't exploit vulnerabilities as weapons some other government would without compunction. Same thing with stem-cell research and just about anything else you can shake a stick at,....

This is quasi cold war methodologies though. I would rather have this then real weapons being used and I think most people would agree.

Having said that, it doesn't mean that there can't be a middle ground. For example, the US government, can and should advise the software / firmware companies of the vulnerability but have a standing agreement that such quasi weaponized vulnerabilities would be patched in a stealthy way only within the US and possibly within regions of its friends and allies. This would only be for a predefined period of time though because nothing lasts forever and therefore the genie will eventually get out of the bottle. American companies shouldn't have too much of an issue with this although clearly some would.

Part of the problem though is that the US likely wanted to use these vulnerabilities not just outside of the US but rather on their own population. That kind of mindset makes such problems an inevitability.

Other nations have rejected Windows on some level due to these issues and you really can't blame them for it.
 
I totally agree with the sentiment but governments play by a different set of rules. Fair play simply isn't a consideration and if , the US government for example, didn't exploit vulnerabilities as weapons some other government would without compunction. Same thing with stem-cell research and just about anything else you can shake a stick at,....

This is quasi cold war methodologies though. I would rather have this then real weapons being used and I think most people would agree.

Having said that, it doesn't mean that there can't be a middle ground. For example, the US government, can and should advise the software / firmware companies of the vulnerability but have a standing agreement that such quasi weaponized vulnerabilities would be patched in a stealthy way only within the US and possibly within regions of its friends and allies. This would only be for a predefined period of time though because nothing lasts forever and therefore the genie will eventually get out of the bottle. American companies shouldn't have too much of an issue with this although clearly some would.

Part of the problem though is that the US likely wanted to use these vulnerabilities not just outside of the US but rather on their own population. That kind of mindset makes such problems an inevitability.

Other nations have rejected Windows on some level due to these issues and you really can't blame them for it.
The USG's attitude is "its us, or its them, and we need to keep our jobs.".
 
No, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.

In other words, your PC is directly attached to the Internet, and dangerously exposed. You need a good firewall (software or hardware) a.s.a.p.
 
Yep I love crazy talk. :kookoo: A back door would be too easy for just about anyone to find, and who says they havent written "tailor-made" software, or are all the hundreds of 0Days totally on accident? Even if they are accidental, that means there is almost zero quality control @m$

If you understood how C compilers worked, you'd know why this happens and realize what you are saying is indeed crazy talk.

Buffer overflow attacks are almost par for the course with any lower level language such as C. Cost of entry.

Evil Ransomware improvements we may see:
1. Infect a friend. Get a discount on your ransom if you infect a friend and they pay.
2. Phone numbers directly to bitcoin vendors. (people running insecure systems love phones.)
3. Phone number to tech support company that bills your credit card to walk you through paying the ransom.
4. Delayed symptoms. Secretly encrypt backups (windows efs might be able to do it nonobviously) Then once all your backups are secretly encrypted, it encrypts the key, and now you can't use backups to save yourself.
5. Deterministic wallet stores all profit in a simple 12 word seed "password"
6. Advertise affiliated antivirus (I hear this is what cloudflare does by hosting bad actors, they inflate their demand from protection from bad actors, just a rumor though.)
7. New address per machine (easier to detect payments made, hides profit total.)
8. Lock computer out in addition to encrypting. (Makes it harder for them to buy bitcoin though.)
$2000 bitcoin sure is crazy. Stay safe, Richard Heart on Youtube.

Much of what you describe has already happened, just not with this variant.
 
As a power user, I have had all incoming and outgoing SMB ports blocked on my firewall for at least 10-years now. Who knows what else might come along that might exploit some other vulnerability that may or may not be blocked by my firewall. Fortunately, I have never gotten a virus in my 20+ years of internet use.

However, since the Windows 10 update that was released in July of 16', I have disabled updates on my HTPC. Perhaps there will be those in this thread who will jump all over me for that, however, every time I have tried to update my HTPC since July of last year, something has broken that I use and consider essential that it functions every time I use that PC. Before anyone jumps on me for disabling updates, search for things like "Windows 10 black screen" (a particularly nasty one which a co-worker and I experienced) or "Windows 10 update breaks WiFi". Solutions for many of the issues do not exist, and going to Microsoft's support site is almost worthless when the supposed experts almost always respond with inane responses that often amount to "Is your computer on?"

Everyone may not realize this, however, Windows 10 updates are riddled with bugs some of which are serious enough to make a PC completely unusable, and it appears to be random as to whether or not your particular configuration of hardware and software will be impacted when a 10 update is applied. I simply do not want to spend the time to test an update, and ensure that it works when I apply it. That is supposed to be the job of Microsoft. Fortunately, I disk image before I attempt an update, so reverting is not that much of a time consumer; however, the update itself usually is a big time consumer.

So there is a tough choice here. Apply a 10 update, and potentially end up with a computer that is completely unusable, or apply the update and be safe from potential vulnerabilities if you are lucky enough not to encounter a bug in the update that breaks the PC.

To me, if an Update renders a PC unusable, then the update is much worse than a virus. I started with Win 3.1, and as I see it, 10 updates have been as bad as NT updates which could almost always be counted on to blue screen any PC on which they were installed. As I see it, Microsoft needs to stop pushing out Windows 10 updates that break either the entire computer or any subsystem that may be in use.

If Microsoft had wanted to, they could have their own people testing all the OS releases for vulnerabilities, and, as I see it (since they did not) they now want to pass the buck to the NSA for the release of this vulnerability. I realize that testing is expensive, but one thing that I don't think anyone in their right mind will argue is that with Big Bill's Billions, vulnerability testing would have been a drop in the bucket to his bank account.

As I see it, Microsoft should be doing a better job with update testing and vulnerability testing, and they have no excuse for the lackadaisical job they are currently doing with each.
 
No, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
Hmm, if those two outputs (or more if they exist) are Ethernet ports, to me at least, suggests that it may be a modem with a router. I suggest double-checking. Typically, the modem only devices, such as the one that I have, have only one Ethernet port.
 
No, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
If you open the start menu and type "CMD", then run an "IPCONFIG /ALL" (without the quotes each time), do you get an IP like 192.168.x.x , or something else ?
Do NOT post your full IP here, but you can post the first two numbers pretty safely (the first two numbers might give out your location (country) or service provider, if you're worried, don't post any of it.)

My original ADSL modem (years ago) used to be plugged in the USB port of the PC, never used it, bought a Netgear Modem/router instead ;) and configured it to work.
 
No, it is just a cable modem provided by my cable company. I have one of the outputs going to my PC and the other output going to my Roku. I don't need wireless for anything else as I have unlimited data for my phone.
Usually ISP's cheap out with the units they supply, but generally they are combined modem/ router, that's why I asked.
 
Um, you guys understand there is a back door built into almost everyone of your CPUs on a hardware level don't ya?

Also the logic of this editorial is flawed. As long as defence systems are not effected, security agencies will ALWAYS stockpile. Think about our nuclear arsenal. Difference is they didn't protect it like the should have. They need to stop scouring this stuff out to contractors and keep it at a military level like we do our nukes. If they did, this wouldn't have happened.
 
Um, you guys understand there is a back door built into almost everyone of your CPUs on a hardware level don't ya?

Also the logic of this editorial is flawed. As long as defence systems are not effected, security agencies will ALWAYS stockpile. Think about our nuclear arsenal. Difference is they didn't protect it like the should have. They need to stop scouring this stuff out to contractors and keep it at a military level like we do our nukes. If they did, this wouldn't have happened.
You got proof about those back doors? Or are ya just wearing a condom for no reason?
 
Back
Top