<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/ransomware/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Thu, 09 Nov 2017 16:32:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>WannaCry ransomware: researcher halts its spread by registering domain for $10.69</title>
		<link>https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/</link>
					<comments>https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 17 May 2017 12:01:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=883</guid>

					<description><![CDATA[<p>Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.</p>
<p>The post <a href="https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/">WannaCry ransomware: researcher halts its spread by registering domain for $10.69</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="g1-mega g1-mega-1st entry-title">WannaCry ransomware: researcher halts its spread by registering domain for $10.69</h2>
<p style="text-align: justify;">Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous <strong>Mirai malware</strong>. But last Friday afternoon, almost <strong>99 countries including Russia, UK, USA and Australia</strong> became victims of a worldwide <strong>mass cyber-attack WannaCry ransomware</strong> that has been reported to have caused <strong>major disruptions</strong> to systems that were being used by <strong>hospitals, companies, and other institutions</strong>.</p>
<p style="text-align: justify;"><strong><span style="color: #ff0000;">| ALSO READ: </span></strong><a href="https://itblogsec.com/wannacry-ransomware-hitting-world-right-now-uses-nsa-windows-exploit/" target="_blank" rel="noopener noreferrer">WannaCry ransomware –  hitting world right now uses NSA windows exploit</a></p>
<h3 style="text-align: justify;">The Shadow Brokers and the NSA</h3>
<p style="text-align: justify;">An unknown hacking group launched <strong>ransomware attack</strong> to a number of computers worldwide that is seemingly powered by a hacking tool developed by the <strong>National Security Agency</strong> for spying purposes. The tool got leaked online by the <strong>“Shadow Brokers”</strong> group as part of their agenda to accumulate hacking tools developed by the agency. The tool is apparently given the name <strong>“Eternal Blue”</strong> and it exploits a <strong>vulnerability in Microsoft Windows</strong>.</p>
<p style="text-align: justify;"><strong>What does the vulnerability to do?</strong><br />
 According to experts, the vulnerability in <strong>Microsoft’s flagship operating system</strong> can be exploited by Eternal Blue which blocks access to a computer completely. What is more, is that the hacking group <strong>demanded a sum of $600 from the victims</strong> if they wanted to re-access their systems and <strong>de-encrypt the files</strong> accordingly.</p>
<p>https://twitter.com/fendifille/status/862997621039878145?ref_src=twsrc%5Etfw&#038;ref_url=https%3A%2F%2Fwww.hackread.com%2Fwannacry-ransomware-researcher-halts-spread-by-registering-domain%2F</p>
<p><strong>Who has been affected?</strong></p>
<p style="text-align: justify;">Up till now, <strong>almost 75,000 computers</strong> have been reported to have become the victim of the cyber-attack. Moreover, over <strong>40 NHS organizations</strong> had been affected initially <span class="aBn" tabindex="0" data-term="goog_528246131"><span class="aQJ">on Friday</span></span> in the UK, disrupting the entire health system of the country. Experts say that the ransomware was <strong>spreading at an exponential rate of five million emails per hour</strong> resulting in the virus affecting a number of other countries as well, including <strong>Australia</strong>, <strong>Germany</strong>, <strong>Mexico</strong>, <strong>Italy</strong>, <strong>Belgium</strong>, <strong>France</strong> and <strong>Russia</strong>.</p>
<p style="text-align: justify;"><img decoding="async" src="https://pbs.twimg.com/media/C_pLFK4XUAAbtPq.jpg" /></p>
<div class="MediaCard-media">Also, <strong>FedEx</strong>, one of the world’s leading courier organizations, had its entire system brought down. The <strong>German rail system also</strong> had its ticketing system hijacked by the ransomware.</div>
<div class="SandboxRoot env-bp-350" data-twitter-event-id="1">
<div id="twitter-widget-1" class="EmbeddedTweet EmbeddedTweet--mediaForward media-forward js-clickToOpenTarget js-tweetIdInfo tweet-InformationCircle-widgetParent" lang="en" data-click-to-open-target="https://twitter.com/kaspersky/status/863084833194594304" data-iframe-title="Twitter Tweet" data-dt-full="%{hours12}:%{minutes} %{amPm} - %{day} %{month} %{year}" data-dt-months="Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec" data-dt-am="AM" data-dt-pm="PM" data-dt-now="now" data-dt-s="s" data-dt-m="m" data-dt-h="h" data-dt-second="second" data-dt-seconds="seconds" data-dt-minute="minute" data-dt-minutes="minutes" data-dt-hour="hour" data-dt-hours="hours" data-dt-abbr="%{number}%{symbol}" data-dt-short="%{day} %{month}" data-dt-long="%{day} %{month} %{year}" data-scribe="page:tweet" data-tweet-id="863084833194594304" data-twitter-event-id="6">
<article class="MediaCard
           MediaCard--mediaForward
           
           customisable-border" dir="ltr" data-scribe="component:card"></p>
<div class="MediaCard-media">
<div class="MediaCard-widthConstraint js-cspForcedStyle" data-style="max-width: 1024px"> <img decoding="async" src="https://pbs.twimg.com/media/C_p2MXnWAAEwW25.jpg" /></div>
</div>
</article>
</div>
</div>
<div class="MediaCard-widthConstraint js-cspForcedStyle" data-style="max-width: 1024px">However, none of these were as big as the disruption which took place in <strong>Spain’s major telecommunication company</strong>, <strong>Telefonica</strong>. This was accompanied by attacks made on the <strong>power firm</strong>, <strong>Iberdrola</strong>, and the utility firm <strong>Gas Natural</strong>.</div>
<div class="MediaCard-widthConstraint js-cspForcedStyle" style="text-align: justify;" data-style="max-width: 1024px"> </div>
<div class="MediaCard-widthConstraint js-cspForcedStyle" style="text-align: justify;" data-style="max-width: 1024px">
<h3>How was the attack carried out and stopped?</h3>
<p style="text-align: justify;">A <strong>security researcher</strong> going by the online handle of <strong>@MalwareTechBlog</strong> told AFP that the ransomware was <strong>spreading due to being connected to an unregistered domain</strong>. The researcher, therefore, said that the spread can be <strong>stopped by registering the domain and updating the systems immediately</strong>.</p>
<p style="text-align: justify;">According to <a href="https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack?CMP=share_btn_tw" target="_blank" rel="noopener noreferrer">The Guardian</a>, <strong>@MalwareTechBlog with the assistance of Darien Huss</strong> from security firm Proofpoint found and <strong>activated a “kill switch”</strong> in the malicious software. The switch was hardcoded into the malware in case the creator wanted to stop it spreading. This involved a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and <strong>if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading</strong>.</p>
<p style="text-align: justify;">“I saw it wasn’t registered and thought, ‘I think I’ll have that.” <strong>The purchase cost him $10.69</strong>. Immediately, <strong>the domain name was registering thousands of connections every second</strong>. They get the <strong>accidental hero award of the day</strong>,” said Proofpoint’s Ryan Kalember. “They didn’t realize how much it probably slowed down the spread of this ransomware.”</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">I will confess that I was unaware registering the domain would stop the malware until after i registered it, so initially it was accidental.</p>
<p>&mdash; MalwareTech (@MalwareTechBlog) <a href="https://twitter.com/MalwareTechBlog/status/863187104716685312?ref_src=twsrc%5Etfw">May 13, 2017</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p style="text-align: justify;">The time that @malwaretechblog registered the domain <strong>was too late to help Europe and Asia</strong>, where many organizations were affected. But it gave people in the US <strong>more time to develop immunity to the attack</strong> by patching their systems before they were infected, said Kalember.</p>
<p style="text-align: justify;">Also, <strong>many NHS organizations had Windows XP installed on their computers</strong>. Microsoft long stopped supporting the old version of Windows and hence the ransomware took advantage of this and was able to spread so conveniently. The old operating system did not alert the users of any viruses and did not have updates against such threats.</p>
<h3>Microsoft’s take on the situation</h3>
<p style="text-align: justify;">A Microsoft’s spokesperson said that <strong>those who had enabled updates and had the company’s free antivirus software installed were not affected</strong>. Also, the company <strong>released an update</strong> earlier today which detects this threat as <strong><a href="https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Ransom:Win32/WannaCrypt" target="_blank" rel="noopener noreferrer">Ransom: Win32/WannaCrypt</a></strong>.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Microsoft has made the patch for MS17-010 available for XP and 2k3. Patch over the weekend. It&#39;s worth the overtime. <a href="https://t.co/XqXjprWtC1">https://t.co/XqXjprWtC1</a></p>
<p>&mdash; Jake Williams (@MalwareJake) <a href="https://twitter.com/MalwareJake/status/863294952146644992?ref_src=twsrc%5Etfw">May 13, 2017</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<h3>The NHS system was the most badly hit</h3>
<p style="text-align: justify;">Soon after the attack, <strong>various hospitals postponed non-urgent appointments</strong> and ambulances changed routes. <strong>The systems were made to shut down</strong> altogether with doctors complaining about the <strong>major delays</strong> that occurred as a result. Up till now, all that is known is that <strong>various organizations have paid the demanded amount in Bitcoin</strong>. However, since all bitcoin transactions are recorded in a public ledger, it is <strong>hard to tell specifically which organizations paid</strong> the ransom.</p>
<p style="text-align: justify;">At the time of publishing this article, the attacks were stopped. The <strong>@MalwareTechBlog</strong> also released in-depth details highlighting how he was able to accidentally stop the attack which can be <a href="https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html" target="_blank" rel="noopener noreferrer">read here</a>.</p>
<p style="text-align: justify;"><span style="font-size: 10pt;"><strong>source: </strong><a href="https://www.hackread.com/" target="_blank" rel="noopener noreferrer">https://www.hackread.com/</a></span></p>
</div>
<p>The post <a href="https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/">WannaCry ransomware: researcher halts its spread by registering domain for $10.69</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WannaCry ransomware &#8211;  hitting world right now uses NSA windows exploit</title>
		<link>https://itblogsec.com/wannacry-ransomware-hitting-world-right-now-uses-nsa-windows-exploit/</link>
					<comments>https://itblogsec.com/wannacry-ransomware-hitting-world-right-now-uses-nsa-windows-exploit/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 13 May 2017 06:40:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=874</guid>

					<description><![CDATA[<p>Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as WannaCry (also known as 'Wana Decrypt0r,' 'WannaCryptor' or 'WCRY').</p>
<p>The post <a href="https://itblogsec.com/wannacry-ransomware-hitting-world-right-now-uses-nsa-windows-exploit/">WannaCry ransomware &#8211;  hitting world right now uses NSA windows exploit</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>WannaCry ransomware &#8211;  hitting world right now uses NSA windows exploit</h2>
<p style="text-align: justify;">Earlier today, a massive <strong>ransomware</strong> campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the <strong>most massive</strong> <strong>ransomware</strong> delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as <b>WannaCry ransomware</b> (also known as &#8216;<strong>Wana Decrypt0r</strong>,&#8217; &#8216;<strong>WannaCryptor</strong>&#8216; or &#8216;<strong>WCRY</strong>&#8216;).</p>
<p style="text-align: justify;">Like other nasty ransomware variants, WannaCry also <strong>blocks access</strong> to a computer or its files and <strong>demands money to unlock</strong> it. Once infected with the WannaCry ransomware, victims are asked <strong>to pay up to $300</strong> in order to remove the infection from their PCs; otherwise, their PCs render unusable, and their files remain locked.</p>
<p>In separate news, researchers have also discovered a <strong>massive malicious email campaign</strong> that&#8217;s spreading the <strong>Jaff ransomware</strong> at the rate of <strong>5 million emails per hour</strong> and hitting computers across the globe.</p>
<p><span style="font-size: 14pt;"><strong><span style="color: #ff0000;">| ALSO READ:</span></strong></span> <a href="https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/" target="_blank" rel="noopener noreferrer">WannaCry ransomware: researcher halts its spread by registering domain for $10.69</a></p>
<h3>Ransomware Using NSA&#8217;s Exploit to Spread Rapidly</h3>
<p style="text-align: justify;">What&#8217;s interesting about this ransomware is that WannaCry attackers are <strong>leveraging a Windows exploit harvested from the NSA</strong> called <b>EternalBlue</b>, which was dumped by the <strong>Shadow Brokers</strong> hacking group over a month ago.</p>
<p style="text-align: justify;"><strong>Microsoft</strong> released a <strong>patch</strong> for the vulnerability <strong>in March (MS17-010)</strong>, but many users and organizations who did not patch their systems are open to attacks. The <strong>exploit</strong> has the capability to <strong>penetrate into machines</strong> running unpatched version of <strong>Windows XP through 2008 R2</strong> by exploiting flaws in <strong>Microsoft Windows SMB Server</strong>. This is why WannaCry campaign is spreading at an astonishing pace.</p>
<p style="text-align: justify;"><strong>Once a single computer</strong> in your organization <strong>is hit</strong> by the WannaCry ransomware, the worm <strong>looks for other vulnerable computers</strong> and infects them as well.</p>
<h3>Infections from All Around the World</h3>
<div id="aim23162064901975293080" style="text-align: justify;">In just <strong>a few hours</strong>, the ransomware <strong>targeted over 45,000 computers in 74 countries</strong>, including <strong>United States</strong>, <strong>Russia</strong>, <strong>Germany</strong>, <strong>Turkey</strong>, <strong>Italy</strong>, <strong>Philippines</strong> and <strong>Vietnam</strong>, and that the number was still growing, according to <a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" target="_blank" rel="nofollow noopener noreferrer">Kaspersky Labs</a>.</div>
<div style="text-align: justify;"> </div>
<div class="clear" style="text-align: justify;">
<p style="text-align: justify;">According to a report, the ransomware attack <strong>has shut down work at 16 hospitals</strong> across the <strong>UK</strong> after doctors got blocked from accessing patient files. Another <a href="https://www.telefonica.com/es/web/press-office/-/cibersecurity-incident" target="_blank" rel="nofollow noopener noreferrer">report</a> says, <strong>85% of computers at the Spanish telecom firm, Telefonica, has get infected with this malware</strong>.</p>
<p style="text-align: justify;">Another independent security researcher, MalwareTech, <a href="https://intel.malwaretech.com/botnet/wcrypt" target="_blank" rel="nofollow noopener noreferrer">reported</a> that a <strong>large number of U.S. organizations</strong> (at least 1,600) have been hit by WannaCry, compared to <strong>11,200 in Russia</strong> and <strong>6,500 in China</strong>.</p>
</div>
<div class="clear"> </div>
<div class="clear"><a href="https://itblogsec.com/wp-content/uploads/2017/05/Wana-Decrypt0r-WannaCry-Ransomware-1.png"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-875" src="https://itblogsec.com/wp-content/uploads/2017/05/Wana-Decrypt0r-WannaCry-Ransomware-1.png" alt="Wana-Decrypt0r-WannaCry-Ransomware" width="728" height="380" srcset="https://itblogsec.com/wp-content/uploads/2017/05/Wana-Decrypt0r-WannaCry-Ransomware-1.png 728w, https://itblogsec.com/wp-content/uploads/2017/05/Wana-Decrypt0r-WannaCry-Ransomware-1-300x157.png 300w" sizes="(max-width: 728px) 100vw, 728px" /></a></div>
<div class="clear"> </div>
<div class="clear" style="text-align: justify;">
<p style="text-align: justify;">Screenshots of the <strong>WannaCry</strong> ransomware with different <strong>languages</strong>, including <strong>English</strong>, <strong>Spanish</strong>, <strong>Italian</strong>, were also shared online by various users and experts on Twitter. <strong>Bitcoin</strong> <strong>wallets</strong> seemingly associated with WannaCry were reportedly <strong>started filling up with cash</strong>.</p>
<p style="text-align: justify;">The Spanish computer emergency response organization (<a href="https://www.ccn-cert.cni.es/seguridad-al-dia/comunicados-ccn-cert/4464-ataque-masivo-de-ransomware-que-afecta-a-un-elevado-numero-de-organizaciones-espanolas.html" target="_blank" rel="nofollow noopener noreferrer">CCN-CERT</a>) has even issued an alert that warns users of the &#8220;massive attack of ransomware&#8221; from WannaCry, saying (translated version):</p>
<blockquote class="tr_bq">
<p style="text-align: justify;">&#8220;The ransomware, a version of WannaCry, infects the machine by encrypting all its files and, using a remote command execution vulnerability through SMB, is distributed to other Windows machines on the same network.&#8221;</p>
</blockquote>
<p style="text-align: justify;">It is <strong>unclear how the WannaCry ransomware is infecting systems</strong>, but obvious attack vector can be <strong>phishing emails</strong> or <strong>victims visiting a website containing malware</strong>.</p>
<p style="text-align: justify;">&#8220;<strong>Power firm Iberdrola and utility provider Gas Natural were also reported to have suffered</strong> from the outbreak.,&#8221; according to <a href="http://www.bbc.com/news/technology-39901382" target="_blank" rel="nofollow noopener noreferrer">BBC</a>.</p>
</div>
<h3 class="clear">How to Protect Yourself from WannaCry</h3>
<div class="clear">
<p style="text-align: justify;">First of all, if you haven&#8217;t <strong>patched your Windows machines</strong> and servers against <strong>EternalBlue exploit (MS17-010)</strong>, <strong>do it right now</strong>.</p>
<p style="text-align: justify;">To safeguard against such ransomware infection, you should always <strong>be suspicious of uninvited documents sent an email</strong> and should <strong>never click on links inside those documents</strong> unless verifying the source.</p>
<p style="text-align: justify;">To always <strong>have a tight grip on all your important files and documents</strong>, keep a<strong> good backup routine</strong> in place that makes their copies to an external storage device that is not always connected to your PC.</p>
<p style="text-align: justify;">Moreover, make sure that you <strong>run an active anti-virus security suite of tools on your system</strong>, and most importantly, always <strong>browse the Internet safely</strong>.</p>
<p style="text-align: justify;"><span style="font-size: 8pt;"><strong>source:</strong> <a href="http://thehackernews.com" target="_blank" rel="noopener noreferrer">http://thehackernews.com</a></span></p>
</div>
<p>The post <a href="https://itblogsec.com/wannacry-ransomware-hitting-world-right-now-uses-nsa-windows-exploit/">WannaCry ransomware &#8211;  hitting world right now uses NSA windows exploit</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/wannacry-ransomware-hitting-world-right-now-uses-nsa-windows-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/163 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-01 03:35:48 by W3 Total Cache
-->