Developing: Major Hacking Operation Taking Place Across Globe. Wikileaks NSA-derived worm leaks used

Dr. Acula

Posts on Dapcity.com
Supporter
Joined
Jul 26, 2012
Messages
27,053
Reputation
9,422
Daps
144,780
So first the NHS systems being locked down in England were reported, but it seems to be part of a global attack on several institutions.

Massive ransomware attack hits UK hospitals, Spanish banks
TECHNOLOGY LAB —
Massive ransomware attack hits UK hospitals, Spanish banks
Ransomware attack appears to be targeting institutions in several European countries.

SEBASTIAN ANTHONY (UK) - 5/12/2017, 11:34 AM

nhs-ransomware.jpg

Enlarge
Health Service Journal
82
A large number of hospitals, GPs, and walk-in clinics across England have been locked down by a ransomware attack, reports suggest. There are also some reports of a ransomware attack hitting institutions in Portugal and Spain, with telecoms provider Telefonica apparently hit hard. Further attacks have been reported in Russia, Ukraine, and Taiwan. Batten down the hatches: we might be in the middle of a global ransomware attack.

Multiple sources point to this ransomware attack being based on the EternalBlue vulnerability, which was discovered by the NSA but was leaked by a group calling itself Shadow Brokers last month.

NHS Digital has confirmed the attack and issued a brief statement, stating that there's no evidence that patient data had been accessed and that the attack was not specifically targeted at the NHS. At this point it isn't clear whether a central NHS network has been knocked offline by the ransomware or whether individual computers connected to the network are being locked out. In any case, a number of hospitals and clinics are reporting that their computer systems are inaccessible, and some telephone services are down too.




Enlarge
/ Another shot of the ransomware, this time obtained by the BBC. Note the slightly different timings on the left.
The Health Service Journal obtained a screenshot (pictured top) that purportedly shows the ransomware that is appearing on some NHS computers. At first glance it looks like your usual run-of-the-mill ransomware that demands $300 in bitcoin (about 0.16 BTC at today's exchange rate).


The Blackpool Gazette, which seems to have the most detailed report of the incident, has some pretty scary quotes from local hospitals and GP surgeries. The Blackpool Victoria Hospital has reportedly pleaded for patients to only attend A&E for life-threatening emergencies; "Please avoid contacting your GP practice unless absolutely necessary. Should you wish to obtain non-urgent medical advice please call 111," a spokesperson is quoted as saying.

Blackpool Gazette also spoke to a hospital IT worker who said that "five or six" NHS trusts had been taken offline by the malware. As of 15:30, NHS Digital said that 16 NHS organisations had reported being affected by the ransomware.



FURTHER READING
NHS trust battles mystery virus, turns away patients, shutters IT system"User shared drive access is down," the IT worker is quoted as saying. "E-mails slowly going. Non-essential PCs are being shut down, and waiting times are estimated to increase. There's nothing we can do except sit back and watch it collapse. The ransom message is exactly the same here, but with different bitcoin links, which is standard. It's a goodbye to the IT systems."


The East and North Hereford NHS Trust website shows the following message: "We're currently experiencing significant problems with our IT and telephone network, which we're trying to resolve as soon as possible. This means that people will have difficulty phoning us for the time being – please bear with us. Apologies for any inconvenience."

Foursys, an IT company, issued a statement saying 11 of its NHS customers have been affected by the ransomware.

Another screenshot of the ransomware shared by BBC Radio 5 Live shows the name "Wana Decrypt0r 2.0" in the title bar, which sounds very similar to Wanna Decryptor, a previously known piece of ransomware. The NHS Digital statement concurs: "The investigation is at an early stage, but we believe the malware variant is Wanna Decryptor."



FURTHER READING
Two more healthcare networks caught up in US outbreak of hospital ransomwareThe ransomware deadline appears to be at 3pm on May 19, exactly a week from now. We have reported on some isolated incidents of hospital ransomware in the past, both in the UK and the US, though the scale of this attack appears to be much larger than normal.


This story has been updated multiple times; we'll follow up with some technical analysis later today.

This post originated on Ars Technica UK
 

Dr. Acula

Posts on Dapcity.com
Supporter
Joined
Jul 26, 2012
Messages
27,053
Reputation
9,422
Daps
144,780
An NSA-derived ransomware worm is shutting down computers worldwide
Wcry uses weapons-grade exploit published by the NSA-leaking Shadow Brokers.
DAN GOODIN - 5/12/2017, 2:11 PM

mushroom-cloud-800x536.jpg

Enlarge
54
A highly virulent new strain of self-replicating ransomware is shutting down computers all over the world, in part by appropriating a National Security Agency exploit that was publicly released last month by the mysterious group calling itself Shadow Brokers.

The malware known as Wanna, Wannacry, or Wcry, has infected at least 57,000 computers, according to antivirus provider Avast. AV provider Kaspersky Lab said organizations in at least 74 countries have been affected, with Russia being disproportionately affected, followed by Ukraine, India, and Taiwan. The malware is notable for its multi-lingual ransom demands, which support more than two-dozen languages.


Enlarge

Kaspersky Lab
Wcry is reportedly causing disruptions at banks, hospitals, telecommunications services, and other mission-critical organizations in multiple countries, including the UK, Spain, Germany, and Turkey. FedEx, the UK government's National Health Service, and Spanish telecom Telefonica have all been hit. The Spanish CERT has called it a "massive ransomware attack" that is encrypting all the files of entire networks and spreading laterally through organizations.

Remember Code Red?


FURTHER READING
NSA-leaking Shadow Brokers just dumped its most damaging release yetAnother cause for concern: wcry copies a weapons-grade exploit codenamed Eternalblue that the NSA used for years to remotely commandeer computers running Microsoft Windows. Eternalblue, which works reliably against computers running Microsoft Windows XP through Windows Server 2012, was one of several potent exploits published in the most recent Shadow Brokers release in mid-April. The Wcry developers have combined the Eternalblue exploit with a self-replicating payload that allows the ransomware to spread virally from vulnerable machine to vulnerable machine, without requiring operators to open e-mails, click on links, or take any other sort of action.


So-called worms, which spread quickly amid a chain of attacks, are among the most virulent forms of malware. Researchers are still investigating how Wcry takes hold. The awesome power of worms came to the world's attention in 2001 when Code Red managed to infect more than 359,000 Windows computers around the world in 14 hours.

"The initial infection vector is something we are still trying to find out," Adam Kujawa, a researcher at antivirus provider Malwarebytes, told Ars. "Considering that this attack seems targeted, it might have been either through a vulnerability in the network defenses or a very well-crafted spear phishing attack. Regardless, it is spreading through infected networks using the EternalBlue vulnerability, infecting additional unpatched systems."



FURTHER READING
Mysterious Microsoft patch killed 0-days released by NSA-leaking Shadow BrokersIt's not clear if the Eternalblue exploit is Wcry's sole means of spreading or if it has multiple methods of propagating. In an update that was notable for its unlikely and extremely fortuitous timing, Microsoft patched the underlying vulnerability in March, exactly four weeks before the Shadow Brokers' April release published the weapons-grade NSA exploit. The rapid outbreak of Wcry may be an indication that many, or possibly all, of the companies hit had yet to install a critical Windows patch more than two months after it was released.


Other organizations in Spain known to be disrupted include telecom Vodafone Espana, the KPMG consultancy, banks BBVA and Santander, and power company Iberdrola. The Blackpool Victoria Hospital in the UK reportedly pleaded for patients to seek treatment only for life-threatening emergencies after Wcry crippled its network. Portugal Telecom has also reported being infected.

According to an article posted by Madrid-based El Mundo, 85 percent of computers at Telefonica, Spain's dominant telecom, are affected by the worm, although that figure has not been confirmed. Officials at Telefonica and Spanish energy companies Iberdrola and Gas Natural Fenosa have all instructed employees to shut down computers. While the paper confirmed an attack on Telefonica, it said it was not yet clear if the other two companies had been infected or if they ordered the shutdown as a preventative measure.

Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It's not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.

People who have yet to install the Microsoft fix—MS17-010—should do so right away. People should also be extremely suspicious of all e-mails they receive, particularly those that ask the recipient to open attached documents or click on Web links.
 

Hood Critic

The Power Circle
Joined
May 2, 2012
Messages
26,197
Reputation
4,306
Daps
117,649
Reppin
דעת
Wikileaks and Snowden are trying to push this as the "NSA worm' which would be part of their agenda but the reality is patches for these vulnerabilities were released months ago and the issue is with the speed at which organizations patch their systems.
 

acri1

The Chosen 1
Supporter
Joined
May 2, 2012
Messages
26,883
Reputation
4,768
Daps
123,477
Reppin
Detroit
Wikileaks and Snowden are trying to push this as the "NSA worm' which would be part of their agenda but the reality is patches for these vulnerabilities were released months ago and the issue is with the speed at which organizations patch their systems.

As somebody who works in IT, the problem is that half the time Microsoft patches break something so we don't like deploying them right away.

If I patch a bunch of computers and it breaks something I get shyt, if I hold off for a while to test the patch and there's a security issue I also get shyt...sometimes you just can't win. :to:
 

Hood Critic

The Power Circle
Joined
May 2, 2012
Messages
26,197
Reputation
4,306
Daps
117,649
Reppin
דעת
As somebody who works in IT, the problem is that half the time Microsoft patches break something so we don't like deploying them right away.

If I patch a bunch of computers and it breaks something I get shyt, if I hold off for a while to test the patch and there's a security issue I also get shyt...sometimes you just can't win. :to:
Trust me, I understand your pain.

We've had so many internal arguments about patch cycles and how they should be promoted through Dev, QA and Prod.
 

Breh Obama

First Breh President. Coli Prophet.
Joined
Jul 5, 2012
Messages
13,430
Reputation
-841
Daps
38,918
Reppin
Leader of the righteous Brehs!
As somebody who works in IT, the problem is that half the time Microsoft patches break something so we don't like deploying them right away.

If I patch a bunch of computers and it breaks something I get shyt, if I hold off for a while to test the patch and there's a security issue I also get shyt...sometimes you just can't win. :to:
Thats what Microsoft wants to happen. It keeps them in business. Once you use their systems your locked into them and you have to keep up with the patches to fix the errors of the previous ones
 

re'up

Veteran
Joined
May 26, 2012
Messages
21,415
Reputation
6,683
Daps
67,405
Reppin
San Diego
Lol, as poorly as it was received, "Blackhat", was a pretty prophetic movie, though I loved it.....

I met a beautiful girl on a plane last year, who was a counter cyber security expert, pretty fascinating, from Khazikstan. She did this for a living, international travel, going up against hackers and their programs.
 

ill

Superstar
Joined
May 2, 2012
Messages
10,234
Reputation
367
Daps
17,297
Reppin
Mother Russia & Greater Israel
Thanks NSA.

Thanks CIA.

Thanks Obama. :troll:


This is what happens when your intelligence services purposefully keep exploits to themselves instead of informing the corporations that they need to fix the exploit :yeshrug:
 

Hood Critic

The Power Circle
Joined
May 2, 2012
Messages
26,197
Reputation
4,306
Daps
117,649
Reppin
דעת
Thanks NSA.

Thanks CIA.

Thanks Obama. :troll:


This is what happens when your intelligence services purposefully keep exploits to themselves instead of informing the corporations that they need to fix the exploit :yeshrug:
There is nothing wrong with the IC having 0-days, it's part of cyber warfare.

The onus should be on the corporations to run active bug bounty programs and running active red and blue teams internally.
 

BaggerofTea

dapcity.com
Supporter
Joined
Sep 15, 2014
Messages
54,660
Reputation
-751
Daps
267,369
Lol, as poorly as it was received, "Blackhat", was a pretty prophetic movie, though I loved it.....

I met a beautiful girl on a plane last year, who was a counter cyber security expert, pretty fascinating, from Khazikstan. She did this for a living, international travel, going up against hackers and their programs.

You really believed that
 
Top