• Friendly reminder: The politics section is a place where a lot of differing opinions are raised. You may not like what you read here but it is someone's opinion. As long as the debate is respectful you are free to debate freely. Also, the views and opinions expressed by forum members may not necessarily reflect those of GBAtemp. Messages that the staff consider offensive or inflammatory may be removed in line with existing forum terms and conditions.

Status
Not open for further replies.

Major Ransomware attack worldwide at the moment.

image.jpeg

looks like the world is being attacked by a very serious Ransomware virus.

so far UK, US, China, Russia, Spain and many more data's being hold to Ransom. its called WannaCry. and affects windows computers.

The infections seem to be deployed via a worm - a program that spreads by itself between computers.

Most other malicious programmes rely on humans to spread by tricking them into clicking on an attachment harbouring the attack code.

By contrast, once WannaCry is inside an organisation it will hunt down vulnerable machines and infect them too.

Some experts say the attack may have been built to exploit a weakness in Microsoft systems that had been identified by the NSA and given the name EternalBlue.

http://www.bbc.co.uk/news/technology-39901382
 
Last edited by Chary,

GerbilSoft

Well-Known Member
Member
Joined
Mar 8, 2012
Messages
2,395
Trophies
2
Age
34
XP
4,254
Country
United States
That wasn't the point I was trying to make :mellow:
So what is the point, that a program running in Wine will do what it's programmed to do?

Yes, intentionally running malware in Wine can result in damage to the system in a default configuration. (Wine usually maps / to the Z: drive, so Windows programs have full access.)

This is effectively the same as telling a Linux user to run "rm -rf /" as root and then being surprised that it deletes everything. (Or, similarly, "del /s /q C:\*" on Windows as Administrator - though Administrator actually has lower access than is required to delete everything due to e.g. the SYSTEM user.)
You are asking for much really.
Would need to port the vulnerability into the CIFS client in the Kernel, then recompile the kernel, and... too much work.
It's a server vulnerability, not client. Samba runs as a userspace process rather than in the kernel, so exploitation would allow for root-level access.
 
Last edited by GerbilSoft, , Reason: +del

GhostLatte

GBAtemp's Official Van Master™
Member
GBAtemp Patron
Joined
Mar 26, 2015
Messages
3,649
Trophies
3
Age
24
XP
11,149
Country
United States
So what is the point, that a program running in Wine will do what it's programmed to do?

Yes, intentionally running malware in Wine can result in damage to the system in a default configuration. (Wine usually maps / to the Z: drive, so Windows programs have full access.)

This is effectively the same as telling a Linux user to run "rm -rf /" as root and then being surprised that it deletes everything. (Or, similarly, "del /s /q C:\*" on Windows as Administrator - though Administrator actually has lower access than is required to delete everything due to e.g. the SYSTEM user.)

It's a server vulnerability, not client. Samba runs as a userspace process rather than in the kernel, so exploitation would allow for root-level access.
I was trying to make the point that some Linux users fail to realize that ransomware does exist for Linux.
 

Futurdreamz

Well-Known Member
Member
Joined
Jun 15, 2014
Messages
2,276
Trophies
1
Age
32
XP
2,129
Country
Canada
You are asking for much really.
Would need to port the vulnerability into the CIFS client in the Kernel, then recompile the kernel, and... too much work.
It's the same as porting anything to Linux. Even if you get it to work, everything will have to be reworked for pretty much every distribution.
 

Joom

 ❤❤❤
Member
Joined
Jan 8, 2016
Messages
6,067
Trophies
1
Location
US
Website
mogbox.net
XP
6,077
Country
United States


If only the Linux circlejerkers had this same mentality.

I already covered why this only works if you have folders from your home directory symlinked to the emulated C: drive in the Wine prefix a couple pages back. Remove the symlinks and it won't affect your shit. This video is very misleading.
 
  • Like
Reactions: Deleted User

GerbilSoft

Well-Known Member
Member
Joined
Mar 8, 2012
Messages
2,395
Trophies
2
Age
34
XP
4,254
Country
United States
I was trying to make the point that some Linux users fail to realize that ransomware does exist for Linux.
This is Windows ransomware running in Wine, not "Linux ransomware".

I haven't seen any Linux ransomware in the wild, but of course it's possible. Ransomware usually spreads by email, and in many cases as a JavaScript file. I don't know of any Linux desktop environments that associate JavaScript files with an interpreter to allow them to run like regular programs. (On Windows, JavaScript files are associated with Windows Shell Host.)
It's the same as porting anything to Linux. Even if you get it to work, everything will have to be reworked for pretty much every distribution.
Haven't had to do this for my ROM Properties Page plugin. Care to tell me what I'm missing?
 
  • Like
Reactions: Deleted User

Joom

 ❤❤❤
Member
Joined
Jan 8, 2016
Messages
6,067
Trophies
1
Location
US
Website
mogbox.net
XP
6,077
Country
United States
It's the same as porting anything to Linux. Even if you get it to work, everything will have to be reworked for pretty much every distribution.
Mm, no. Most everything is distribution independent. Different distro ≠ different OS.

I haven't seen any Linux ransomware in the wild,
I wrote one in Bash a couple years ago (well, it was just a locker that was meant to be a PoC) that might still be floating around. There's also a few on Github.

https://en.wikipedia.org/wiki/Linux.Encoder.1
 
Last edited by Joom,

VinsCool

Persona Secretiva Felineus
Global Moderator
Joined
Jan 7, 2014
Messages
14,600
Trophies
4
Location
Another World
Website
www.gbatemp.net
XP
25,217
Country
Canada
So, is it safe to connect to the internet if I have all the updates installed?
Yes, again, yes. If a person has all their updates, they are safe.
 

wolfmankurd

Well-Known Member
Member
Joined
Jul 20, 2013
Messages
270
Trophies
0
Age
35
XP
302
Country
So, is it safe to connect to the internet if I have all the updates installed?

Also you are likely behind a router blocking external SMB traffic, maybe even behind a ISP NAT.

Your router is your first and most important line if defence. Unless necessary you should not forward ports through your router! Why so many NHS Trust networks accepted SMB traffic for the internet is beyond me.

I bet a lot of people are like "Ha! I've never forwarded a port in my life." If you have UPNP enabled you might as well use a kraft swiss cheese slice for a firewall.

I'm not sure how ipv6 would effect worm propagation on the one hand we'd loose NAT and routers might forward as default more with the machines filter LAN/WAN but at the same time you'll be far less likely to hit a networked address...
 
Last edited by wolfmankurd,

GerbilSoft

Well-Known Member
Member
Joined
Mar 8, 2012
Messages
2,395
Trophies
2
Age
34
XP
4,254
Country
United States
You would hate windows 10 because it doesn't have a security exploit required for wannakey?
Windows 10 is actually doing the right thing here, even though MSDN documents that it's not guaranteed that CryptReleaseContext deletes key pairs. (They probably changed it in Windows 10 due to too many programs getting it wrong.)
 
  • Like
Reactions: VinsCool

GerbilSoft

Well-Known Member
Member
Joined
Mar 8, 2012
Messages
2,395
Trophies
2
Age
34
XP
4,254
Country
United States
It's back, and this time it's much worse.

The Petya ransomware has been updated to use the same EternalBlue vulnerability as WannaCry, but with an added "feature": once it gets onto a vulnerable machine, it proceeds to use wmic and psexec to reuse authentication credentials to infect other machines on the network. This works even if the other machines have been patched.

As an added bonus, the Petya ransomware installs itself into the hard drive's MBR, then reboots into a fake CHKDSK process (which is actually encrypting the HDD). Once it's done, it prompts you to send $300 worth of Bitcoin in order to recover your files.
 

EthanAddict

An investment to nothingness
Member
Joined
Nov 12, 2016
Messages
489
Trophies
0
Website
google.com
XP
491
Country
Antarctica
It's back, and this time it's much worse.

The Petya ransomware has been updated to use the same EternalBlue vulnerability as WannaCry, but with an added "feature": once it gets onto a vulnerable machine, it proceeds to use wmic and psexec to reuse authentication credentials to infect other machines on the network. This works even if the other machines have been patched.

As an added bonus, the Petya ransomware installs itself into the hard drive's MBR, then reboots into a fake CHKDSK process (which is actually encrypting the HDD). Once it's done, it prompts you to send $300 worth of Bitcoin in order to recover your files.

Does it affect Linux??!?! No? Windows peasants
 
Status
Not open for further replies.

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    SylverReZ @ SylverReZ: @AncientBoi, https://www.youtube.com/watch?v=7jUWpmU-X8k