Bookmark

Saturday, 3 June 2017

Do you really want to make me cry



On Friday, May 12, the Internet was rocked by a zero-day ransomware attack now known as WannaCry. WannaCry encrypts files on infected computers and then attempts to extort a ransom from its victims. In this case, the demanded payment was for bitcoins valued at $300 initially, with an increase to $1200 US dollars as time went by. The initial infection vector was by way of phishing emails, but an infected system would also attempt to propagate the infection by exploiting unpatched vulnerabilities in the Windows SMB service. The infection appeared first in the UK and Spain, but quickly spread world-wide. We discussed the initial details of the outbreak in “How to protect from WannaCry, the ransomware that infected the World” but in this post, we will dig deeper into what you can do to protect your network from this and the future attacks that will likely leverage some of the same NSA tools, and share some news that those of you who were infected may find welcome.
Things you can do right now
  1. Get a file backup system set up and running RIGHT NOW. Even if you are only going to use Volume Shadow Copy and an external USB drive, having a backup of critical data is the first step in recovering from any number of disasters, not just from malware. OneDrive for Business, Dropbox, and other cloud based storage systems are another great approach to take.
  2. Update! Seriously, go, right now, and update everything you have. The biggest vulnerability WannaCry exploited to spread was patched by Microsoft in March with the release of MS17-010 on 2017-03-14. Admins running current systems, who were impacted by the spreading malware exploiting this vulnerability, share in the responsibility for the impact to their systems since a patch was available several weeks before the exploit hit.
Microsoft even took the unprecedented step of releasing patches for end-of-life versions of Windows, including XP and 2003. These two operating systems have been end-of-life for years, but are still widely in use.
  1. Upgrade! If you are still using end-of-life systems, and there is any way to upgrade to a current version of Windows (or other operating system) you need to do so. Seriously, the vulnerability exploited was patched back in March for every version of the operating systems in either mainstream or extended support. If you were current, you were protected from the spread, though not the initial infection by downloading and executing malware. For that, consider removing admin rights from users, and using web filtering software to block downloads to unknown or potentially malicious files.
  2. Lockdown and screen anything you cannot update/replace. If you cannot replace them, upgrade them, or shut them down, then you should reduce their connectivity to only the absolute minimum necessary to provide their critical functions. Remove users’ rights to the system, either remove the default gateway or ensure they must go through a proxy with limited permitted access, and then pressure the vendor of whatever application is keeping you on legacy operating systems to provide an update to a supported version of Windows. There are lots of apps out there that businesses need, and which don’t have versions that will run on Windows 10, but those systems probably don’t need Internet access or for regular users (with or without admin rights) to use as their workstation. Firewall them off from anything they don’t have to communicate with as an additional step so they don’t become patient zero on your network.
  3. Scan your network, and any cloud storage you are using in your business, for files with the extension *CRY to quarantine any infected systems.
  4. Disable SMB1.0. Seriously, it’s a 30 year old protocol and nothing on your network should require it these days. If something does, this is a great way to smoke that out and get rid of it! Start with “Disable SMB v1 in Managed Environments with Group Policy” and work your way through from there.
Good news for those who were victimized
There is a “bug” in how the WannaCry malware encrypts victims’ files. Adrien Guinet has released a tool that can help you recover your encrypted files. The first tool can recover the private key (or rather the prime numbers used) by WannaCry. You can download that tool from https://github.com/aguinet/wannakey and run it on infected machines, as long as they have not been rebooted since infection. If that tool does recover the primes, you can use one of a pair of tools to try to recover data. A github user who goes by the alias odzhan has released wanafork, downloadable from https://github.com/odzhan/wanafork/, while Benjamin Delpy has released wanadecrypt at https://github.com/gentilkiwi/wanadecrypt. Use of any of these tools is for IT pros, as the instructions are definitely NOT written for end users, and of course they are best effort, nothing guaranteed, but anything is better than nothing, and these stand as good a chance as anything of getting your encrypted files back.
If there are any lessons to learn from this event, the most important ones are
  1. Legacy support may be necessary, but should never be your long-term strategy
  2. Patching is good, and the risks of a bad patch are far less than the risks from what can happen if you aren’t patching
  3. Users still fall for phishing attacks, so user education and mail filtering are both more important than ever
  4. Backups are critical.
If you are not fully current, take WannaCry as the wakeup call you need to get current as soon as you can. Based on what ShadowBrokers have publicly stated, there are still more tools to release, which means that more malicious attacks are soon to follow. While getting fully current and completely patched may not protect you from everything that could come up, we know that being on out of date operating systems and unpatched computers is just asking for trouble!

Did you, or someone you know, fall victim to WannaCry? If so, please leave a comment and let us know what happened and the extent of the damage. No names or company names are requested…I just want to get a feel for where things stand with our readers. Thanks!

Thursday, 19 April 2012

Never before seen magic on Twitter









The world’s most famous micro-blogging site Twitter is home to various tricks, fun and magic as well. But most people use the site only to do things like share information, share updates and even for unnecessary gossiping.
It is high time that we understood the fun, frolic and magic that Twitter has hidden within itself. A car manufacturing company called Smart Argentina has created a never-before seen and intriguing design magic.
To see and experience this for yourself, all you have to do is go to the Smart Argentina Company account and press J on your keyboard. Keep on pressing J. When you do this, magic takes place in front of your very eyes.
To experience this magic right away, click here.

Google forgets to doodle Charlie Chaplin’s birthday





Google has completely forgotten to doodle the birthday of the most well known personality in the world Charlie Chaplin. This year marks the 123rd birth anniversary of the late English comedy actor and director. The Homepage of Google doesn’t contain the famous doodle for people to watch online.
Google had recently put up a doodle signifying Robert Doisneau’s 100th birthday, but people in various countries haven’t even heard of Robert Doisneau. The doodle signifying Charlie Chaplin’s birthday had to be compulsorily put up as he is very well known by people in all the countries of the world.
Google had put up a doodle last year a day before Charlie Chaplin’s birth anniversary. But this year Google seems to have entirely forgotten the occasion. Had the doodle on the birthday of the late actor been put up, it would have been a fitting tribute to the legend and his legacy.

Watch the entire universe on your computer now








Astronomy has always fascinated us. For this reason, scientists across the world have come up with various astronomical innovations such as the Hubble Space Telescope. Now you can use your computer as the Hubble Space Telescope using latest technology and watch the entire universe on your screen.
Ever since Galileo first initiated the study of heavenly bodies, people have become more involved and want to find out more intriguing details about them. To enable us to connect with our solar system and the universe, a website called worldwidetelescope.org provides space viewing without a telescope. By visiting the website, you can turn your monitor into a telescope through which you can view the solar system and the universe.
Just by downloading an app form the site, you can get the entire universe on your fingertips. So, visit the website now. To visit right away, click here

Digital Storm launches Marauder series of desktop PCs










Digital Storm is out with a new series of desktop PCs especially meant for gaming purposes which is great news for gaming admirers. Company officials mentioned that focus is on quality. Consumers have the privilege of choosing among four available configurations. The overall features as well as the price vary from the low end configuration to the high end. 
Irrespective of the systems of all levels, consumers can use a Corsair Vengeance C70 for keeping the system safely. 
Common specs available with all level Digital Storm Marauder desktop PCs are listed below 
  • Windows 7 Home Premium OS
  • 8GB of Corsair Vengeance RAM
  • Corsair GS 600W power supply
  • Dimension of 20 x 9 x 21 in
  • USB 3.0 (front and rear)
  • DVD writer
  • Life time tech support
  • 3 Year warranty

 Key specs of Level 1 Digital Storm Marauder desktop PCs are listed below. 
  • HD 7750 GPU
  • Hard drive of 500 GB and 7200 rpm
  • 3.6GHz quad-core AMD FX-4100 processor
  • Video card of 1 GB

Key specs of Level 2 Digital Storm Marauder desktop PCs are listed below. 
  • Hard drive of 500 GB and 7200 rpm
  • 3.1GHz quad-core AMD FX-8120 processor
  • HD 7770 GPU
  • Video card of 1 GB

Key specs of Level 3 Digital Storm Marauder desktop PCs are listed below. 
  • Hard drive of 1 TB, 7200 rpm
  • 3.3 GHz quad-core Intel processor
  • HD 7850 GPU
  • Video card of 2 GB

Key specs of Level 4 Digital Storm Marauder desktop PCs are listed below. 
  • Hard drive of 1 TB, 7200 rpm
  • 3.3 GHz quad-core Intel processor
  • HD 7870 GPU
  • Video card of 2 GB

Digital Storm is about to create a new era of gaming desktop PCs with its new Marauder series gadgets. Gaming admirers are thrilled with the announcement from the company. These new gaming series PCs will be available in green colour. There is no news regarding exactly when it will be out in the market. Gaming fans can’t wait more to have an innovative experience with this advance PCs from Digital Storm. 
Level 1 desktop PCs can be purchased at a price of around Rs. 40000/-. Level 2 Digital PCs can be purchased at a price of around Rs. 50000/-. Level 3 PCs can be purchased at a price of around Rs. 60000/-. Level 4 Digital Storm Marauder desktop PCs can be purchased at a price of around Rs. 65000/-.

Google Drive service to be launched next week











Google Drive, the cloud storage service was expected to be launched in early April. Due to some delay this service is launching next week. It will come with a free storage of 5 GB and will be available for Windows, Android, iOS and Mac platforms.
The image of Google Drive homepage got leaked as soon as the information about it was revealed. It was also found that the Drive will offer a free storage of 5 GB to the users. It is possible for it to launch in Beta state initially. Users can use this service on invite basis. It is clear from the other services launched by Google.
Once users have set their accounts, they can upload files from anywhere using the link http://drive.google.com or through the apps that are meant for it right from their desktops, laptops, smartphones or tablets. It is similar to the Dropbox service that is existing.

Check Who is Accessing your Wireless Connection


Using a good password for your Wireless Network does not necessarily mean that it will prevent others from hacking into it and using your Wireless Connection. Other people using your Wireless Connection can hog your Bandwidth and leave you with a very slow Internet Connection.If you have any doubts on whether or not your Wireless Connection is being accessed by someone else without your knowledge then you can check  out now by using a free tool-Wireless Network Watcher. This software allows you to scan your network to find who is using your network. You can also export the results and save then as .xml, .txt and a couple other formats for future use. This software is tested and working in 32 and 64 bit versions of Windows 7, Windows Vista etc.

 

Without further waiting lets move on to how to use the free tool:
  • Using Wireless Network Watcher is pretty much straight forward and simplistic. First download the file from here. It is a small file just around 250 KB. After downloading the tool extract it then run it.
  • It will scan your Network quickly and display the results. The results will display the IP Address, MAC Address and the device’s Name and Manufacturer.If you want to save the results just select all the results and click on “Save selected Items” button.
  • This would help you quickly note down the culprit who has gained access to your wireless network unauthorized.