Page 1 of 2 1 2 LastLast
Results 1 to 20 of 29

Thread: Britainís health network hit by major hacking attack

  1. #1
    Join Date
    Aug 2006
    Location
    calgary/AB
    My Ride
    2014 335GT
    Posts
    394
    Rep Power
    0

    Default Britainís health network hit by major hacking attack

    British NHS network is under cyber attack.
    http://bgr.com/2017/05/12/nhs-hack-r...e-cyberattack/

  2. #2
    Join Date
    Mar 2009
    Location
    Calgary
    My Ride
    '10 CTS
    Posts
    329
    Rep Power
    0

    Default

    Scary shit. Reports are it came in as a typical Word macro ransomware, and is spreading via unpatched MS17-10.

  3. #3
    Join Date
    Sep 2006
    Location
    Secret City, Alberta
    My Ride
    2007 Civic Si
    Posts
    343
    Rep Power
    0

    Default

    We just got an email at work that there is a very active and aggressive ransomware attack being spread world wide. I hate this BS, it's freaky stuff.

  4. #4
    Join Date
    Aug 2006
    Location
    calgary/AB
    My Ride
    2014 335GT
    Posts
    394
    Rep Power
    0

    Default

    It is still active. It is not just UK it is wide spread than UK.

  5. #5
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    2016 MB C450
    Posts
    7,603
    Rep Power
    21

    Default

    Originally posted by The_Penguin
    Scary shit. Reports are it came in as a typical Word macro ransomware, and is spreading via unpatched MS17-10.
    It's May, if they didn't patch MS17-10 by this point, their IT head need to be fired.

  6. #6
    Join Date
    Sep 2016
    Location
    Calgary, Ab
    My Ride
    Old Honda
    Posts
    145
    Rep Power
    0

    Default

    The idiots though the NHS has money...? LOLZ.
    Kinda reminds me of this scene.



    Thats like going to your local out of work bro dog and asking for some cash..

  7. #7
    Join Date
    Mar 2009
    Location
    Calgary
    My Ride
    Silverado
    Posts
    1,931
    Rep Power
    10

    Default

    Originally posted by The_Penguin
    Scary shit. Reports are it came in as a typical Word macro ransomware, and is spreading via unpatched MS17-10.
    Had a local EPC engineer send me a request to review some files. Sounds like there is somethings floating around locally as well.
    Quote Originally Posted by Gestalt View Post
    Im the one with a learning disability....

  8. #8
    Join Date
    Jul 2008
    Location
    Calgary
    Posts
    285
    Rep Power
    0

    Default

    Damn US hackers. You can tell its a US hacker for sure by the damage done to Britain and the Russians.

    That, and its always about money.

    Add: Bitcoin only payment. Very colonial. I mean, when you take over a tropical island by economic force, the first thing you do is require that they pay in something like US dollars over which they have no control over, where they may have been using shells or lumps of metal for centuries.

    http://uk.reuters.com/article/uk-bri...-idUKKBN1882NV

    Stolen from NSA server. Seems to be a legitimate backdoor given to the USA.
    Last edited by ZenOps; 05-13-2017 at 06:39 AM.
    Trade war!

  9. #9
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    2016 MB C450
    Posts
    7,603
    Rep Power
    21

    Default

    Originally posted by ZenOps
    Damn US hackers. You can tell its a US hacker for sure by the damage done to Britain and the Russians.
    Time zone effect, the working day started over there first.

    EDIT: Actually, was wrong this one started around 11am EST.

    https://www.nytimes.com/interactive/...-map.html?_r=0

    I guess Europe and Russia doesn't like to patch their Windows
    Last edited by Xtrema; 05-13-2017 at 06:42 AM.

  10. #10
    Join Date
    Jul 2008
    Location
    Calgary
    Posts
    285
    Rep Power
    0

    Default

    Still, whose fault is it.

    US builds a nuke, and then guards it with a pet poodle and a rusty padlock. Teenager from the US gets bored of going to the mall and steals said nuke, then demands that everyone pay him money or more people will start dying in hospitals.
    Trade war!

  11. #11
    Join Date
    Jun 2009
    Location
    N/A
    Posts
    1,973
    Rep Power
    10

    Default

    Let it go, Z. Why are you so insistent that it might be the USA's fault in some way?

    I am amused though that it appears that this could've easily been avoided.
    Last edited by speedog; 05-13-2017 at 07:02 AM.
    Moran supreme

  12. #12
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    2016 MB C450
    Posts
    7,603
    Rep Power
    21

    Default

    Originally posted by speedog
    Let it go, Z. Why are you so insistent that it might be the USA's fault in some way?

    I am amused though that it appears that this could've easily been avoided.
    It is USA's fault because NSA did not disclose this bug to keep the backdoor open. Then hired a contractor who was not careful with the tools.

    This could be avoided if everyone sticks reasonably close to MS's patching schedule which has been around for more than a decade now. When this surfaced, MS actually postpone the patching cycle in Feb to get MS17-10 in quick. This is serious enough that MS actually skip a patching release 1st time ever since the program started.

    So to not have MS17-10 patched by May, especially on user workstation is pretty weak from IT security perspective.

  13. #13
    Join Date
    Jul 2008
    Location
    Calgary
    Posts
    285
    Rep Power
    0

    Default

    Its bad enough when one country gets a backdoor, its even worse when they lose it to a rogue hacker.

    Imagine if China got a backdoor into Microsoft Windows for legitimate, above board for use at any time. And then they *accidentally* lost the code to North Korea.

    North Koreans then encrypt all medical files of all US hospitals, and banking information for ransom of 20 bitcoins each. The beauty of encryption is that the data is not blatantly destroyed or altered, its just encrypted. Have a million dollars in a bank? Prove it.

    Its foolish to trust the NSA any more than the former KGB, or North Korea.
    Last edited by ZenOps; 05-13-2017 at 09:06 AM.
    Trade war!

  14. #14
    Join Date
    Jan 2006
    Location
    Calgary
    My Ride
    has a turbo
    Posts
    2,185
    Rep Power
    14

    Default

    There are many reasons companies don't update when patches are released and that's the same reason many companies are still using old operating systems. Some applications are legacy and don't support newer versions of windows or some developers need time to ensure that patches won't break their applications as with the case with the recent creators update

  15. #15
    Join Date
    Apr 2008
    Location
    Calgary, AB
    My Ride
    2015 CLS63 AMG S-Model Coupe
    Posts
    653
    Rep Power
    10

    Default

    Originally posted by adam c
    There are many reasons companies don't update when patches are released and that's the same reason many companies are still using old operating systems. Some applications are legacy and don't support newer versions of windows or some developers need time to ensure that patches won't break their applications as with the case with the recent creators update
    While this is true, it doesn't necessarily hold true for security updates...

    .NET updates may be held off (but not .NET security updates, those are usually always applied). Feature packs, added functionality, etc... can and usually are held off for testing (won't effect security). Security updates are usually always separate, and should always be done ASAP.

    It's definitely work to balance, but it's do-able (part of everyday I.T.).

    Generic windows security updates should always be applied (usually don't break things).

    If the company is large enough, they should have dedicated people testing deployment with applications before approving updates for deployment.


    Problem is, companies are cheap AF when it comes to IT... I can't tell you how many times I've gone on a sales call to a decent sized business that stores customer personal data, only to find out they haven't patched in 3 years, and have active infections on their server. Management doesn't usually care as the systems are still working (I get told, well if it's not broke, don't fix it).

    You tell them how serious it is, with violations of the privacy act by not taking care of it. They lie and say they found someone cheaper to do it (always find out later they ended up doing nothing), lol.
    Sig was pwned by Moderator!

  16. #16
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    2016 MB C450
    Posts
    7,603
    Rep Power
    21

    Default

    Originally posted by Zhariak
    Problem is, companies are cheap AF when it comes to IT... I can't tell you how many times I've gone on a sales call to a decent sized business that stores customer personal data, only to find out they haven't patched in 3 years, and have active infections on their server. Management doesn't usually care as the systems are still working (I get told, well if it's not broke, don't fix it).

    You tell them how serious it is, with violations of the privacy act by not taking care of it. They lie and say they found someone cheaper to do it (always find out later they ended up doing nothing), lol.
    Bingo. That why nobody learns until people who make these dumb decisions is removed.

    Originally posted by adam c
    There are many reasons companies don't update when patches are released and that's the same reason many companies are still using old operating systems. Some applications are legacy and don't support newer versions of windows or some developers need time to ensure that patches won't break their applications as with the case with the recent creators update
    That's not an excuse any more in 2017. If it's business critical and you can't update it, one should start looking at restricting access and firewall it off.

    But going back to Zhariak's observation about business being cheap AF when it comes to security, that's why these shit spreads.

    I'm glad WannaCry happened. It's been almost a decade since for a major outbreak and CIOs and IT Managers are getting lax on paying attention.
    Last edited by Xtrema; 05-13-2017 at 10:02 AM.

  17. #17
    Join Date
    Jan 2006
    Location
    Calgary
    My Ride
    has a turbo
    Posts
    2,185
    Rep Power
    14

    Default

    I'm not saying it's an excuse it's just how it is, I'm pretty sure you work in IT as do I. We have clients who refuse to deploy updates because someone might leave work open in their computer and don't want to risk losing it but if this were to hit them it would be the fault of IT regardless of who said not to deploy updates

    One client in particular... we asked them what would happen in the event of a power outage, they would lose their work.. their response was to buy desktop ups devices for their workstation and still refused regaular patching
    Last edited by adam c; 05-13-2017 at 09:57 AM.

  18. #18
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    2016 MB C450
    Posts
    7,603
    Rep Power
    21

    Default

    Originally posted by adam c
    One client in particular... we asked them what would happen in the event of a power outage, they would lose their work.. their response was to buy desktop ups devices for their workstation and still refused regaular patching
    For clients like that, I will have all the email/decision saved. The minute shit like WannaCry hit, will send it back to them or their bosses and along with a quote of clean up bill.

  19. #19
    Join Date
    Apr 2008
    Location
    calgary
    My Ride
    2g Eclipse / EP3
    Posts
    3,303
    Rep Power
    13

    Default

    One client I know has been hit with Ransomware on 2 separate occasions the past 4 years, both times I was able to save their business from backups - yet they refuse to have me check the backups (and their file server) on a regular basis - eg. every 2-3 months 1 hour remote check. Its not even a real Windows Server, just a desktop OS/box with Enterprise drives inside.

    It was sheer luck that their systems were running when the latest attack occurred as I happened to be on a service call and noticed their file server needed some work, about a month prior (their backup drive stopped working).

    Pure cheap-assery - yet at the same time I know arrogant IT guys who love to make work, talk down to clients and thus create jaded customers who despise IT.
    Last edited by revelations; 05-13-2017 at 10:17 AM.

  20. #20
    Join Date
    Apr 2008
    Location
    calgary
    My Ride
    2g Eclipse / EP3
    Posts
    3,303
    Rep Power
    13

    Default

    Oh btw, here is a prevention tool im sure many of you have heard of ..... but just in case you havent:

    https://ransomfree.cybereason.com/

    Essentially it monitors for massive file and folder attrib changes system wide. Windows 10 came out with something similar but this would be of benefit to older systems.

Page 1 of 2 1 2 LastLast

Similar Threads

  1. Major Heatwave to Hit Calgary Alberta :P

    By Offroad in forum Misc. Gallery
    Replies: 23
    Latest Threads: 07-29-2014, 08:21 AM
  2. Attack on Canada, U.S is attack on Muslims: imams

    By G-Suede in forum Society / Law / Current Events / Politics
    Replies: 35
    Latest Threads: 01-11-2010, 01:50 PM
  3. Marketing Major vs Management Major

    By Kirbs17 in forum Campus Chat
    Replies: 4
    Latest Threads: 04-19-2006, 10:20 PM
  4. Replies: 4
    Latest Threads: 01-05-2004, 02:02 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •