Ransomware threat: Get patched, find a firewall or upgrade fast

May 15, 2017

New Delhi, May 15: It was coming. On March 14 this year, Microsoft released a security update which addressed the vulnerability in the 16-year-old Windows XP operating system that the hackers behind the massive ransomware attack exploited and created havoc in 150 countries.

wannacry

The vulnerability in the Microsoft Windows software — exploited by “WannaCrypt” — crippled computers from hospitals in Britain to police stations in India, with hackers demanding hundreds of dollars from the users for them to regain control over their data.

Once Microsoft released the patch for the vulnerability — exploited by hacker group “Shadow Brokers” after stealing a software from the US National Security Agency (NSA) — some Window XP users installed the update called “Microsoft Security Bulletin MS17-010” on their desktops and laptops.

But several didn"t.

There are nearly 150 million computers running Windows XP operation system globally. Those who didn"t pay heed to the Windows XP patch are the ones who have fallen prey to the world"s biggest ransomware attack.

Microsoft which had discontiued security updates to its out-of-date software, has also provided a security update for all customers using Windows 8 and Windows Server 2003, anticipating further attacks on these earlier platforms being used by millions.

According to the company, “customers who are running supported versions of the operating system (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016) will have received the security update MS17-010 in March.

“If customers have automatic updates enabled or have installed the update, they are protected. For other customers, we encourage them to install the update as soon as possible,” said Phillip Misner, Principal Security Group Manager, Microsoft Security Response Centre, in a statement.

Meanwhile, “WannaCrypt” locked up machines, encrypted files and demanded approximately $600 in Bitcoin for a recovery key.

According to global cyber security firms, paying heed to updates can only save your data from being put to ransom.

“Install the official patch from Microsoft that closes the vulnerability used in the attack. Ensure that security solutions are switched on all nodes of the network. If Kaspersky Lab"s solution is used, ensure that it includes the "System Watcher", a behavioural proactive detection component and that it is switched on,” Altaf Halde, Managing Director of Kaspersky Lab (South Asia), told.

“Run the "Critical Area Scan" task in Kaspersky Lab"s solution to detect possible infection as soon as possible (otherwise it will be detected automatically, if not switched off, within 24 hours),” he added.

According to Subhendu Sahu, Acting Country Manager for India, FireEye, the ransomware poses high risks to organisations using potentially vulnerable Windows machines.

“We can certainly expect follow-on attacks. Organisations seeking to take risk management steps related to this campaign should install the latest Windows patches. They should also use the indicators of compromise which are associated with this activity. FireEye has also taken steps to help secure its customers,” Sahu told.

As investigators were working to track down those responsible for the ransomware attack, Microsoft President and Chief Legal Officer Brad Smith said the governments should treat this attack as a “wake-up call”.

The news led software security providers to ramp up anti-malware software.

“Upon learning of these incidents, McAfee quickly began working to analyse samples of the ransomware and develop mitigation guidance and detection updates for its customers. McAfee has subsequently provided DAT (that contain data in text or binary format) updates to all its customers and provided them and the public further analysis on the attacks,” Ian Yip, Chief Technology Officer, Asia Pacific, McAfee, told.

If you are a home Windows XP user, patch immediately follow up with an upgrade. If you are running a vulnerable system and cannot install the patch for some reason, try doing the following:

“Disable SMBv1 (a server component) with the steps documented at "Microsoft Knowledge Base Article 2696547" and as recommended previously. Consider adding a rule on your router or firewall to block incoming Server Message Block (SMB) traffic on port 445,” said a report in the technology website Engadget.

“This is big and set to get bigger. We haven"t seen anything like this since Conficker in 2008,” Amit Nath, Head of Asia Pacific-Corporate Business at cyber security firm F-Secure Corporation, told IANS.

The Conficker worm infected millions of computers including government, business and home computers in over 190 countries.
Always make sure your files are backed up.

“That way, if they become compromised in a ransomware attack, you can wipe your disk drive clean and restore the data from the backup. Using Cloud storage with anti-virus scanning abilities to share files will help users to mitigate any possible threats,” suggested Anand Ramamoorthy, Managing Director, South Asia, McAfee.

Remember this: “WannaCrypt” probably won"t work across the internet for PCs behind a firewall or router.

“But if a server is connected directly to the internet or a PC is on the same network as an infected computer, it can spread quickly — which is exactly what has happened,” the Engadget report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 12,2020

New Delhi, Jun 12: The Supreme Court on Friday asked Solicitor General Tushar Mehta to convene a meeting of the Finance Ministry and RBI officials over the weekend to decide whether interest incurred on EMIs during the moratorium period can be charged by banks.

A bench comprising Justices Ashok Bhushan, Sanjay Kishan Kaul and M.R. Shah queried Mehta as the court was concerned since the Centre has deferred loan for three months.

"Then how can interest of these 3 months be added?" the apex bench asked. Mehta replied: "I need to sit down with the RBI officials and have a meeting."

SBI's counsel, senior advocate Mukul Rohatgi, intervened during the proceedings and said "all banks are of the view that interest cannot be waived for a six month EMI moratorium period".

"We need to discuss it with the RBI," insisted Rohatgi.

Justice Bhushan then asked Mehta to convene a meeting of the RBI and Finance Ministry officials over the weekend, and listed the matter for further hearing on June 17.

The top court, during the hearing, indicated that it was not considering a complete waiver of interest but was only concerned that postponement of interest shouldn't accrue further interest on it.

After the RBI said the waiver of interest charges on EMIs during moratorium will lead to loss of 1 per cent of the nation's GDP, the top court had earlier asked the Finance Ministry to reply, whether the interest could be waived or it would continue during the moratorium period.

The top court said these are not normal times, and it is a serious issue, as on one hand moratorium is granted and then, the interest is charged on loans during this period.

"There are two issues in this (matter). No interest during the moratorium period and no interest on interest," said Justice Bhushan. The observation from the bench came on a petition by Gajendra Sharma, in which he sought a direction to declare portion of the RBI's March 27 notification as ultra vires to the extent it charged interest on the loan amount during the moratorium period.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 19,2020

Denser places, assumed by many to be more conducive to the spread of the coronavirus that causes COVID-19, are not linked to higher infection rates, say researchers.

The study, led by Johns Hopkins University, published in the Journal of the American Planning Association, also found that dense areas were associated with lower COVID-19 death rates.

"These findings suggest that urban planners should continue to practice and advocate for compact places rather than sprawling ones, due to the myriad well-established benefits of the former, including health benefits," says study lead author Shima Hamidi from Johns Hopkins Bloomberg School of Public Health in the US.

For their analysis, the researchers examined SARS-CoV-2 infection rates and COVID-19 death rates in 913 metropolitan counties in the US.

When other factors such as race and education were taken into account, the authors found that county density was not significantly associated with county infection rate.

The findings also showed that denser counties, as compared to more sprawling ones, tended to have lower death rates--possibly because they enjoyed a higher level of development including better health care systems.

On the other hand, the research found that higher coronavirus infection and COVID-19 mortality rates in counties are more related to the larger context of metropolitan size in which counties are located.

Large metropolitan areas with a higher number of counties tightly linked together through economic, social, and commuting relationships are the most vulnerable to the pandemic outbreaks.

According to the researchers, recent polls suggest that many US citizens now consider an exodus from big cities likely, possibly due to the belief that more density equals more infection risk.

Some government officials have posited that urban density is linked to the transmissibility of the virus.

"The fact that density is unrelated to confirmed virus infection rates and inversely related to confirmed COVID-19 death rates is important, unexpected, and profound," said Hamidi.

"It counters a narrative that, absent data and analysis, would challenge the foundation of modern cities and could lead to a population shift from urban centres to suburban and exurban areas," Hamidi added.

The analysis found that after controlling for factors such as metropolitan size, education, race, and age, doubling the activity density was associated with an 11.3 per cent lower death rate.

The authors said that this is possibly due to faster and more widespread adoption of social distancing practices and better quality of health care in areas of denser population.

The researchers concluded that a higher county population, a higher proportion of people age 60 and up, a lower proportion of college-educated people, and a higher proportion of African Americans were all associated with a greater infection rate and mortality rate.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.