Ransomware threat: Get patched, find a firewall or upgrade fast

May 15, 2017

New Delhi, May 15: It was coming. On March 14 this year, Microsoft released a security update which addressed the vulnerability in the 16-year-old Windows XP operating system that the hackers behind the massive ransomware attack exploited and created havoc in 150 countries.

wannacry

The vulnerability in the Microsoft Windows software — exploited by “WannaCrypt” — crippled computers from hospitals in Britain to police stations in India, with hackers demanding hundreds of dollars from the users for them to regain control over their data.

Once Microsoft released the patch for the vulnerability — exploited by hacker group “Shadow Brokers” after stealing a software from the US National Security Agency (NSA) — some Window XP users installed the update called “Microsoft Security Bulletin MS17-010” on their desktops and laptops.

But several didn"t.

There are nearly 150 million computers running Windows XP operation system globally. Those who didn"t pay heed to the Windows XP patch are the ones who have fallen prey to the world"s biggest ransomware attack.

Microsoft which had discontiued security updates to its out-of-date software, has also provided a security update for all customers using Windows 8 and Windows Server 2003, anticipating further attacks on these earlier platforms being used by millions.

According to the company, “customers who are running supported versions of the operating system (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016) will have received the security update MS17-010 in March.

“If customers have automatic updates enabled or have installed the update, they are protected. For other customers, we encourage them to install the update as soon as possible,” said Phillip Misner, Principal Security Group Manager, Microsoft Security Response Centre, in a statement.

Meanwhile, “WannaCrypt” locked up machines, encrypted files and demanded approximately $600 in Bitcoin for a recovery key.

According to global cyber security firms, paying heed to updates can only save your data from being put to ransom.

“Install the official patch from Microsoft that closes the vulnerability used in the attack. Ensure that security solutions are switched on all nodes of the network. If Kaspersky Lab"s solution is used, ensure that it includes the "System Watcher", a behavioural proactive detection component and that it is switched on,” Altaf Halde, Managing Director of Kaspersky Lab (South Asia), told.

“Run the "Critical Area Scan" task in Kaspersky Lab"s solution to detect possible infection as soon as possible (otherwise it will be detected automatically, if not switched off, within 24 hours),” he added.

According to Subhendu Sahu, Acting Country Manager for India, FireEye, the ransomware poses high risks to organisations using potentially vulnerable Windows machines.

“We can certainly expect follow-on attacks. Organisations seeking to take risk management steps related to this campaign should install the latest Windows patches. They should also use the indicators of compromise which are associated with this activity. FireEye has also taken steps to help secure its customers,” Sahu told.

As investigators were working to track down those responsible for the ransomware attack, Microsoft President and Chief Legal Officer Brad Smith said the governments should treat this attack as a “wake-up call”.

The news led software security providers to ramp up anti-malware software.

“Upon learning of these incidents, McAfee quickly began working to analyse samples of the ransomware and develop mitigation guidance and detection updates for its customers. McAfee has subsequently provided DAT (that contain data in text or binary format) updates to all its customers and provided them and the public further analysis on the attacks,” Ian Yip, Chief Technology Officer, Asia Pacific, McAfee, told.

If you are a home Windows XP user, patch immediately follow up with an upgrade. If you are running a vulnerable system and cannot install the patch for some reason, try doing the following:

“Disable SMBv1 (a server component) with the steps documented at "Microsoft Knowledge Base Article 2696547" and as recommended previously. Consider adding a rule on your router or firewall to block incoming Server Message Block (SMB) traffic on port 445,” said a report in the technology website Engadget.

“This is big and set to get bigger. We haven"t seen anything like this since Conficker in 2008,” Amit Nath, Head of Asia Pacific-Corporate Business at cyber security firm F-Secure Corporation, told IANS.

The Conficker worm infected millions of computers including government, business and home computers in over 190 countries.
Always make sure your files are backed up.

“That way, if they become compromised in a ransomware attack, you can wipe your disk drive clean and restore the data from the backup. Using Cloud storage with anti-virus scanning abilities to share files will help users to mitigate any possible threats,” suggested Anand Ramamoorthy, Managing Director, South Asia, McAfee.

Remember this: “WannaCrypt” probably won"t work across the internet for PCs behind a firewall or router.

“But if a server is connected directly to the internet or a PC is on the same network as an infected computer, it can spread quickly — which is exactly what has happened,” the Engadget report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 16,2020

Claiming that e-commerce giants like Amazon import as much as 80 per cent of the items sold on their platforms, small manufacturers' body has said that their business models do not benefit local industry and are creating jobs of delivery boys only.

"Neither manufacturers nor traders are getting any benefit from the business models of Amazon and Flipkart because they largely import their products from China and Korea and sell here. Nearly 80 per cent of their products are imported," said Anil Bhardwaj, Secretary General, Federation of Indian Micro and Small & Medium Enterprises (FISME).

Bhardwaj said that the global e-commerce players generally source and sell products through their own preferred suppliers and as a result a large number of local manufacturers and traders get crowded out.

He listed out deep discounting and buying products from preferred companies as unfair practices.

"Even if they buy products from local suppliers the commission charged is very high," Bhardwaj said adding that the issues related to unfair practices have been raised with Commerce Ministry on multiple occasions.

FISME maintains that the technology-driven retail is way forward and one cannot be oblivious of the benefits it brings to consumers but at the same time the local industry can also not be ignored given its role in job creation.

"If both traders and local manufacturers are crowded out then how would the local industry survive and employment be generated?" asked Bhardwaj.

As Amazon Founder and CEO Jeff Bezos is currently on his three-day visit to India, the local traders are up in arms against the "unfair" trade practices of the tech giant. Delhi-based Confederation of All India Traders (CAIT) has launched a countrywide protest against the company and has organised protests across 300 cities.

In a setback to Amazon and Walmart-backed Flipkart, the fair market watchdog Competition Commission of India (CCI) has ordered probe into the business operations of both the companies on multiple counts including deep-discounts and exclusive tie-up with preferred sellers.

"For the first time some concrete step has been taken against Amazon and Flipkart who are continuously violating the FDI policy in indulging in a vicious racket of controlling and monopolising not only the e-commerce but even the retail trade as well," CAIT National Secretary General Praveen Khandelwal said after the CCI order.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 5,2020

San Francisco, Feb 5: After a German artist, Simon Weckert, demonstrated how he "hacked" Google Maps with 99 smartphones and a wagon to create "virtual traffic jams" on the streets of Berlin, Google responded to the incident saying it "appreciates" creative use of maps.

Admitting that it has not quite cracked travelling by wagon, the tech giant also hinted that it might use cases like this to improve how its maps work.

"We appreciate seeing creative uses of Google Maps like this as it helps us make maps work better over time," 9to5Google quoted a Google spokesperson as saying.

In a YouTube video, Weckert showed that he put 99 smartphones with Google Maps onto a small wagon cart and then wheeled that cart around various streets in Berlin, including outside the Google office, Android Authority reported on Monday.

The smartphones "apparently fooled Google Maps" into thinking that there was a high concentration of users on those streets.

Because the second-hand phones were in a cart, Maps was further tricked into believing that the traffic was slow-moving.

As a result, the navigation app started showing virtual traffic jams by turning green streets to red in the online navigational tool, showcasing how digital technology can have a real impact on the real world.

"Traffic data in Google Maps is refreshed continuously thanks to information from a variety of sources, including aggregated anonymised data from people who have location services turned on and contributions from the Google Maps community," the Google spokesperson said.

"We've launched the ability to distinguish between cars and motorcycles in several countries including India, Indonesia and Egypt, though we haven't quite cracked travelling by wagon," the statement added. After a German artist, Simon Weckert, demonstrated how he "hacked" Google Maps with 99 smartphones and a wagon to create "virtual traffic jams" on the streets of Berlin, Google responded to the incident saying it "appreciates" creative use of maps.

Admitting that it has not quite cracked travelling by wagon, the tech giant also hinted that it might use cases like this to improve how its maps work.

"We appreciate seeing creative uses of Google Maps like this as it helps us make maps work better over time," 9to5Google quoted a Google spokesperson as saying.

In a YouTube video, Weckert showed that he put 99 smartphones with Google Maps onto a small wagon cart and then wheeled that cart around various streets in Berlin, including outside the Google office, Android Authority reported on Monday.

The smartphones "apparently fooled Google Maps" into thinking that there was a high concentration of users on those streets.

Because the second-hand phones were in a cart, Maps was further tricked into believing that the traffic was slow-moving.

As a result, the navigation app started showing virtual traffic jams by turning green streets to red in the online navigational tool, showcasing how digital technology can have a real impact on the real world.

"Traffic data in Google Maps is refreshed continuously thanks to information from a variety of sources, including aggregated anonymised data from people who have location services turned on and contributions from the Google Maps community," the Google spokesperson said.

"We've launched the ability to distinguish between cars and motorcycles in several countries including India, Indonesia and Egypt, though we haven't quite cracked travelling by wagon," the statement added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.