LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 05-14-2017, 08:26 AM   #31
syg00
LQ Veteran
 
Registered: Aug 2003
Location: Australia
Distribution: Lots ...
Posts: 15,638

Rep: Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091Reputation: 2091

Quote:
Originally Posted by 273 View Post
Otherwise they'll get away with it or be hired by their government.
lol - the world is full of skeptics.

A few years ago ago I was at a Linux conference (significantly) sponsored by a department of our federal government that was/is a member of the infamous Echelon cartel. Few seemed to mind.
I still have a stubbie cooler with the catch phrase "play the game no one else can".
 
Old 05-14-2017, 09:20 AM   #32
SimonDevine
LQ Newbie
 
Registered: Oct 2016
Location: Surrey, UK
Distribution: Slack 14.2 64 using KDE on i3 box
Posts: 7

Rep: Reputation: 0
I notice that Microsoft are saying there's a Security Patch for this that was released in March. It's striking to note that it's available for those paying for Support of older versions of Windows.

Glad I ditched Windows; I was still on XP as it seemed that upgrades all the time kept changing things just for the sake of it. Windows in any flavour is just not secure on its own.

I'm just a home user but who knows what's coming next?
 
Old 05-14-2017, 10:34 AM   #33
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 5,802

Rep: Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381
Quote:
Originally Posted by grumpyskeptic View Post
I expect that the person or persons who did it will get caught sooner or later and spend a very very long time in prison. So far it appears they have only made a comparatively small amount of money out of it.
i read in one of the articles linked that it's likely that this exploit was written a while ago with private users in mind (hence the relatively small ransom) and the originator probably abandoned it already...
what a surprise to suddenly get that much attention...

Quote:
Originally Posted by 273 View Post
Only if they're in the extradition zones for the countries affected.
yep, if i was that person i'd start packing
 
Old 05-14-2017, 11:06 AM   #34
ilesterg
Member
 
Registered: Jul 2012
Distribution: Arch, Debian, and CentOS/RHEL
Posts: 539

Rep: Reputation: 56
So how was your weekend? We *nix guys spent our weekend enjoying the summer, basking in the sun..while our Wintel sys ads spent their time at work, attending calls here and there.
 
Old 05-14-2017, 11:13 AM   #35
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 6,669

Rep: Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911
Quote:
Originally Posted by ondoho View Post
yep, if i was that person i'd start packing
No reason to assume they don't live outside of the extradition zone already. The internet is global and the extraditions zones not so much. This could just be some idiots in the UK, US or elsewhere in the extradition zone but if they've any intelligence at all they'll be based somewhere outside and nobody will ever look for them.
 
Old 05-14-2017, 11:20 AM   #36
hazel
Senior Member
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: Debian, Crux, LFS, AntiX, NuTyX
Posts: 1,106

Original Poster
Rep: Reputation: 521Reputation: 521Reputation: 521Reputation: 521Reputation: 521Reputation: 521
Well, it's unlikely to be the Russians this time. Apparently Russia was the country worst hit, and some think it was the real target. What happened to everyone else was just collateral damage.

The problem is that the online world is now so hyperconnected that any spreading malware "puts a girdle round the earth in 90 minutes".
 
Old 05-14-2017, 11:24 AM   #37
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 6,669

Rep: Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911Reputation: 1911
Not Russia still leaves any African country, many middle-eastern and Asian countries, much of South America and many other non-treaty-signing nations. As you point out the internet encompasses the globe.
 
Old 05-14-2017, 11:29 AM   #38
fatmac
Senior Member
 
Registered: Sep 2011
Location: Upper Hale, Surrey/Hants Border, UK
Distribution: AntiX.
Posts: 1,826

Rep: Reputation: Disabled
Back to central servers & terminals, that's the way to go, too much freedom had been given to end users, something was bound to go wrong some day - but we should never have been using Microsoft products in the first place, we should have been using a version of unix from the start!
 
Old 05-14-2017, 11:44 AM   #39
hazel
Senior Member
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: Debian, Crux, LFS, AntiX, NuTyX
Posts: 1,106

Original Poster
Rep: Reputation: 521Reputation: 521Reputation: 521Reputation: 521Reputation: 521Reputation: 521
Two things really worry me about this. The first is that everything now depends on the backup policies of the affected organisations. WannaCry eventually deletes encrypted data if the ransom is not paid. Everything that has been backed up can easily be restored, but given the famously ramshackle IT policies of the NHS, how much confidence can we have in their backups? If a large amount of patient data simply disappears for good, then lives are going to be lost.

Secondly, the speed with which it spread and the indiscriminate nature of the damage is worrying. It need not have been ransomware after all; suppose it had been something like stuxnet that targeted infrastructure?
 
Old 05-14-2017, 12:24 PM   #40
SimonDevine
LQ Newbie
 
Registered: Oct 2016
Location: Surrey, UK
Distribution: Slack 14.2 64 using KDE on i3 box
Posts: 7

Rep: Reputation: 0
Quote:
Originally Posted by fatmac View Post
Back to central servers & terminals, that's the way to go, too much freedom had been given to end users, something was bound to go wrong some day - but we should never have been using Microsoft products in the first place, we should have been using a version of Unix from the start!
As you rightly intimate, Permissions needs to become a Serious part of ALL operating systems. The Internet Gateways need serious locking down & the Mail Servers need to be better at scanning attachments & embedded links to anything. If mail processing is slowed because of tight security then so be it. We are all a bit too accustomed to instant communication but perhaps it's time to sacrifice speedy gratification for a bit of safety.

I don't think we can go back to Terminals & Central Servers setup. The Genie got let out of the bottle a long time ago and he's grown too big to cram back in. Also, in order to run some applications on the server for a big organisation, you'd need something approaching a Cray as the server.

Nice idea, but we've gone way too far down the powerful desktop road to be able to turn back. Let's see how MS plan to cope with this as a clear & present danger.

Last edited by SimonDevine; 05-14-2017 at 02:24 PM.
 
Old 05-14-2017, 12:35 PM   #41
DavidMcCann
Senior Member
 
Registered: Jul 2006
Location: London
Distribution: CentOS, Salix
Posts: 4,476

Rep: Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401Reputation: 1401
I see a lot of organisations are actually paying the ransom. Do they not have backups? Probably not!
 
Old 05-14-2017, 12:49 PM   #42
SimonDevine
LQ Newbie
 
Registered: Oct 2016
Location: Surrey, UK
Distribution: Slack 14.2 64 using KDE on i3 box
Posts: 7

Rep: Reputation: 0
Quote:
Originally Posted by DavidMcCann View Post
I see a lot of organisations are actually paying the ransom. Do they not have backups? Probably not!
Agreed. There's way too much complacency out there. XP is the main problem here, so far as I see. I used XP from 2004 to October last year. I had three major events so decided it was time to get safe so went Slacking.

The trouble is that IT has become so ubiquitous and people don't realise how open Windows still is. It is a bit of a rude awakening, but it's my sincere hope that ordinary working people start to recognise that computing is much more than the on/off switch on the box.
 
Old 05-14-2017, 02:38 PM   #43
Soadyheid
Senior Member
 
Registered: Aug 2010
Location: Near Edinburgh, Scotland
Distribution: Cinnamon Mint 17.3 and 18 at present.
Posts: 1,249

Rep: Reputation: 267Reputation: 267Reputation: 267
Is it just me or during times of cutbacks and austerity purges, it always appears to be the IT sections that are culled first?

Maybe this will draw attention to the fact that IT's not just an easy target for saving money when hard times hit.

Play Bonny!

 
Old 05-14-2017, 04:41 PM   #44
ardvark71
LQ Veteran
 
Registered: Feb 2015
Location: Oregon, USA
Distribution: Lubuntu 14.04, Windows Vista
Posts: 6,276
Blog Entries: 3

Rep: Reputation: 835Reputation: 835Reputation: 835Reputation: 835Reputation: 835Reputation: 835Reputation: 835
Hi all...

I know there are a few folks here (like myself) who still own systems that run Windows XP. For those interested, Microsoft has released a patch for this particular piece of Malware here. There is also the Microsoft page concerning this (along with the SP3 and other patches) here.

Regards...

Last edited by ardvark71; 05-14-2017 at 05:03 PM. Reason: Correction/Added information and link.
 
Old 05-14-2017, 05:30 PM   #45
KennyIRC
LQ Newbie
 
Registered: May 2017
Posts: 4

Rep: Reputation: Disabled
Quote:
Originally Posted by ardvark71 View Post
Hi all...

I know there are a few folks here (like myself) who still own systems that run Windows XP. For those interested, Microsoft has released a patch for this particular piece of Malware here. There is also the Microsoft page concerning this (along with the SP3 and other patches) here.

Regards...
From what I read online, the patch is good for those machines that hasn't been hit by the ransomware virus yet. It's too late for the infected machines.

I was reading a NY Times article, the ransomware virus attack began as a simple phishing email.

Too bad there is no patch or technlogy to stop the stupidity of people still clicking on links in emails.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Locky Ransomware Spreading in Massive Spam Attack LXer Syndicated Linux News 0 03-17-2016 06:32 PM
Hackers warn NHS over security Jeebizz Linux - News 1 06-10-2011 08:57 AM
LXer: Schools and the NHS: does Linux even get a look in? LXer Syndicated Linux News 0 07-21-2010 02:00 PM
Microsoft to keep our NHS records? sycamorex General 1 08-10-2009 07:17 PM
LXer: Novell starts work on NHS contract LXer Syndicated Linux News 0 12-19-2005 05:16 AM


All times are GMT -5. The time now is 05:10 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration