TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WannaCry – New Variants Detected

265 pointsby remxabout 8 years ago

23 comments

yardstickabout 8 years ago
Anyone know someone at the Tor Project? Based on a breakdown I read, it downloads the Tor client from <a href="https:&#x2F;&#x2F;dist.torproject.org&#x2F;torbrowser&#x2F;6.5.1&#x2F;tor-win32-0.2.9.10.zip" rel="nofollow">https:&#x2F;&#x2F;dist.torproject.org&#x2F;torbrowser&#x2F;6.5.1&#x2F;tor-win32-0.2.9...</a><p>It would be simple to rename this link (or perform a referer check or something else to stop automated downloads), at least temporarily.<p>Yes, the malware authors will release an update with the different URL (or another hosting site entirely, or embedded), but at least it would provide time for vulnerable users to install patches. Especially now that Microsoft has released a patch for XP.<p>(I&#x27;m basing this URL info on the breakdown found at <a href="https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;wannacry-wana-decryptor-wanacrypt0r-technical-nose-dive&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;wannacry-wana...</a>)
评论 #14343605 未加载
rhubarbcustardabout 8 years ago
What&#x27;s special about WannaCry that has made this such a widespread thing? I presume there&#x27;s has been plenty of malware for a while that can propagate itself around a network of unpatched old Windows machines and people have been trying to get users to clicks on emails to infect themselves for years.<p>So why now? What&#x27;s so special now?
评论 #14338012 未加载
评论 #14337915 未加载
评论 #14337826 未加载
评论 #14341859 未加载
评论 #14340396 未加载
评论 #14337631 未加载
评论 #14338054 未加载
rnhmjojabout 8 years ago
I don&#x27;t get it: why are the using using many fake but valid domains? Wouldn&#x27;t a non-existing TLD do exactly the same thing while being impossible to register by anyone trying to stop the malware?
评论 #14338450 未加载
评论 #14337823 未加载
评论 #14337634 未加载
评论 #14337755 未加载
评论 #14337586 未加载
soniumabout 8 years ago
I really am a bit puzzeled by the killswitches. Why does WannaCry have this functionality in the first place? It sounds almost ironically like a hollywood villain mistake.
评论 #14337740 未加载
评论 #14337618 未加载
评论 #14337597 未加载
评论 #14337839 未加载
excaliburabout 8 years ago
&gt; A new variant with no kill-switch recovered by Kaspersky as a virustotal.com upload — not detected in the Wild.<p>Uploaded to virustotal MEANS found in the wild. That&#x27;s what admins do when they discover things.
评论 #14337443 未加载
评论 #14338341 未加载
评论 #14337734 未加载
btownabout 8 years ago
Could a grey hat create a self propagating but non-ransoming variant that inoculated target machines against its more malicious brethren? Seems like something a state actor might want to do.
评论 #14340369 未加载
评论 #14340150 未加载
评论 #14339726 未加载
acdabout 8 years ago
These systems would be better of security wise if they would use the latest open source operating system including the embedded code. The damage this will cause to embedded systems is distasteful.
评论 #14337218 未加载
评论 #14337260 未加载
nthcolumnabout 8 years ago
How does &#x27;Patient A&#x27; get wcry2? Phishing? Via internet facing open 445&#x2F;3389?
评论 #14337027 未加载
评论 #14337294 未加载
daxfohlabout 8 years ago
Could the 51% &quot;bug&quot; in bitcoin actually be used to an advantage here? A 51% vote to invalidate all these transactions? I assume it doesn&#x27;t work like that but figured I would ask.
评论 #14338844 未加载
评论 #14338825 未加载
nathan_f77about 8 years ago
I think it&#x27;s hilarious how these &quot;kill switches&quot; are supposedly meant to detect sandboxes, to make it harder for security researchers to analyze the malware. While actually making it easy for security researchers to completely disable all installations around the entire world.<p>That&#x27;s just what I heard, but it makes sense. There are far more sane ways to implement a kill switch without using unregistered domains. (For instance, using a registered domain.)
评论 #14338900 未加载
MilnerRouteabout 8 years ago
Two researchers said they found a variant with a kill switch.<p><a href="https:&#x2F;&#x2F;motherboard.vice.com&#x2F;en_us&#x2F;article&#x2F;round-two-wannacry-ransomware-that-struck-the-globe-is-back" rel="nofollow">https:&#x2F;&#x2F;motherboard.vice.com&#x2F;en_us&#x2F;article&#x2F;round-two-wannacr...</a>
评论 #14338466 未加载
theincredulouskabout 8 years ago
Why would they keep releasing it, and release it in the first place, with such a simple kill-switch. Doesn&#x27;t make much sense.<p>Reminds me of the Archer episode where Cyril plants the computer virus and was going to be the hero by &quot;fixing&quot; it.
评论 #14337329 未加载
评论 #14337330 未加载
nebulaabout 8 years ago
I am trying to understand impact of crypto currency. Sorry for my ignorance, and or impertinence. 1. Is it possible to run such large scale ransom demands without cryptocurrency? 2. Do we know if the attacker is using a single BTC wallet, or if ransoms are being collected in a distributed fashion. 3. Is it possible for BTC n&#x2F;w to hijack BTCs going to the ransom wallet(s). That is to say collectively overwrite&#x2F;override the transactions and may be reroute the coins to some non-profit wallet? I know it will be a very bad precedent, but I am trying to understand if it is technically possible.
评论 #14339196 未加载
bubblethinkabout 8 years ago
This makes me think of a different kind of a kill-switch. What if the OS itself is required to have a kill-switch that triggers once it goes out of support, and it prevents regular use unless the admin goes through some serious hoops to override. It at least squarely puts the blame on 1) Orgs that willfully override v&#x2F;s passively ignoring to update 2) OS vendors who have really short support cycles (~1 year for most android phones)
评论 #14339686 未加载
blaqkangelabout 8 years ago
We were warned this would happen but it&#x27;s interesting to me that we have detected new variants that include the same type of naive kill switch. I&#x27;m not well versed in information security, so my question is whether this means attackers tried another wave by simply changing the kill switch domain or were there several variants used for the initial attack?
sinaaabout 8 years ago
Are these new variants new compiles?<p>Is it possible that multiple variants with randomly-generated kill-switches are being automatically generated?
kul_about 8 years ago
Is there analysis on what encryption algorithm was being used? And how the payment confirmation switch works on the malware.<p>Is it possible instead of patching the OS, to release a patch which patches the malware binary to no-op the payment switch?
sengorkabout 8 years ago
I would like to know whether the decrypted data can be trusted again in case the contents have been somewhat changed. Then again it is much better than not having any data at all in some cases...
Animatsabout 8 years ago
If they attach this to a new exploit, instead of an old one that targets Windows XP, there&#x27;s going to be a real problem.
评论 #14337263 未加载
评论 #14337194 未加载
alanfalconabout 8 years ago
Just wait until this hits the files of a Russian mob who then take some Americans hostage and fly to China and end up entangled in an islamic terrorist plot. &#x27;Cause then we&#x27;re in for a very long and drawn out story involving MI6, the CIA, Canadian smuggling routes, and Christian Isolationist 2nd Amendment fanatics.
评论 #14337160 未加载
评论 #14337174 未加载
rurbanabout 8 years ago
They will get them following the payments soon enough.
thewarriorabout 8 years ago
Who is doing this knowing fully well that GHCQ , FBI and possibly even the NSA are hard at work trying to get them ?<p>These people are going down . No doubt about it.
评论 #14337130 未加载
评论 #14337177 未加载
评论 #14337071 未加载
评论 #14337212 未加载
评论 #14337067 未加载
Sir_Cmpwnabout 8 years ago
Maybe it would be better to wait until the attackers registered the domain, then sopoeana the registrair for their account info.
评论 #14337095 未加载
评论 #14337087 未加载
评论 #14337091 未加载