TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

WannaCry – New Variants Detected

265 点作者 remx大约 8 年前

23 条评论

yardstick大约 8 年前
Anyone know someone at the Tor Project? Based on a breakdown I read, it downloads the Tor client from <a href="https:&#x2F;&#x2F;dist.torproject.org&#x2F;torbrowser&#x2F;6.5.1&#x2F;tor-win32-0.2.9.10.zip" rel="nofollow">https:&#x2F;&#x2F;dist.torproject.org&#x2F;torbrowser&#x2F;6.5.1&#x2F;tor-win32-0.2.9...</a><p>It would be simple to rename this link (or perform a referer check or something else to stop automated downloads), at least temporarily.<p>Yes, the malware authors will release an update with the different URL (or another hosting site entirely, or embedded), but at least it would provide time for vulnerable users to install patches. Especially now that Microsoft has released a patch for XP.<p>(I&#x27;m basing this URL info on the breakdown found at <a href="https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;wannacry-wana-decryptor-wanacrypt0r-technical-nose-dive&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;wannacry-wana...</a>)
评论 #14343605 未加载
rhubarbcustard大约 8 年前
What&#x27;s special about WannaCry that has made this such a widespread thing? I presume there&#x27;s has been plenty of malware for a while that can propagate itself around a network of unpatched old Windows machines and people have been trying to get users to clicks on emails to infect themselves for years.<p>So why now? What&#x27;s so special now?
评论 #14338012 未加载
评论 #14337915 未加载
评论 #14337826 未加载
评论 #14341859 未加载
评论 #14340396 未加载
评论 #14337631 未加载
评论 #14338054 未加载
rnhmjoj大约 8 年前
I don&#x27;t get it: why are the using using many fake but valid domains? Wouldn&#x27;t a non-existing TLD do exactly the same thing while being impossible to register by anyone trying to stop the malware?
评论 #14338450 未加载
评论 #14337823 未加载
评论 #14337634 未加载
评论 #14337755 未加载
评论 #14337586 未加载
sonium大约 8 年前
I really am a bit puzzeled by the killswitches. Why does WannaCry have this functionality in the first place? It sounds almost ironically like a hollywood villain mistake.
评论 #14337740 未加载
评论 #14337618 未加载
评论 #14337597 未加载
评论 #14337839 未加载
excalibur大约 8 年前
&gt; A new variant with no kill-switch recovered by Kaspersky as a virustotal.com upload — not detected in the Wild.<p>Uploaded to virustotal MEANS found in the wild. That&#x27;s what admins do when they discover things.
评论 #14337443 未加载
评论 #14338341 未加载
评论 #14337734 未加载
btown大约 8 年前
Could a grey hat create a self propagating but non-ransoming variant that inoculated target machines against its more malicious brethren? Seems like something a state actor might want to do.
评论 #14340369 未加载
评论 #14340150 未加载
评论 #14339726 未加载
acd大约 8 年前
These systems would be better of security wise if they would use the latest open source operating system including the embedded code. The damage this will cause to embedded systems is distasteful.
评论 #14337218 未加载
评论 #14337260 未加载
nthcolumn大约 8 年前
How does &#x27;Patient A&#x27; get wcry2? Phishing? Via internet facing open 445&#x2F;3389?
评论 #14337027 未加载
评论 #14337294 未加载
daxfohl大约 8 年前
Could the 51% &quot;bug&quot; in bitcoin actually be used to an advantage here? A 51% vote to invalidate all these transactions? I assume it doesn&#x27;t work like that but figured I would ask.
评论 #14338844 未加载
评论 #14338825 未加载
nathan_f77大约 8 年前
I think it&#x27;s hilarious how these &quot;kill switches&quot; are supposedly meant to detect sandboxes, to make it harder for security researchers to analyze the malware. While actually making it easy for security researchers to completely disable all installations around the entire world.<p>That&#x27;s just what I heard, but it makes sense. There are far more sane ways to implement a kill switch without using unregistered domains. (For instance, using a registered domain.)
评论 #14338900 未加载
MilnerRoute大约 8 年前
Two researchers said they found a variant with a kill switch.<p><a href="https:&#x2F;&#x2F;motherboard.vice.com&#x2F;en_us&#x2F;article&#x2F;round-two-wannacry-ransomware-that-struck-the-globe-is-back" rel="nofollow">https:&#x2F;&#x2F;motherboard.vice.com&#x2F;en_us&#x2F;article&#x2F;round-two-wannacr...</a>
评论 #14338466 未加载
theincredulousk大约 8 年前
Why would they keep releasing it, and release it in the first place, with such a simple kill-switch. Doesn&#x27;t make much sense.<p>Reminds me of the Archer episode where Cyril plants the computer virus and was going to be the hero by &quot;fixing&quot; it.
评论 #14337329 未加载
评论 #14337330 未加载
nebula大约 8 年前
I am trying to understand impact of crypto currency. Sorry for my ignorance, and or impertinence. 1. Is it possible to run such large scale ransom demands without cryptocurrency? 2. Do we know if the attacker is using a single BTC wallet, or if ransoms are being collected in a distributed fashion. 3. Is it possible for BTC n&#x2F;w to hijack BTCs going to the ransom wallet(s). That is to say collectively overwrite&#x2F;override the transactions and may be reroute the coins to some non-profit wallet? I know it will be a very bad precedent, but I am trying to understand if it is technically possible.
评论 #14339196 未加载
bubblethink大约 8 年前
This makes me think of a different kind of a kill-switch. What if the OS itself is required to have a kill-switch that triggers once it goes out of support, and it prevents regular use unless the admin goes through some serious hoops to override. It at least squarely puts the blame on 1) Orgs that willfully override v&#x2F;s passively ignoring to update 2) OS vendors who have really short support cycles (~1 year for most android phones)
评论 #14339686 未加载
blaqkangel大约 8 年前
We were warned this would happen but it&#x27;s interesting to me that we have detected new variants that include the same type of naive kill switch. I&#x27;m not well versed in information security, so my question is whether this means attackers tried another wave by simply changing the kill switch domain or were there several variants used for the initial attack?
sinaa大约 8 年前
Are these new variants new compiles?<p>Is it possible that multiple variants with randomly-generated kill-switches are being automatically generated?
kul_大约 8 年前
Is there analysis on what encryption algorithm was being used? And how the payment confirmation switch works on the malware.<p>Is it possible instead of patching the OS, to release a patch which patches the malware binary to no-op the payment switch?
sengork大约 8 年前
I would like to know whether the decrypted data can be trusted again in case the contents have been somewhat changed. Then again it is much better than not having any data at all in some cases...
Animats大约 8 年前
If they attach this to a new exploit, instead of an old one that targets Windows XP, there&#x27;s going to be a real problem.
评论 #14337263 未加载
评论 #14337194 未加载
alanfalcon大约 8 年前
Just wait until this hits the files of a Russian mob who then take some Americans hostage and fly to China and end up entangled in an islamic terrorist plot. &#x27;Cause then we&#x27;re in for a very long and drawn out story involving MI6, the CIA, Canadian smuggling routes, and Christian Isolationist 2nd Amendment fanatics.
评论 #14337160 未加载
评论 #14337174 未加载
rurban大约 8 年前
They will get them following the payments soon enough.
thewarrior大约 8 年前
Who is doing this knowing fully well that GHCQ , FBI and possibly even the NSA are hard at work trying to get them ?<p>These people are going down . No doubt about it.
评论 #14337130 未加载
评论 #14337177 未加载
评论 #14337071 未加载
评论 #14337212 未加载
评论 #14337067 未加载
Sir_Cmpwn大约 8 年前
Maybe it would be better to wait until the attackers registered the domain, then sopoeana the registrair for their account info.
评论 #14337095 未加载
评论 #14337087 未加载
评论 #14337091 未加载