TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Report shows HSE (Irish Health Service) hacked by malicious Excel file [pdf]

84 点作者 paradaux超过 3 年前

3 条评论

paradaux超过 3 年前
This report was released 9 days ago, this hack was widely discussed on HN when it happened (<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=27152402" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=27152402</a>) and I thought the formal postmortem would be of interest !
comex超过 3 年前
&gt; On the same day, the Attacker posted a link to a key that would decrypt files encrypted by the Conti ransomware. [..] Without the decryption key, it is unknown whether systems could have been recovered fully [..] but it is highly likely that the recovery timeframe would have been considerably longer.<p>Is the implication that they paid the ransom?<p>The report seems to go out of its way to avoid stating <i>why</i> the attacker posted the decryption key.
评论 #29531383 未加载
评论 #29533297 未加载
评论 #29530912 未加载
coldcode超过 3 年前
As usual people ignore messages that basically told them what was happening. Reminds me of the Target hack where they installed some anti hacking system which immediately tossed out warnings which seemed excessive so they turned it off for a few months.<p>But security is an expense and people don&#x27;t like paying money.<p>A financial company I worked for in mid 2000&#x27;s decided the only thing they needed to do was buy some encryption for the disks their databases ran on, which of course would do nothing to keep someone from just using SQL to extract all our customers credit card data.
评论 #29532312 未加载