Leave a security exploit in Winblows

>leave a security exploit in Winblows
>it gets broken
>the whole fucking planet shuts down

Do you realize how many billions of normies have been led by Kikerosoft like sheep to the slaughter?

Other urls found in this thread:

technet.microsoft.com/en-us/library/security/ms17-010.aspx?f=255&MSPPError=-2147217396
twitter.com/NSFWRedditVideo

what the fuck is this and why do i keep seeing it everywhere?

Ransomware distributed over windows computers by a backdoor discovered by the nsa and published to wikileaks last month. You're welcome.

The believe it was published by The Shadow Brokers, not Wikileaks.

Is it a requirement for """"""""""hacker"""""""""" groups to have fucking stupid, edgelord names?

>a backdoor discovered by the nsa and published to wikileaks last month
let me guess, it requires the user to run an .exe or open a .pdf or run some word macros or get hit by a javascript driveby etc? stop calling it a backdoor when it relies on user input

It's an SMB vulnerability, if your firewall doesn't leave port 445 open you're fine. This is why a lot of WANs like the NHS got hit

It actually does not. All it has to do is for the machine to be connected to an already infected machine over an internal network.

well the name of WannaCry is though.

>A backdoor implemented by the NSA, leaked and made public by hacker edgelords protesting because Trump was mean
ftfy

Trump is gonna be in so much trouble when NHS realises he was behind this.

But that's wrong?

>actually supporting the nsa's behavior

>to be connected to an already infected machine over an internal network
and how did the worm enter this intranet? by magic? i'm not convinced

>fixed a month ago
>people didn't update

>We will have free events for users who are so poor they couldn't pay in 6 months
what a guy

as always, if you secure yourself before it happens, you're safe.

just goes to show how shitty the NHS's IT department his, scary.

Literally a saint

"I registered the domain not knowing what it would do"
Why the fuck wouldn't you sandbox that first?
This dipstick could have made things a fuck ton worse.
He was supposedly smart enough to know how to fine the domain in the code, but not think about repercussions of real worlding that shit.

>implying this isnt an nsa/cia operation

lel

So is this just for W10 ? Also how would they deliver it onto the system and run it without some not knowing it or a RAT? Do you have to be dumb ?

I am unironically convinced of triple letter agency constant evil doing
those pedos need to be replaced

Another fine day for solving mysteries.

Xp and 7

>>leave a security exploit in Winblows
But that's wrong, MS patched it as soon as the leaks happened. The reason so many companies are still affected is because they didn't update their version of Windows (Server). It's literally sysadmin 101 to keep your systems patched, but there's a whole lot of lousy sysadmins in the world.

"Free events"

Here's a timeline for you.
>NSA backdoors and tools for system entry/hijacking get leaked
>some dude creates initial deployment pre-loaded with several IP ranges known or suspected to contain corporations or other large networks
>it crawls through the IPs, launching the tool at them
>any vulnerable machines that are contacted have a worm uploaded and run on them
>worm launches its own copy of NSA tool to spread to every applicable machine on the intranet
>each affected machine generates a random IP range and starts the process anew
>meanwhile, ransomware bundled in worm begins encryption and fugs the system as soon as it's done

thanks for clearing that up

Stop browsing b8 porn sites with shitty streams YOU FUCKING NEET LOSER.

>not updating your systems

...and fully half the patches microsoft has released over the past two years have been fucking malware! There's a reason people aren't fucking updating and it isn't laziness.

>"discovered"

The backdoor was put there and intended for exclusive use of the kikes at the ((((NSA)))) and ((((MOSSAD))))

maybe they want to sound like edgy skids on purpose
I mean clearly they aren't completely incompetent

AHAHAHAHAHAHAAHAHAHAHAAHAAHAHAHAHAHAHAHAHAAHAHAHAHAAHAAHAHAHAHAHAHAHAHAAHAHAHAHAAHAAHAHAHAHAHAHAHAHAAHAHAHAHAAHAAHAHAHAHAHAHAHAHAAHAHAHAHAAHAAHAHAHAHAHAHAHAHAAHAHAHAHAAHAAHAHAHAHAHAHAHAHAAHAHAHAHAAHAAHAH

Something tells me that this program was a mistake.

The "Contact Us" and the three bitcoin addresses that are hard coded.

>the whole fucking planet shuts down
Britain, wake up, the colonies are long gone, and you are on your deathbed

Windongs 10?
I have Windows 7 updates turn off and encrypted

initial infection is through a person running an infected file on the LAN, right?
Can anyone tell me why this happened in so many places at the same time?

*makes back-up*
heh...nuthing personnel scriptkiddies

I'm basically normie trash when it comes to technical computer shit despite being EE student.

Please explain to me in retard terms how they did this, how long this will last, will they be caught etc etc?

Thanks for your time friends :)

>muh update

What retards like you don't get is that Windows knowingly kept open the exploits so their NSA and CIA buddies can spy on your faggot ass for unlimited amount of time. They release the patch only when it came out in the open to save their faces. God knows how many similar and open exploits are there in Windows.

People like you are the reason why other people have to suffer.

burn MS HQ down when?

>Build $500 million computerized infrastructure
>Uses extremely expensive industrial hardware for various things
>Drivers are closed source.
>Windows update breaks driver, updates have to be disabled.
Something is going to have to be done about this eventually. Usually the bigger and more important the device is the worse the software is. I don't know how to fix it, force anything critical to have open drivers so they can be maintained even if the original company fails or stops supporting the product?

>consumers had 2 month to update
>sysadmins had 2 months to test update and roll it out company wide
>get surprised because exploit is seen in the wild
>Sup Forums loonix user believe this will be the end of Windows

What about just not hanging mission critical systems to the internet?
Then you would need stuxnet levels of dedication for someone to break into your network

>They release the patch only when it came out in the open
They released it a month before. The leaks came out in April and they patched it in March.

>But that's wrong, MS patched it as soon as the leaks happened.
Oh, really? So, how can anyone possibly confirm that? By getting their machine infected? Don't forget that there's no source code.

...

Do you know how old that exploit was? Keep up with news motherfucker.

windows 7 is super vulnerable for it.

malware actually has pretty decent helpdesks

Just scheduling an update for the first time in a year and I get this.

Doesn't matter. Your original statement was wrong and people had 2 months to patch it and they didn't. The exploit was never used in the wild until now.

Thank god I'm on OSX

>So, how can anyone possibly confirm that?
By not having that shit working on post-march machines?

That exploit was leaked by Wikileaks before Trump became president. Try again pajeet!

>The exploit was never used in the wild until now.
That you know of.
Like you ever would.
Remember where it came from.

same with apple

the (((NSA))) and the israelis know all sorts of zero-day exploits, and apple periodically ""update"" the OS and iOS to remove it, only to leave others behind until they release a new update, rinse + repeat

lmao russkies got a taste of their own hacking medicine

Okay. It was never used maliciously until now.

The NSA are the good guys.

This one?
technet.microsoft.com/en-us/library/security/ms17-010.aspx?f=255&MSPPError=-2147217396
It wasn't revealed until April. It was part of the shadow brokers dump.

What?

>on purpose
but for what purpose?

>What about just not hanging mission critical systems to the internet?
>Then you would need stuxnet levels of dedication for someone to break into your network
Most of this kind of stuff needs network access as well, for example a photolab machine I was once fixing a network connected to it. The software to run the machine was XP only, the terminals customers used to print photos had to be on the same network for it to work. The problem was the terminals software required internet access to function. So in the end the old XP machine controlling the printer gets internet access.

>wikileaks
Whoops. Normie gets his facts mixed up

So if the NSA wasn't spying on me, I can't get this shit?

>I will defend the NSA if it means I'm defending Drumpf in any capacity
Has any other president in the last 100 years garnered a cult that thinks they can do no wrong?

>The reason so many companies are still affected is because they didn't update their version of Windows (Server).
So let's change the subject

Why doesn't Microsoft actually fucking protect these older server versions? This planned obsolesce shit has gone too far when innocent people are getting fucked by Microsoft's incompetence

>run compromised malware with wine
>encrypts everything
Hey, at least we have good compatibility now

LMAO

I'm not connected to any network on my win 7, not even a printer, and am about to close some ports. Am I ok? Was never good with security shit

Who the fuck runs WIndows Nigger Emulator, anyway?

>Sup Forumscuckoldry
No.

What did you just said about hackerz bitch?
t. d4rk pen3trator

wasnt the exploit something stupid like
>if u run this exe everyone on ur network will get raped xdxd
how is this anyones fault but the retards clicking random exe files?

Don't must normie Win10 users have the "install updates autonatically" ON by default?

If that's the case they should be fine, right?

Really made me think

because the vulnerability that allows it to fuck a whole network came from the NSA and if they had spoken up it would have been patched years ago

No it can fuck you up even if you didn't click shit. A machine with the smb port open and voila, ur phucced

but how can they run an exe on your computer just from an open port?

>Don't forget that there's no source code.
that's where you're wrong, kiddo.
The exploit was released to everyone.

you forgot to add the russians

Noob

It's for all windows versions starting with xp.

If you're a neet with no friends who only browses the internet on GNU, you're safe. Otherwise, no.

retard

>checking for updates for hours now
>its only been 4 months
>try to visit the catalog page for the specific patch but it hangs when i click it

im fucked

Honestly I think these viruses are overall good for society. In essence I believe these viruses help regulate the average normie's dependence on technology. I would not want treatment from a hospital that has to shut down because their computers are out of commission. If your nurses are too incompetent to write my chart on paper, your doctor's too incompetent to perform surgery without their iPad, and your surgical robots for some godforsaken need Windows XP and an internet connection, then you deserve to get hit by this virus to ground you in reality. It's natural selection, a culling of the lusers.

The public at large has known about this vulnerability since March, that should've been plenty of time for the NHS, et al. to get their shit together.

Can we trace what organizations are being afflicted with WCry? I peronally dont think this is an autoconclusive attack, but just an opening to a bigger attack

>It was never used maliciously until now.
I just want to point something out here. WannaCry was stopped, yes. However, this means very little actually. The exploit used by WannaCry still exists in unpatched machines and has existed for nearly a month before the authors of WannaCry chose to execute it. Other hackers could (and were) using the same vulnerability in completely different attacks. If you were unpatched, you were open to attack by anyone for a whole month. Just because you don't have ransomware on your machine, it does not mean you were not compromised. Also, if you were unknowingly hacked prior to receiving the patch from Microsoft, you will likely remain hacked because of the advanced privileges the exploit allows. Just saying, if you didn't update until now, moniitor your shit very closely, or if in doubt, wipe it out and start new. WannaCry isn't the exploit, WannaCry simply is an example of how the exploit can be used.

You have no idea about anything tech related, do you?
Fucking normie

>NSA needs people to update to their latest backdoor version (now with tracking)
>use their own backdoor to launch shitty ransomware
>everyone freaks out and updates
>a few weeks later the NSA manages to 'recover a bunch of keys' to fix any damage they did

time to backup your files to a couple USB drives and switch to linux

>you were open to attack by anyone for a whole month

No. An exploit doesn't exist only when you are told about it. There a a ton of 0day exploits out there held in secret especially by cyberwarfare companies, criminal groups and government espionage teams.

They go unnoticed and unpatched for months or even years so they can be used to make money and or gain some advantage over competition.

Well I did the update for W7 and blocked 445 TCP as well disabled file printer and sharing on the same port.
So whatever if I get infected I will stop using W7 im already backing up everything to MEGA

sauce?

>windows 7 is super vulnerable for it.
Would they even bother releasing patches for Windows 7?

>windows 7 is super vulnerable for it.

>add firewall rule to block port 445
WOW NOW ITS SUPER INVULNERABLE

fucking fearmongerers

They released XP update that speaks volumes that this was known bug internally.

Or you know, update your fucking pc. Microsoft put a patch out back in March for all OSs back to Vista. Faggot.

Firewall doesn't mean shit, retard.

t. actual retard who doesn't know how shit works