South Korean Company Nayana to Pay $1 million in Bitcoin After Ransomware Attack

>Ransomware has seeing an increasing amount of interest in the tech world, motivated not only by the increase in number and severity of attacks, but also by the fact that some companies do elect to pay the demands. In this case, Nayana, a South Korean web hosting provider, announced it is in the process of paying a three-tier ransom demand of nearly $1 million worth of Bitcoin. This decision comes following a ransomware infection that encrypted data on customer' servers. The company said 153 Linux servers were affected, servers which stored the information of more than 3,400 customers.

techpowerup.com/234553/south-korean-company-nayana-to-pay-usd-1-million-in-bitcoin-after-ransomware-attack

@

Where is your God now, freetards?

Other urls found in this thread:

download.wsusoffline.net/
twitter.com/SFWRedditVideos

This is what you get for not keeping software up to date.
Even on Linux.

why dont they just guess each number and letter
combination until they get the key

No one has ever claimed GNU/Linux is immune to malware. It is less likely to suffer from it when used as a home PC OS, but servers and corporate applications are prime targets for malware regardless of operating system.

Funnily enough, this wasn't even GNU/Linux's fault. Nayana was running MULTIPLE things that were TEN YEARS out of date. If they had updated even one time in the last 10 years this could have been avoided.

Oh but WannaCry is fine even though it's literally the exact same story? HAHAHAHAHAHA

Must sting twice as bad, knowing that the ransomers are most likely North Korean.

>"NAYANA's website runs on Linux kernel 2.6.24.2, which was compiled back in 2008. [...] Additionally, NAYANA's website uses Apache version 1.3.36 and PHP version 5.1.4, both of which were released back in 2006. Apache vulnerabilities and PHP exploits are well-known;[...]. The version of Apache NAYANA used is run as a user of nobody(uid=99), which indicates that a local exploit may have also been used in the attack."

This is where they went wrong. Make sure you're keeping your software up-to-date.

Up to date Windows also wasn't affected by Wannacry, dumbass freetard.

>No one has ever claimed GNU/Linux is immune to malware.

>2008

idiots

that's if you keep your system up to date, which isn't the same story with windows

>Up to date Windows also wasn't affected by Wannacry

that has nothing to do with what he said.

The longer your software is out of date, the higher the chance of running into an exploit.

There is a bit of a difference between computers that were two months out of date and 10 years of out date dumbass microshill.

because electricity would cost more than the ransom dummy
did you ever consider how expensive it is to let a bunch of servers bruteforce such a thing for several millennia?

What you expect of a shit called fedora

You have to reboot to update windows

"Nothing will happpen we dont need updates"
kek

This would have most likely never have happened if only they went with Ubuntu Server LTS.

YOU DONT HAVE TO BE SO HURTFUL
Actually if it was aes 256 there would not be enough time left in the universe to do it

Well, if you gib dem monies to Redhat/Suse/Canonical/etc. they can ensure for you... hehehe :^)

>t.canotlodder

>2.6.24.2

>tfw literally just updated from 4.11.3 to 4.11.6
>Took LITERALLY less than 2 minutes including the reboot
What the fuck is wrong with these people, its not even hard to do for fucks sake.

Ubuntu!=fedora

>g-g-guys they j-just had to u-update
>typical thread on Sup Forums
>FUG UPDATIN I DO THAT SHIT MANUALLY HEH I NEVER REBOOT HEH UPDATING BREAKS SHIT HEH
wowza!

This is why you run sudo apt-get update && sudo apt-get dist-upgrade every single goddamn day.

>rebooting after kernel's patches

>being at computers

>le AES256 fallacy
Yes it would, because at some point in the future hardware would evolve enough to make it a trivial task. Let's say taht you bruteforce it for 3000 years, and then a new technology is invented that allows you to crack it in mere weeks, Then what faggot? What you said couldn't be more wrong.

>wowzeengha!

At best AES256's strength can be reduced to the equivalent of AES128 with quantum computing. You aint going to be cracking it.

>AES256 is gonna be uncrackable until the end of the universe
AHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA I wonder what life is like when you're this fucking stupid AHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA

...And then quantum computers come out and Rijndael is kill

If you use ksplice you don't need to reboot

The difference is that you can't update windows.
No, seriously, you literally can't update it, the update service is fucking broken.

Rijndael with 128 bit keys is already kill.

>tfw had to clean reinstall half of my Windows systems when WannaCry hit since WU stopped working IN MARCH
for fucks sake, I'm leaving all the Windows systems disconnected from the internet

I use GNU/Linux on all of my systems except one laptop that I use for gaymes that do not work on wine. Windows is quite painful to use in general.
In order to upgrade that computer I had to use download.wsusoffline.net/ (it's FOSS)

>In order to upgrade that computer I had to use download.wsusoffline.net/ (it's FOSS)
I know it, it has saved a lot of my machines from clean reinstalls
Still, having to deal with dozens of workarounds for such essential feature it's pure bullshit
Right now W10 has broken a lot of CAD tools for no fucking reason, it has been 3 months like this with no response from MS and most fixes being voodoo magic which might or might not work
I can't wait to ditch anything that doesn't run on GNU/Linux

Have you tried wine? I heard that it was easier to make some applications work with wine than with W10.

Question, can they get in from ANY piece of outdated software? Lets say I'm running Gimp version 2.1, will I get BTFO?

Those linux servers were running software that hadn't been updated in 11 years.

>NAYANA's website runs on Linux kernel 2.6.24.2, which was compiled back in 2008.
>U-uh... Our deprecated linux server were exploited... I guess Linux is not that secure after all...

GIMP does not open any TCP connections to my knowledge which means that you should be protected from external threats. However if it has a vulnerability concerning the parsing of an image format and you open an image that makes use of that image format and the vulnerability then you are fucked.

If it has open ports, likely.
GIMP doesn't listen on ports though- remote access is through programs that are actively listening for outside contact.

Not him but how about an old game with multiplayer? For example baldur's gate II or alpha centauri

You're already going to have Winlets and Macfags saying HURR REMEMBER THAT TIME LINUX GOT RANSOMWARE

Assuming that it's vulnerable then you are fucked.

>WannaCry is fine
Trillions threads on Sup Forums is not fine at all

Does it specifically avoid encrypting Firefox or something?