• ¿Quieres apoyar a nuestro foro haciendo una donación?, entra aquí.

anda un super virus informatico ransomware instalen esto antes que los atrape. dejo la zorra .

Este virus tiene la capacidad de mandar ordenes a las placas tectonicas para formar terremotos, OJO CON EL 9.5 QUE SE VIENE MAÑANA MIENTRAS SE DISPUTEN LOS PARTIDOS DEL FUTBOL CHILENO

POR FAVOR GRABAR AUDIO CON ESTO Y MANDAR POR WHATSAPP, PUEDEN SALVAR MUCHAS VIDAS
 
ya dijeron q el bicho no viene en adjuntos?? la wea se propaga por la red usando el protocolo smb (puerto 445 creo), y además ya encontraron el killswitch para q no siga infectando.

fuente https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html

Enviado desde mi Moto MAXX mediante Tapatalk
Que significa todo eso? Q se mete a tu pc por el solo echo de estar conectado???
Mejor le quito el cable ethernet a mi torre x mientras????
 
Que significa todo eso? Q se mete a tu pc por el solo echo de estar conectado???
Mejor le quito el cable ethernet a mi torre x mientras????
efectivamente, por eso en telefonica españa pidieron apagar o sacar el cable de red de los pcs, y por eso fue tan rápida la propagación en los pcs q no tenían el parche de seguridad

Enviado desde mi Moto MAXX mediante Tapatalk
 
¿Alguien bajó el kaspersky del link que puso @PERROXX ? ¿Qué tal es la wea? independiente de lo que está pasando ahora, digo, para tenerlo como segunda protección? Mi antivirus principal es NOD32 con licencia original
 
efectivamente, por eso en telefonica españa pidieron apagar o sacar el cable de red de los pcs, y por eso fue tan rápida la propagación en los pcs q no tenían el parche de seguridad

Enviado desde mi Moto MAXX mediante Tapatalk
En serio?? Ya poh, lo saco no más, total, Internet lo uso solo pa jugar online y pa meterme a este sucucho
 
En serio?? Ya poh, lo saco no más, total, Internet lo uso solo pa jugar online y pa meterme a este sucucho
mejor instala el parche q ya está listo en microsoft, o cierra el puerto

Enviado desde mi Moto MAXX mediante Tapatalk
 
jajaj se cagaron al wanna cry le compraron el dominio


https://www.theverge.com/2017/5/13/15635050/wannacry-ransomware-kill-switch-protect-nhs-attack


Registering a single web address may have stopped a global malware attack
Finding the kill switch
by Russell Brandom@russellbrandom May 13, 2017, 11:37am EDT
ethernet-internet-cord-stock_1020.0.jpg


Over the past 24 hours, a ransomware program called WannaCry has shut down more than 75,000 computers across 99 countries, including a string of hospitals in the United Kingdom and critical gas and water utilities in Spain. But despite the massive scale of the attack, stopping new infections from the attack seems to have been as simple as registering a single web address.


This morning, researchers announced they had found a kill switch in the code of the ransomware program — a single domain which, when registered, would prevent any infections from taking place. It’s still unclear whether registering that domain will stop every strain of the infection, but it should severely limit the global spread of the attack.

Researchers found a kill-switch and flipped it
The crucial web address is found in a small section of code, the purpose of which is still unclear. When the program is infecting a new computer, it first checks an obscure web address — iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com — to see if the domain is registered. As long as the domain is unoccupied, the infection proceeds, encrypting the computer’s hard drive and locking it down until the ransom is paid.

That feature was first noticed by a 22-year-old UK researcher who writes under the name MalwareTech. As an experiment, MalwareTech registered the domain; now when the program ran its check, it found the web address registered and occupied. Only later did the effect of that move: occupying the domain seemed to be preventing new infections from taking place. When the ransomware discovers the domain is occupied, it abruptly stops the installation process, leaving the larger system unaffected. The result is a major protection for computers still vulnerable to the attack: even if the ransomware software ends up running on your computer, the flipped kill switch will stop it from holding you for ransom.



It’s still unclear why the ransomware included such a kill switch. Some have speculated it may have been a way for the creator to shut down the system remotely, although there’s no indication that he or she decided to do so. MalwareTech has a different theory: checking the domain was a way to keep the ransomware from being spotted by malware researchers. If the program were being run in a controlled “sandbox” environment, commonly used by researchers to examine code without exposing themselves to malware, the domain may well have come back as occupied as a result of the limitations of the sandbox. In those cases, preventing installation would have been a useful trick.

Flipping the kill switch may not stop the WannaCry ransomware entirely. It’s unclear how many of the observed infections were the result of the specific strain of malware analyzed by MalwareTech. Beyond that, it would be easy for the authors to send out a new version of the ransomware with a different domain or no kill-switch protocol at all. Still, as Microsoft users rush to patch the vulnerability — and hospitals try to regain control of their IT systems — this clever bit of code analysis may have saved more than a few lives.
 
mejor instala el parche q ya está listo en microsoft, o cierra el puerto

Enviado desde mi Moto MAXX mediante Tapatalk
Pero tengo Win 7 64. Me afecta tb?
 
Lo mejor aun esta por empezar y será.a los celulares y ahi si que todos nos iriamos a la b cimpadrito, futuramente será el caos.

Lo que no me explico como csm estos wnes de la cía no cachan hacia donde van los montos de plata que puden por medio de bitcoins ningún sistema de registro, en las transacciones etc etc que ya se debiese haber tenido por vigilancia a los hakers que hacen software con esta tecnologia
Por eso no hay que tener conectado al celular pos...
 
Mis primas en un grupo la caga... también me llegó ese mail apocalíptico
 
jajaj se cagaron al wanna cry le compraron el dominio


https://www.theverge.com/2017/5/13/15635050/wannacry-ransomware-kill-switch-protect-nhs-attack


Registering a single web address may have stopped a global malware attack
Finding the kill switch
by Russell Brandom@russellbrandom May 13, 2017, 11:37am EDT
ethernet-internet-cord-stock_1020.0.jpg


Over the past 24 hours, a ransomware program called WannaCry has shut down more than 75,000 computers across 99 countries, including a string of hospitals in the United Kingdom and critical gas and water utilities in Spain. But despite the massive scale of the attack, stopping new infections from the attack seems to have been as simple as registering a single web address.


This morning, researchers announced they had found a kill switch in the code of the ransomware program — a single domain which, when registered, would prevent any infections from taking place. It’s still unclear whether registering that domain will stop every strain of the infection, but it should severely limit the global spread of the attack.

Researchers found a kill-switch and flipped it
The crucial web address is found in a small section of code, the purpose of which is still unclear. When the program is infecting a new computer, it first checks an obscure web address — iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com — to see if the domain is registered. As long as the domain is unoccupied, the infection proceeds, encrypting the computer’s hard drive and locking it down until the ransom is paid.

That feature was first noticed by a 22-year-old UK researcher who writes under the name MalwareTech. As an experiment, MalwareTech registered the domain; now when the program ran its check, it found the web address registered and occupied. Only later did the effect of that move: occupying the domain seemed to be preventing new infections from taking place. When the ransomware discovers the domain is occupied, it abruptly stops the installation process, leaving the larger system unaffected. The result is a major protection for computers still vulnerable to the attack: even if the ransomware software ends up running on your computer, the flipped kill switch will stop it from holding you for ransom.



It’s still unclear why the ransomware included such a kill switch. Some have speculated it may have been a way for the creator to shut down the system remotely, although there’s no indication that he or she decided to do so. MalwareTech has a different theory: checking the domain was a way to keep the ransomware from being spotted by malware researchers. If the program were being run in a controlled “sandbox” environment, commonly used by researchers to examine code without exposing themselves to malware, the domain may well have come back as occupied as a result of the limitations of the sandbox. In those cases, preventing installation would have been a useful trick.

Flipping the kill switch may not stop the WannaCry ransomware entirely. It’s unclear how many of the observed infections were the result of the specific strain of malware analyzed by MalwareTech. Beyond that, it would be easy for the authors to send out a new version of the ransomware with a different domain or no kill-switch protocol at all. Still, as Microsoft users rush to patch the vulnerability — and hospitals try to regain control of their IT systems — this clever bit of code analysis may have saved more than a few lives.
Les va a costar mucho a los q lo crearon cambiarle una linea de codigo y asignarle otro dominio diferente po.
 
Volver
Arriba