• NotPetya Might Have Not Have Been an NSA Leak

    News
    6
    0 Votes
    6 Posts
    1k Views
    stusS

    After monitoring this new outbreak for 24 hours, I came to the conclusion we were dealing with cyber warfare, and not ransomware. Two separate reports coming from Comae Technologies and Kaspersky Lab experts confirm this now.

    NotPetya is a destructive disk wiper similar to Shamoon which has been targeting Saudi Arabia in the recent past. Note that Shamoon actually deleted files, NotPetya goes about it slightly different, it does not delete any data but simply makes it unusable by locking the files and then throwing away the key. The end result is the same.

    Someone is hijacking known ransomware families and using them to attack Ukrainian computer systems. Guess who.

    You never had a chance to recover your files. There are several technical indicators that NotPetya was only made to look as ransomware as a smoke screen:

    It never bothers to generate a valid infection ID The Master File Table gets overwritten and is not recoverable The author of the original Petya also made it clear NotPetya was not his work

    This has actually happened earlier. Foreshadowing the NotPetya attack, the author of the AES-NI ransomware said in May he did not create the XData ransomware, which was also used in targeted attacks against Ukraine. Furthermore, both XData and NotPetya used the same distribution vector, the update servers of a Ukrainian accounting software maker.

    Catalin Cimpanu, the Security News Editor for Bleepingcomputer stated: "The consensus on NotPetya has shifted dramatically in the past 24 hours, and nobody would be wrong to say that NotPetya is on the same level with Stuxnet and BlackEnergy, two malware families used for political purposes and for their destructive effects. Evidence is clearly mounting that NotPetya is a cyber-weapon and not just some overly-aggressive ransomware."

    Cybersecurity has moved from tech to a CEO and Board-level business issue

    You did not sign up for this, but today it is abundantly clear that as an IT pro you are have just found yourself on the front line of 21-st century cyber war. Cybersecurity has moved from tech to a CEO and Board-level business issue. I strongly suggest you have another look at your defense-in-depth, and make sure to:

    Have weapons-grade backups
    Religiously patch
    Step users through new-school security awareness training.

  • 4 Votes
    2 Posts
    953 Views
    Deleted74295D

    This is the NSA right now:

    7383_600.jpg

    They have more than enough tool kits.

  • 3 Votes
    2 Posts
    1k Views
    StrongBadS

    Not much pity for people not bothering to update.

  • 3 Votes
    3 Posts
    1k Views
    thwrT

    @scottalanmiller said in NSA tools leaked, Cisco patches exploits found inside the leaked tools:

    Read: CIsco confirms that the US was NSA's targetted enemy 😞

    Surprise, surprise...

  • 0 Votes
    10 Posts
    2k Views
    tonyshowoffT

    @scottalanmiller I got an itch to disassemble it, I gotta see it! It's tearing me apart!

  • NSA Spies 90% on Innocent US Citizens

    News
    3
    0 Votes
    3 Posts
    1k Views
    DashrenderD

    Certainly not.

  • NSA declares war on sysadmins

    IT Discussion
    6
    0 Votes
    6 Posts
    1k Views
    scottalanmillerS

    @Dashrender said:

    I'm fairly certain I'm on the list too, especially considering that I'm an arms owner as well.

    No arms here but nearly a decade in international finance.... I'm at the top of the list.

  • 1 Votes
    6 Posts
    2k Views
    slazer2auS

    ˙ןıɐɯ ǝʌɐɥ ı ɟı ǝǝs oʇ sʇuǝɹɐd ʎɯ buıןןɐɔ ǝɯ ɹo uɐן ɐ ǝʌɐɥ oʇ buıʇuɐʍ buıןןɐɔ spuǝıɹɟ ʎɯ ʎןʇsoɯ ˙sןןɐɔ ʎɯ ɟo ǝsɐqɐʇɐp ǝɥʇ ɹɐǝɥ oʇ ǝʌoן pןnoʍ ı ɥbnoɥʇןɐ ˙ɹǝbbnq ןןǝʍ

  • 1 Votes
    2 Posts
    961 Views
    scottalanmillerS

    In the US it is illegal to disclose those things. So denying it means nothing, sadly.