1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Round two.

Discussion in 'BlackHat Lounge' started by JustUs, May 14, 2017.

  1. JustUs

    JustUs Power Member

    Joined:
    May 6, 2012
    Messages:
    626
    Likes Received:
    582
    Ready to knuckle up for Round two?

    The cure for the new variants is the same as the old variant: Install the security update MS17-010:
    https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

    Microsoft had a patch a month before the malware was released in the wild. If you have not installed the security patch, you should. This threat is serious enough that MS has released patches for Windows XP.
     
  2. proxygo

    proxygo Jr. VIP Jr. VIP

    Joined:
    Nov 2, 2008
    Messages:
    15,813
    Likes Received:
    9,602
    Occupation:
    PROVIDING PROXIES FOR GSA SCRAPING.
    Location:
    BHW
    Home Page:
    just did all my windows updates today hadnt bothered with it since last sept
    hopefully all upto date now.
     
  3. Skyebug77

    Skyebug77 Jr. VIP Jr. VIP

    Joined:
    Mar 22, 2012
    Messages:
    1,931
    Likes Received:
    1,354
    Occupation:
    Marketing
    Location:
    Portland,Or
    It gonna get worse with each passing day I suspect
     
  4. whiteblackseo

    whiteblackseo Jr. VIP Jr. VIP

    Joined:
    Apr 11, 2015
    Messages:
    2,461
    Likes Received:
    918
    Home Page:
    The pros of having a mac ;)
     
    • Thanks Thanks x 4
  5. proxygo

    proxygo Jr. VIP Jr. VIP

    Joined:
    Nov 2, 2008
    Messages:
    15,813
    Likes Received:
    9,602
    Occupation:
    PROVIDING PROXIES FOR GSA SCRAPING.
    Location:
    BHW
    Home Page:
    simple rule if u see an email with an attachment bin it even if its from a friend
    as u wont no if there contacts where hacked sending out the email as well
     
  6. Sherbert Hoover

    Sherbert Hoover Jr. Executive VIP Jr. VIP

    Joined:
    Dec 26, 2010
    Messages:
    997
    Likes Received:
    8,045
    Occupation:
    ORM - Branding - Content
    Location:
    United States
    Home Page:
    Mac OS crew checking in. What's going on down there, guys?
     
  7. BassTrackerBoats

    BassTrackerBoats Super Moderator Staff Member Moderator Jr. VIP

    Joined:
    Mar 10, 2010
    Messages:
    15,939
    Likes Received:
    29,269
    Occupation:
    Selling CPA Sites
    Location:
    Not England
    Home Page:
  8. JustUs

    JustUs Power Member

    Joined:
    May 6, 2012
    Messages:
    626
    Likes Received:
    582
    Though Mac malware is comparatively rare, Apple computers are not immune, as this year’s SophosLabs malware forecast shows. Mac malware is often technically sneaky and geared towards harvesting data or providing covert remote access to thieves.
    Two examples given are OSX/KeRanger-A and OSX/PWSSync-B. Both of these are ransomware for the mac
    https://nakedsecurity.sophos.com/2017/02/15/rsa-2017-deconstructing-macos-ransomware/

    Macworld.co.uk has a nice article for removal of malware, virus, and Trojans from your Mac:
    "How to remove Mac viruses, malware and ransomware for free"
    http://www.macworld.co.uk/how-to/mac-software/how-remove-mac-malware-free-viruses-attack-3594625/

    The hubris of the Linux user when it comes to immunity from virus and other malware is only exceeded by the Mac user. In both cases, it is only hubris and not fact.

    Just look:
    Mac OS
    https://packetstormsecurity.com/search/?q=mac+os
    OSX
    https://packetstormsecurity.com/search/?q=osx
    Linux
    https://packetstormsecurity.com/search/?q=linux

    Be smug, be secure, and be easy to infect because you buy into hpye.
     
    • Thanks Thanks x 1
  9. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    409
    Likes Received:
    191
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    Another reason to love my iMac. :D
     
  10. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    409
    Likes Received:
    191
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    This what we call "Searching For the fifth leg on a cat" where I live...
     
    • Thanks Thanks x 1
  11. Debian

    Debian BANNED BANNED Jr. VIP Premium Member

    Joined:
    Feb 17, 2009
    Messages:
    1,263
    Likes Received:
    553
    This is what you get when the NSA weaponizes exploits for their use in hacking anyone they want and then their shit got leaked. This is entirely the NSA's fault.
     
  12. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    409
    Likes Received:
    191
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    Isn't it ilegal to hack into someone else's computer without their consent, even if it comes from government institutions? What backs the N-S-A from not being demanded?
     
  13. Debian

    Debian BANNED BANNED Jr. VIP Premium Member

    Joined:
    Feb 17, 2009
    Messages:
    1,263
    Likes Received:
    553
    You would have to prove they hacked you in order to bring criminal charges and you'll never have that proof, so they continue to get away with it.
     
  14. Sherbert Hoover

    Sherbert Hoover Jr. Executive VIP Jr. VIP

    Joined:
    Dec 26, 2010
    Messages:
    997
    Likes Received:
    8,045
    Occupation:
    ORM - Branding - Content
    Location:
    United States
    Home Page:
    lol
     
    • Thanks Thanks x 1
  15. jazzc

    jazzc Moderator Staff Member Moderator Jr. VIP

    Joined:
    Jan 27, 2009
    Messages:
    2,567
    Likes Received:
    11,030
    Occupation:
    Pusillanimous Knitter
    Location:
    Buenos Aires
    lolwut? :D
     
  16. lilmasta

    lilmasta Elite Member

    Joined:
    May 21, 2009
    Messages:
    2,467
    Likes Received:
    1,137
    Gender:
    Male
    Location:
    192.168.0.1
    was about to write the same thing :D
     
  17. bartosimpsonio

    bartosimpsonio Jr. VIP Jr. VIP Premium Member

    Joined:
    Mar 21, 2013
    Messages:
    12,060
    Likes Received:
    10,836
    Occupation:
    WHEREZ MA
    Location:
    BITCOINS AT?
    Home Page:
    Just ask what Jennifer Lawrence and others thought of their naked pics leaking off their Macs in the fappening :p
     
    • Thanks Thanks x 2
  18. JustUs

    JustUs Power Member

    Joined:
    May 6, 2012
    Messages:
    626
    Likes Received:
    582
    To answer your silliness, I compiled a few things on the web (because I had to look up the meaning behind fifth leg on a cat) and conclude with my own words.

    "Back home we have saying, “you are trying to find the cat’s 5th leg.”

    We use the saying when people try really hard to find fault where there is none. In other words, you are looking for the one thing that will be a show stopper – like a 5th leg on a cat – so it will easier for you to defend the status quo.



    To make a long story short, Chileans are known for what they call “finding the fifth leg on a cat” (looking for ways to bend the rules). I think that in today´s society, it is often not a matter of bending the rules anymore, but instead avoiding them all together."

    Conclusion:
    Looking into a database of exploits and vulnerabilities of an operating system is not looking for fault where there is none. It is finding known fault where it actually exists.
     
  19. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    409
    Likes Received:
    191
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    This specific vulnerability target Windows computers only, in this case this vulnerability doesn't exist in Mac, yet you're trying to prove there are related vulnerabilities for Mac systems. Of course "If you search, you'll find". That's another saying, b-t-w. Hence, You're looking for fault where there is none.
     
  20. Debian

    Debian BANNED BANNED Jr. VIP Premium Member

    Joined:
    Feb 17, 2009
    Messages:
    1,263
    Likes Received:
    553
    Code:
    https://www.rt.com/usa/388187-leaked-nsa-exploit-ransomware/
    Read up on it.