1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Round two.

Discussion in 'BlackHat Lounge' started by JustUs, May 14, 2017.

  1. JustUs

    JustUs Power Member

    Joined:
    May 6, 2012
    Messages:
    626
    Likes Received:
    588
    Ready to knuckle up for Round two?

    The cure for the new variants is the same as the old variant: Install the security update MS17-010:
    https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

    Microsoft had a patch a month before the malware was released in the wild. If you have not installed the security patch, you should. This threat is serious enough that MS has released patches for Windows XP.
     
  2. proxygo

    proxygo Jr. VIP Jr. VIP

    Joined:
    Nov 2, 2008
    Messages:
    20,282
    Likes Received:
    10,422
    Gender:
    Male
    Occupation:
    PROXIES .
    Location:
    UK - ALWAYS ON BHW
    Home Page:
    just did all my windows updates today hadnt bothered with it since last sept
    hopefully all upto date now.
     
  3. Skyebug77

    Skyebug77 Jr. VIP Jr. VIP

    Joined:
    Mar 22, 2012
    Messages:
    2,208
    Likes Received:
    1,620
    Occupation:
    Marketing
    Location:
    Portland,Or
    It gonna get worse with each passing day I suspect
     
  4. whiteblackseo

    whiteblackseo Jr. VIP Jr. VIP

    Joined:
    Apr 11, 2015
    Messages:
    2,614
    Likes Received:
    959
    Home Page:
  5. proxygo

    proxygo Jr. VIP Jr. VIP

    Joined:
    Nov 2, 2008
    Messages:
    20,282
    Likes Received:
    10,422
    Gender:
    Male
    Occupation:
    PROXIES .
    Location:
    UK - ALWAYS ON BHW
    Home Page:
    simple rule if u see an email with an attachment bin it even if its from a friend
    as u wont no if there contacts where hacked sending out the email as well
     
  6. Sherbert Hoover

    Sherbert Hoover Jr. Executive VIP Jr. VIP

    Joined:
    Dec 26, 2010
    Messages:
    1,306
    Likes Received:
    10,876
  7. BassTrackerBoats

    BassTrackerBoats Super Moderator Staff Member Moderator Jr. VIP

    Joined:
    Mar 10, 2010
    Messages:
    17,344
    Likes Received:
    31,835
    Occupation:
    Selling CPA Sites
    Location:
    Not England
    Home Page:
  8. JustUs

    JustUs Power Member

    Joined:
    May 6, 2012
    Messages:
    626
    Likes Received:
    588
    Though Mac malware is comparatively rare, Apple computers are not immune, as this year’s SophosLabs malware forecast shows. Mac malware is often technically sneaky and geared towards harvesting data or providing covert remote access to thieves.
    Two examples given are OSX/KeRanger-A and OSX/PWSSync-B. Both of these are ransomware for the mac
    https://nakedsecurity.sophos.com/2017/02/15/rsa-2017-deconstructing-macos-ransomware/

    Macworld.co.uk has a nice article for removal of malware, virus, and Trojans from your Mac:
    "How to remove Mac viruses, malware and ransomware for free"
    http://www.macworld.co.uk/how-to/mac-software/how-remove-mac-malware-free-viruses-attack-3594625/

    The hubris of the Linux user when it comes to immunity from virus and other malware is only exceeded by the Mac user. In both cases, it is only hubris and not fact.

    Just look:
    Mac OS
    https://packetstormsecurity.com/search/?q=mac+os
    OSX
    https://packetstormsecurity.com/search/?q=osx
    Linux
    https://packetstormsecurity.com/search/?q=linux

    Be smug, be secure, and be easy to infect because you buy into hpye.
     
    • Thanks Thanks x 1
  9. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    439
    Likes Received:
    221
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    Another reason to love my iMac. :D
     
  10. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    439
    Likes Received:
    221
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    This what we call "Searching For the fifth leg on a cat" where I live...
     
    • Thanks Thanks x 1
  11. Debian

    Debian BANNED BANNED Premium Member

    Joined:
    Feb 17, 2009
    Messages:
    1,273
    Likes Received:
    553
    This is what you get when the NSA weaponizes exploits for their use in hacking anyone they want and then their shit got leaked. This is entirely the NSA's fault.
     
  12. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    439
    Likes Received:
    221
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    Isn't it ilegal to hack into someone else's computer without their consent, even if it comes from government institutions? What backs the N-S-A from not being demanded?
     
  13. Debian

    Debian BANNED BANNED Premium Member

    Joined:
    Feb 17, 2009
    Messages:
    1,273
    Likes Received:
    553
    You would have to prove they hacked you in order to bring criminal charges and you'll never have that proof, so they continue to get away with it.
     
  14. Sherbert Hoover

    Sherbert Hoover Jr. Executive VIP Jr. VIP

    Joined:
    Dec 26, 2010
    Messages:
    1,306
    Likes Received:
    10,876
    lol
     
    • Thanks Thanks x 1
  15. jazzc

    jazzc Moderator Staff Member Moderator Jr. VIP

    Joined:
    Jan 27, 2009
    Messages:
    2,642
    Likes Received:
    11,377
    Occupation:
    Pusillanimous Knitter
    Location:
    Buenos Aires
    lolwut? :D
     
  16. lilmasta

    lilmasta Jr. VIP Jr. VIP

    Joined:
    May 21, 2009
    Messages:
    2,553
    Likes Received:
    1,198
    Gender:
    Male
    Location:
    192.168.0.1
    was about to write the same thing :D
     
  17. bartosimpsonio

    bartosimpsonio Jr. VIP Jr. VIP Premium Member

    Joined:
    Mar 21, 2013
    Messages:
    12,796
    Likes Received:
    11,443
    Occupation:
    COINZ
    Location:
    BUYAH
    Home Page:
    Just ask what Jennifer Lawrence and others thought of their naked pics leaking off their Macs in the fappening :p
     
    • Thanks Thanks x 2
  18. JustUs

    JustUs Power Member

    Joined:
    May 6, 2012
    Messages:
    626
    Likes Received:
    588
    To answer your silliness, I compiled a few things on the web (because I had to look up the meaning behind fifth leg on a cat) and conclude with my own words.

    "Back home we have saying, “you are trying to find the cat’s 5th leg.”

    We use the saying when people try really hard to find fault where there is none. In other words, you are looking for the one thing that will be a show stopper – like a 5th leg on a cat – so it will easier for you to defend the status quo.



    To make a long story short, Chileans are known for what they call “finding the fifth leg on a cat” (looking for ways to bend the rules). I think that in today´s society, it is often not a matter of bending the rules anymore, but instead avoiding them all together."

    Conclusion:
    Looking into a database of exploits and vulnerabilities of an operating system is not looking for fault where there is none. It is finding known fault where it actually exists.
     
  19. rafark

    rafark Regular Member

    Joined:
    Jan 15, 2013
    Messages:
    439
    Likes Received:
    221
    Gender:
    Male
    Occupation:
    Moderador
    Location:
    Noble and Heroic MC
    This specific vulnerability target Windows computers only, in this case this vulnerability doesn't exist in Mac, yet you're trying to prove there are related vulnerabilities for Mac systems. Of course "If you search, you'll find". That's another saying, b-t-w. Hence, You're looking for fault where there is none.
     
  20. Debian

    Debian BANNED BANNED Premium Member

    Joined:
    Feb 17, 2009
    Messages:
    1,273
    Likes Received:
    553
    Code:
    https://www.rt.com/usa/388187-leaked-nsa-exploit-ransomware/
    Read up on it.