Please enable / Por favor activa JavaScript!
Por favor activa el Javascript![ ? ]
Hosting de calidad y barato para tu Wordpress:

Hosting SSD Wordpress

El artículo con ID 1839, con web https://www.exabyteinformatica.com/tienda/foro/hackers-hit-dozens-of-international-locations-with-a-device-t1839.html y con una longitud de 117 caracteres, ha sido procesada satisfactóriamente. Para poder acceder a los sub-foros o temas, pulsa en el título de cada enlace de la lista de esta página (el título que aparece junto al mushroom). Recuerda que en algunas páginas hay un selector de registros situado en la parte inferior que te permitirá saltar a más páginas.Para poder comentar en este foro o en el resto de exaforo, primero es necesario registrarte en exaforo.com, tu cartera no sufrirá daños ni directos ni colaterales: es GRATIS.

Registrándote aceptas haber leído y estar de acuerdo con las Normas generales del foro. No cuesta nada agradecer un comentario de alguien o de no insultarle, el respeto es el valor más preciado que intentamos fomentar. Si infringes alguna de las Normas generales primero serás notificado, si reincides, tu cuenta será baneada temporal o indefinidamente.

En exaforo valoramos por encima de todo las opiniones personales de las personas que lo forman, es por esto que te pediremos que por favor, lo que nos escribas no sea un plagio de otra web o de otro miembro; si nuestro sistema anti-spam detecta que tu contenido no és único, el sistema puede borrarlo automáticamente sin avisar.

A modo de conclusión, el equipo humano de Exaforo te desea una provechosa estancia con nosotros y te animamos a que revises los temas que más te interesan del foro para extraer y aportar el máximo de información posible.

¡Muchas gracias por dedicarnos unos minutos y disfruta mucho con nuestra comunidad!

Datos internos informativos (No hagas caso de estos datos, son para los administradores de Exaforo)

Fecha y hora de carga de esta página: 21/112017 a las 14:41:54
Memória total usada: 7498648

¿Y el logo de Paypal? ¿Exaforo no era sin ánimo de lucro? Y así es, para poder usar Exaforo nadie cobra nada, fíjate bien que el botón de Paypal es el de donaciones. Mantener la web en un servidor encendido 24 horas, contratar la conexión a internet de alta velocidad para que goces de peticiones rápidas, pagar los certificados SSL,…es decir, los costes de mantenimiento.

Nuestros pocos fondos van destinados a mantener siempre en marcha los sistemas y cuando adquirimos equipos nuevos, los viejos solemos donarlos a escuelas y centros educativos que tienen pocos recursos para adquirir equipos informáticos. Por eso tus donaciones son muy importantes ya que no solo nos ayudan a nosotros sino también a niños en edad escolar, al profesorado y a los centros educativos en general. En exaforo creemos en la formación libre y que sea accesible a todo el mundo. Si crees poder ayudarnos haciendo una donación para que sigamos creciendo como hemos ido haciendo desde 2003, te estaremos muy agradecidos, el importe de la donación lo pones tú, nosotros no pedimos una cantidad fija, piensa que puedes donar hasta mínimo 1 céntimo. Dones o no dones, muchas gracias por habernos leído hasta el final. Más abajo tienes el botón de “Donar con Paypal” (no hace falta que des tu número de la tarjeta, el botón te dirige a la página oficial de Paypal y desde su formulario puedes hacer la donación desde tu cuenta Paypal).

Hackers hit dozens of international locations with a device  Hackers hit dozens of international locations with a device

Valoración de éste post
4.42 / 5 de 246 votos



Mensajes: 945


Puntos totales:

Enhorabuena!

32





El contenido de este artículo o información está sujeto a una licencia Creative Commons BY (CC-BY), puedes divulgar públicamente este contenido pero deberás hacer mención del autor: Kernel e indicar la dirección web de esta página: https://www.exabyteinformatica.com/tienda/foro/hackers-hit-dozens-of-international-locations-with-a-device-t1839.html

The content of this article or any related information is under the Creative Commons license BY, you can republish this content freely but you must mention the author of this article: Kernel and indicate the URL of this page: https://www.exabyteinformatica.com/tienda/foro/hackers-hit-dozens-of-international-locations-with-a-device-t1839.html

Bajo licencia de Creative Commons


Hackers hit dozens of international locations with a stolen N.S.A. device

The assaults gave the impression to be the largest ransomware assault on listing, however the scope of the hurt changed into tough to measure. It turned into not clear if victims had been paying the ransom, which began at about $300 to unlock individual computer systems, or notwithstanding those that did pay would regain entry to their information.

Security specialists described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing electronic mail; similar to the one Russian hackers used in the attacks on the Democratic countrywide Committee and other aims final year. They then promptly unfold via victims’ techniques the use of a hacking system that the N.S.A. is believed to have developed as a part of its arsenal of cyber weapons. At last, they encrypted the computer techniques of the victims, locking them out of crucial statistics, including patient data in Britain.

Visita Exaforo.com


The connection to the N.S.A. became specially chilling. beginning closing summer time, a bunch calling itself the “Shadow Brokers” begun to publish software tools that came from the us govt’s stockpile of hacking weapons.

The attacks on Friday seemed to be the primary time a cyber-weapon developed by using the N.S.A., funded through American taxpayers and stolen by means of an adversary had been unleashed with the aid of cybercriminals against sufferers, hospitals, corporations, governments and common residents.

Anything an identical took place with remnants of the “Stuxnet” worm that the U.S. and Israel used towards Iran’s nuclear program well-nigh seven years in the past. Points of those tools frequently appear in other, less ambitious attacks.

The U.S. has by no means tested that the equipment posted by the Shadow Brokers belonged to the N.S.A. or different intelligence businesses, but former intelligence officials have stated that the equipment perceived to come from the N.S.A.’s “tailor-made entry Operations” unit, which infiltrates overseas laptop networks. (The unit has considering that been renamed.)

The attacks on Friday are prone to elevate huge questions about even if the growing variety of nations constructing and stockpiling cyber weapons can steer clear of having those equal equipment purloined and grew to become against their own citizens.

They also confirmed how quite simply a cyber-weapon can wreak havoc, even devoid of shutting off a country’s vigor grid or its cellular telephone network.

A brand new stress of ransomware unfold all of a sudden all over on Friday.

In Britain, hospitals were locked out of their techniques and doctors could not call up affected person files. Emergency rooms have been pressured to divert individuals in quest of urgent care.

In Russia, the nation’s effective indoors Ministry, after denying experiences that its computers had been targeted, validated in an announcement that “around 1,000 computers had been contaminated,” which it described as less than one p.c of its total. The ministry, which oversees Russia’s police forces, noted technicians had contained the assault.

Some intelligence officers have been dubious about that announcement; because of they believe Russian involvement in the theft of the N.S.A. equipment.

However James Lewis, a cybersecurity professional on the core for Strategic and foreign studies in Washington, observed he suspected that criminals operating from Jap Europe acting on their own had been accountable. “This doesn’t look like state undertaking, given the goals that had been hit,” he referred to.

Those aims blanketed company laptop methods in lots of different nations — including FedEx within the u.s., one of the world’s leading overseas shippers, in addition to Spain’s Telefónica and Russia’s MegaFon telecom gigantic.

It could take months to locate who turned into in the back of the assaults — a mystery that may additionally go unsolved. However, they alarmed cybersecurity consultants all over the place, reflecting the significant vulnerabilities to cyber web invasions confronted by way of disjointed networks of computer techniques.

There is not any automated way to “patch” their weaknesses around the world.

“When Americans ask what maintains you up at evening, it’s this,” mentioned Chris Camacho, the chief approach officer at Flashpoint, a brand New York Security Company monitoring the attacks. Mr. Camacho stated he changed into peculiarly disturbed at how the assaults spread like wildfire through company, health center and govt networks.

An extra security knowledgeable, Rohyt Belani, the chief executive of PhishMe, an e-mail protection company, observed the wormlike capability of the malware was a significant shift from previous ransom attacks. “This is essentially like the atom bomb of ransomware,” Mr. Belani stated, warning that the attack “can be an indication of issues to come back.”

The hackers’ weapon of option on Friday was Wanna Decryptor, a new variant of the WannaCry ransomware, which encrypts victims’ facts, locks them out of their programs and demands ransoms.

Researchers said the influence and speed of Friday’s assaults had no longer been seen in well-nigh a decade, when the Conficker desktop worm contaminated millions of executive, enterprise and personal computer systems in more than a hundred ninety nations, threatening to overpower the laptop networks that controlled health care, air traffic and banking systems over the route of a couple of weeks.

One cause the ransomware on Friday turned into able to spread so rapidly changed into that the stolen N.S.A. hacking device, referred to as “everlasting Blue,” affected a vulnerability in Microsoft home windows servers.

Hours after the Shadow Brokers released the tool-closing month, Microsoft certain clients that it had already covered a patch for the underlying vulnerability in an application replace in March.

Photograph The domestic web page of the East and North Hertfordshire N.H.S. believe web page on Friday. Credit East and North Hertfordshire NHS/Press affiliation, via linked Press

However, Microsoft, which continuously credits researchers who discover holes in its products, curiously would not say who had tipped the business off to the challenge. Many suspected that the United States executive itself had told Microsoft, after the N.S.A. realized that its hacking components exploiting the vulnerability had been stolen.

Privacy activists stated if that were the case; the govt could be in charge for the incontrovertible fact that so many corporations have been left prone to Friday’s attacks. It takes time for companies to roll out system wide patches, and with the aid of notifying Microsoft of the gap handiest after the N.S.A.’s hacking device became stolen, activists say the government would have left many hospitals, groups and governments susceptible.

“It could be deeply troubling if the N.S.A. knew about this vulnerability however failed to expose it to Microsoft unless after it become stolen,” Patrick Toomey, a legal professional on the American Civil Liberties Union, noted on Friday. “These assaults underscore the incontrovertible fact that vulnerabilities will be exploited not simply by means of our security agencies, but by using hackers and criminals all over the world.”

All through the Obama administration, the White residence created a system to review application vulnerabilities found out by means of intelligence corporations, and to investigate which may still be “stockpiled” for future offensive or defensive cyber operations and which should still be pronounced to the businesses so that they may be mounted.

Ultimate year the administration spoke of that simplest a small fraction were retained with the aid of the government. However, this vulnerability gave the impression to be one in all them, and it became patched only recently, suggesting that the N.S.A. may also have concluded the tool had been stolen and for this reason warned Microsoft.

But that changed into clearly too little, and far too late.

On Friday, hackers took talents of the undeniable fact that inclined goals — above all hospitals — had yet to patch their programs, either as a result of they had overlooked advisories from Microsoft or as a result of they have been using outdated utility that Microsoft not supports or updates.

The malware changed into circulated via email. Targets were dispatched an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its objectives. The proven fact that the files have been encrypted ensured that safety programs would not detect the ransomware except employees opened them, inadvertently enabling the ransomware to replicate throughout their employers’ networks.

Employees at Britain’s countrywide health service had been warned concerning the ransomware risk earlier on Friday. However, it changed into too late. as the disruptions rippled through at the least 36 hospitals, medical doctors’ offices and ambulance businesses across Britain, the fitness carrier declared the attack a “main incident,” warning that local health functions may be overwhelmed.

Britain’s fitness secretary, Jeremy Hunt, was briefed with the aid of cybersecurity specialists, while top Minister Theresa may additionally’s office stated on television that “we’re now not aware of any evidence that patient information has been compromised.”

Because the day wore on, dozens of agencies throughout Europe, Asia and the United States discovered that that they had been hit with the ransomware once they saw criminals’ messages on their computing device screens traumatic $300 to free up their information.

However, the criminals designed their ransomware to boost the ransom volume on a collection agenda and threatened to erase the hostage statistics after a predetermined cutoff time, elevating the urgency of the assault and increasing the likelihood that victims would pay.

Devoid of the capacity to decrypt, their statistics on their own, safety specialists spoke of that victims who had no longer backed up their information had been confronted with a decision: both reside without their statistics or pay. It turned into no longer clear how many victims finally paid.

Safety consultants informed corporations to automatically update their programs with the Microsoft patch.

Until organizations use the Microsoft patch, Mr. Camacho pointed out, they may proceed to be hit — not simply by way of ransomware, however with the aid of all kinds of malicious equipment that may manipulate, steal or delete their data.

“There goes to be a lot more of these assaults,” he said. “We’ll see copycats, and never only for ransomware, but other attacks.”



No te pierdas el tema anterior: Hackers are using subtitle video info to spread malware

Salta al siguiente tema: Unlocking the secrets to ransomware assaults

Quizás también te interese:
Si has encontrado información útil en Exaforo, ayúdanos a seguir creciendo. Muchas gracias por confiar en nosotros!


Volver a Zona virus