Herramientas y recursos para optimizar el SEO de tu web:

SEMrush

El artículo con ID 1839, con web https://www.exabyteinformatica.com/tienda/foro/hackers-hit-dozens-of-international-locations-with-a-device-t1839.html y con una longitud de 117 caracteres, ha sido procesada satisfactóriamente. Para poder acceder a los sub-foros o temas, pulsa en el título de cada enlace de la lista de esta página (el título que aparece junto al mushroom). Recuerda que en algunas páginas hay un selector de registros situado en la parte inferior que te permitirá saltar a más páginas.Para poder comentar en este foro o en el resto de exaforo, el paso previo para poder comentar es registrarte,no cuesta dinero: es GRATIS.

Deberás haber leído y aceptado eso sí, las Normas generales del foro. Sólo te pedimos un valor: el respeto por los demás miembros de la comunidad. De detectar alguna actividad sospechosa y si trasciende a más, tu cuenta puede ser dada de baja definitivamente de nuestro sistema.

Cuando decidas escribir para nosotr@s, por favor, no copies y pegues contenido que ya exista en otra página web o que ya sea de otro usuario. Ten en cuenta que si detectamos contenido duplicado, el sistema anti-spam procederá a borrarlo sin prévio aviso.

Para concluir, te deseamos un muy provechoso aprendizaje y seguro que estaremos encantados con tus aportaciones. No olvides presentarte a la comunidad si aún no te has registrado.

¡Agradecidos de tenerte con nosotr@s y esperamos leerte pronto!

Datos internos informativos (No hagas caso de estos datos, son para los administradores de Exaforo)

Fecha y hora de carga de esta página: 23/012018 a las 19:13:10
Memória total usada: 7538768

¿Por qué aparece el logo de Paypal en los temas? ¿Cobra Exaforo por usar su foro? No cobramos por usar el foro y el logo de Paypal es el de las donaciones. Tener en marcha un servidor 24/365, costear el hosting, los certificados digitales SSL, nuestros equipos…todo esto conlleva un coste que tratamos de sufragar mediante las donaciones. Nuestra aportación, cuando adquirimos equipos nuevos, consiste en donar nuestros viejos equipos a centros educativos con pocos recursos para que su alumnado (la mayoría niños) puedan desempeñar las asignaturas de tecnología y el centro pueda cubrir unos pocos puntos de trabajo. Tus donaciones no solo nos ayudan a nosotros sino también a los niños de las escuelas. Por eso es tan importante, porque a pesar que nosotros fomentamos el conocimiento libre, las herramientas para desempeñar dicho trabajo no lo son.

Más abajo verás un botón con el logo de Paypal. Si haces clic en el botón, te llevará a la página oficial de Paypal, allí dentro, con tu cuenta de Paypal, puedes hacer la donación del importe que tú quieras. Nosotros no pedimos un mínimo, puedes donar 1 céntimo de € si quieres o la cantidad que tú quieras. Si donas o no donas, solo te diremos una cosa: ¡Muchas gracias por habernos leído hasta aquí!

Hackers hit dozens of international locations with a device  Hackers hit dozens of international locations with a device

Valoración de éste post
4.42 / 5 de 272 votos



Mensajes: 1563


Puntos totales:

Enhorabuena!

32




El contenido de este artículo o información está sujeto a una licencia Creative Commons BY (CC-BY), puedes divulgar públicamente este contenido pero deberás hacer mención del autor: Kernel e indicar la dirección web de esta página: https://www.exabyteinformatica.com/tienda/foro/hackers-hit-dozens-of-international-locations-with-a-device-t1839.html

The content of this article or any related information is under the Creative Commons license BY, you can republish this content freely but you must mention the author of this article: Kernel and indicate the URL of this page: https://www.exabyteinformatica.com/tienda/foro/hackers-hit-dozens-of-international-locations-with-a-device-t1839.html

Bajo licencia de Creative Commons


Hackers hit dozens of international locations with a stolen N.S.A. device

The assaults gave the impression to be the largest ransomware assault on listing, however the scope of the hurt changed into tough to measure. It turned into not clear if victims had been paying the ransom, which began at about $300 to unlock individual computer systems, or notwithstanding those that did pay would regain entry to their information.

Security specialists described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing electronic mail; similar to the one Russian hackers used in the attacks on the Democratic countrywide Committee and other aims final year. They then promptly unfold via victims’ techniques the use of a hacking system that the N.S.A. is believed to have developed as a part of its arsenal of cyber weapons. At last, they encrypted the computer techniques of the victims, locking them out of crucial statistics, including patient data in Britain.

Visita Exaforo.com


The connection to the N.S.A. became specially chilling. beginning closing summer time, a bunch calling itself the “Shadow Brokers” begun to publish software tools that came from the us govt’s stockpile of hacking weapons.

The attacks on Friday seemed to be the primary time a cyber-weapon developed by using the N.S.A., funded through American taxpayers and stolen by means of an adversary had been unleashed with the aid of cybercriminals against sufferers, hospitals, corporations, governments and common residents.

Anything an identical took place with remnants of the “Stuxnet” worm that the U.S. and Israel used towards Iran’s nuclear program well-nigh seven years in the past. Points of those tools frequently appear in other, less ambitious attacks.

The U.S. has by no means tested that the equipment posted by the Shadow Brokers belonged to the N.S.A. or different intelligence businesses, but former intelligence officials have stated that the equipment perceived to come from the N.S.A.’s “tailor-made entry Operations” unit, which infiltrates overseas laptop networks. (The unit has considering that been renamed.)

The attacks on Friday are prone to elevate huge questions about even if the growing variety of nations constructing and stockpiling cyber weapons can steer clear of having those equal equipment purloined and grew to become against their own citizens.

They also confirmed how quite simply a cyber-weapon can wreak havoc, even devoid of shutting off a country’s vigor grid or its cellular telephone network.

A brand new stress of ransomware unfold all of a sudden all over on Friday.

In Britain, hospitals were locked out of their techniques and doctors could not call up affected person files. Emergency rooms have been pressured to divert individuals in quest of urgent care.

In Russia, the nation’s effective indoors Ministry, after denying experiences that its computers had been targeted, validated in an announcement that “around 1,000 computers had been contaminated,” which it described as less than one p.c of its total. The ministry, which oversees Russia’s police forces, noted technicians had contained the assault.

Some intelligence officers have been dubious about that announcement; because of they believe Russian involvement in the theft of the N.S.A. equipment.

However James Lewis, a cybersecurity professional on the core for Strategic and foreign studies in Washington, observed he suspected that criminals operating from Jap Europe acting on their own had been accountable. “This doesn’t look like state undertaking, given the goals that had been hit,” he referred to.

Those aims blanketed company laptop methods in lots of different nations — including FedEx within the u.s., one of the world’s leading overseas shippers, in addition to Spain’s Telefónica and Russia’s MegaFon telecom gigantic.

It could take months to locate who turned into in the back of the assaults — a mystery that may additionally go unsolved. However, they alarmed cybersecurity consultants all over the place, reflecting the significant vulnerabilities to cyber web invasions confronted by way of disjointed networks of computer techniques.

There is not any automated way to “patch” their weaknesses around the world.

“When Americans ask what maintains you up at evening, it’s this,” mentioned Chris Camacho, the chief approach officer at Flashpoint, a brand New York Security Company monitoring the attacks. Mr. Camacho stated he changed into peculiarly disturbed at how the assaults spread like wildfire through company, health center and govt networks.

An extra security knowledgeable, Rohyt Belani, the chief executive of PhishMe, an e-mail protection company, observed the wormlike capability of the malware was a significant shift from previous ransom attacks. “This is essentially like the atom bomb of ransomware,” Mr. Belani stated, warning that the attack “can be an indication of issues to come back.”

The hackers’ weapon of option on Friday was Wanna Decryptor, a new variant of the WannaCry ransomware, which encrypts victims’ facts, locks them out of their programs and demands ransoms.

Researchers said the influence and speed of Friday’s assaults had no longer been seen in well-nigh a decade, when the Conficker desktop worm contaminated millions of executive, enterprise and personal computer systems in more than a hundred ninety nations, threatening to overpower the laptop networks that controlled health care, air traffic and banking systems over the route of a couple of weeks.

One cause the ransomware on Friday turned into able to spread so rapidly changed into that the stolen N.S.A. hacking device, referred to as “everlasting Blue,” affected a vulnerability in Microsoft home windows servers.

Hours after the Shadow Brokers released the tool-closing month, Microsoft certain clients that it had already covered a patch for the underlying vulnerability in an application replace in March.

Photograph The domestic web page of the East and North Hertfordshire N.H.S. believe web page on Friday. Credit East and North Hertfordshire NHS/Press affiliation, via linked Press

However, Microsoft, which continuously credits researchers who discover holes in its products, curiously would not say who had tipped the business off to the challenge. Many suspected that the United States executive itself had told Microsoft, after the N.S.A. realized that its hacking components exploiting the vulnerability had been stolen.

Privacy activists stated if that were the case; the govt could be in charge for the incontrovertible fact that so many corporations have been left prone to Friday’s attacks. It takes time for companies to roll out system wide patches, and with the aid of notifying Microsoft of the gap handiest after the N.S.A.’s hacking device became stolen, activists say the government would have left many hospitals, groups and governments susceptible.

“It could be deeply troubling if the N.S.A. knew about this vulnerability however failed to expose it to Microsoft unless after it become stolen,” Patrick Toomey, a legal professional on the American Civil Liberties Union, noted on Friday. “These assaults underscore the incontrovertible fact that vulnerabilities will be exploited not simply by means of our security agencies, but by using hackers and criminals all over the world.”

All through the Obama administration, the White residence created a system to review application vulnerabilities found out by means of intelligence corporations, and to investigate which may still be “stockpiled” for future offensive or defensive cyber operations and which should still be pronounced to the businesses so that they may be mounted.

Ultimate year the administration spoke of that simplest a small fraction were retained with the aid of the government. However, this vulnerability gave the impression to be one in all them, and it became patched only recently, suggesting that the N.S.A. may also have concluded the tool had been stolen and for this reason warned Microsoft.

But that changed into clearly too little, and far too late.

On Friday, hackers took talents of the undeniable fact that inclined goals — above all hospitals — had yet to patch their programs, either as a result of they had overlooked advisories from Microsoft or as a result of they have been using outdated utility that Microsoft not supports or updates.

The malware changed into circulated via email. Targets were dispatched an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its objectives. The proven fact that the files have been encrypted ensured that safety programs would not detect the ransomware except employees opened them, inadvertently enabling the ransomware to replicate throughout their employers’ networks.

Employees at Britain’s countrywide health service had been warned concerning the ransomware risk earlier on Friday. However, it changed into too late. as the disruptions rippled through at the least 36 hospitals, medical doctors’ offices and ambulance businesses across Britain, the fitness carrier declared the attack a “main incident,” warning that local health functions may be overwhelmed.

Britain’s fitness secretary, Jeremy Hunt, was briefed with the aid of cybersecurity specialists, while top Minister Theresa may additionally’s office stated on television that “we’re now not aware of any evidence that patient information has been compromised.”

Because the day wore on, dozens of agencies throughout Europe, Asia and the United States discovered that that they had been hit with the ransomware once they saw criminals’ messages on their computing device screens traumatic $300 to free up their information.

However, the criminals designed their ransomware to boost the ransom volume on a collection agenda and threatened to erase the hostage statistics after a predetermined cutoff time, elevating the urgency of the assault and increasing the likelihood that victims would pay.

Devoid of the capacity to decrypt, their statistics on their own, safety specialists spoke of that victims who had no longer backed up their information had been confronted with a decision: both reside without their statistics or pay. It turned into no longer clear how many victims finally paid.

Safety consultants informed corporations to automatically update their programs with the Microsoft patch.

Until organizations use the Microsoft patch, Mr. Camacho pointed out, they may proceed to be hit — not simply by way of ransomware, however with the aid of all kinds of malicious equipment that may manipulate, steal or delete their data.

“There goes to be a lot more of these assaults,” he said. “We’ll see copycats, and never only for ransomware, but other attacks.”



No te pierdas el tema anterior: Hackers are using subtitle video info to spread malware

Salta al siguiente tema: Unlocking the secrets to ransomware assaults

Quizás también te interese:
Si has encontrado información útil en Exaforo, ayúdanos a seguir creciendo. Muchas gracias por confiar en nosotros!


Volver a Zona virus