Heh, dobro :) Aj kad sam već ovdje, neki genijelac je napravio decripter.
http://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html
Dakle, ako znate nekoga tko je jadan doživio lockanje kompa, javite mu da ima lijeka za
pola cijene će mu stručnjaci BOL-a odraditi zahtjevan posao otključavanja :P
Heh, dobro :) Aj kad sam već ovdje, neki genijelac je napravio decripter.
http://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html
Dakle, ako znate nekoga tko je jadan doživio lockanje kompa, javite mu da ima lijeka za
pola cijene će mu stručnjaci BOL-a odraditi zahtjevan posao otključavanja :P
...samo postoje 2 bitne stavke:
So, that means, this method will work only if:
- The affected computer has not been rebooted after being infected.
- The associated memory has not been allocated and erased by some other process.
Znači uskoro 3.0 verzija koja ispravlja ovaj bug u malwareu
Znači uskoro 3.0 verzija koja ispravlja ovaj bug u malwareu
A jasno. Mora se paziti na klijente. Nemožeš samo izdati v1 i bok.
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
https://www.bleepingcomputer.com/news/security/new-smb-worm-uses-seven-nsa-hacking-tools-wannacry-used-just-two/
Researchers have detected a new worm that is spreading via SMB, but unlike the worm component of the WannaCry ransomware, this one is using seven NSA tools instead of two.
The worm's existence first came to light on Wednesday, after it infected the SMB honeypot of Miroslav Stampar, member of the Croatian Government CERT, and creator of the sqlmap tool used for detecting and exploiting SQL injection flaws.