CNN - Breaking News, Latest News and Videos

Ransomeware Cyberattack Mega-Thread

Hi folks,
In light of the ongoing world-wide cyberattack/ransomware issue at the moment, we have decided to set up a mega-thread to contain all of the news and updates as things unfold. If you find new news or stories about the attacks, please do not submit them to the sub, please submit them here and I will periodically add the new links to a growing list. Pre-existing posts will remain but all new posts will be removed and directed here. Thank you to everyone who has posted and help spread the news so far!
EDIT: You can download the standalone update here directly from Microsoft.
SEE ALSO: /PCMasterRace discussion
(Sorted by newest first) (Updated May 15th 4PM (-8gmt))
Submitter Discussion Link
ManiaforBeatles Discussion Researchers see possible North Korea link to global cyber attack
jimrosenz Discussion Hardly Anyone Paying the Hackers? Because Using Bitcoin Is Hard
Ilikespacestuff Discussion The WannaCry ransomware has mysterious ties to North Korea
MBrandonLee Discussion The WannaCry ransomware attack was temporarily halted. But it’s not over yet.
OmahaVike Discussion Researchers: WannaCry ransomware shares code with North Korean malware - CyberScoop
swinglinefan Discussion The WannaCry Ransomware Hackers Made Some Major Mistakes
capcaunul Discussion WannaCry hackers had no intention of giving users their files back even if they pay
SuccessHook Discussion Microsoft says governments should stop 'hoarding' security vulnerabilities after WannaCry attack
zsreport Discussion WannaCry Ransomware: Microsoft Calls Out NSA For 'Stockpiling' Vulnerabilities
PCisLame Discussion Cyber attack latest: Vladimir Putin blames US for hack as thousands more computers hit by ransomware
PCisLame Discussion Worldwide ransomware attacks: What we know so far
bevmoon Discussion Worldwide cyberattack could spark more trouble Monday
marypin Discussion Microsoft’s response to widespread cyber attacks may make you WannaCry
dinesh848 Discussion What Is WannaCry, Who Is Affected, and Everything Else You Need to Know About It
destinyland Discussion Microsoft blasts spy agencies for leaked exploits used by WanaDecrypt0r
proto-sinaitic Discussion Microsoft calls out NSA, CIA for 'stockpiling of vulnerabilities' after major ransomware cyberattack
screaming_librarian Discussion Microsoft blames US Government for 'WannaCrypt' ransomware disaster
mikekavish Discussion Aftershocks May Last as U.S. Warns of Malware’s Complex Components
littleaurora Discussion If You Still Use Windows XP, Prepare For the Worst
temporarycreature Discussion Microsoft president blasts NSA for its role in 'WannaCry' computer ransom attack
PCisLame Discussion An unprecedented "ransomware" cyberattack that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek.
geekdad Discussion WCry/WanaCry Ransomware Technical Analysis
Blueismyfavcolour Discussion Revealed: The 22-year-old IT expert who saved the world from ransomware virus but lives for surfing
geekdad Discussion Microsoft's response to WannaCrypt
BlaqkAngel Discussion WannaCry - New Variants Detected
Greg-2012 Discussion 'Accidental hero' halts ransomware attack and warns: this is not over
Greg-2012 Discussion WannaCry ransomware: Researcher halts its spread by registering domain for $10.69
iliketechnews Discussion Global ‘Wana’ Ransomware Outbreak Earned Perpetrators $26,000 So Far
jb2386 Discussion Global ransomware cyberattack halted by a young engineer's opportunistic domain registration
mvea Discussion Defence Secretary unable to deny Trident nuclear submarines run on same outdated software hackers exploited to cripple NHS systems: 'I have complete confidence in our nuclear deterrent'
gankstar5 Discussion Cyber-attack threat escalating - Europol
Diazepam Discussion It's Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'
Captain_CockSmith Discussion For $10.69, British Researcher Slows Global Cyberattack
f0li Discussion A 22-year-old spent $11 and thwarted the global cyber attack
bulldog75 Discussion Ransomware attack reveals breakdown in US intelligence protocols, expert says
ManiaforBeatles Discussion A British researcher unexpectedly found and activated a "kill switch" to an "unprecedented" ransomware cyberattack that hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies, including FedEx.
LazyProspector Discussion Global cyber-attack: Security blogger halts ransomware 'by accident'
f0li Discussion How to Accidentally Stop a Global Cyber Attacks
PCisLame Discussion Edward Snowden points blame at NSA for not preventing NHS cyber attack
ppumkin Discussion NHS Hit by Ransomware.. and many others too!
viperex Discussion A Massive Ransomware 'Explosion' Is Hitting Targets All Over the World
Mattroeing Discussion Cyber attack spreads across 74 countries; some UK hospitals crippled
Lettershort Discussion Microsoft patches Windows XP to fight 'WannaCrypt' attacks
Doener23 Discussion 'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack
gumgum_bazuka Discussion UK hospitals hit with massive ransomware attack
mikekavish Discussion Wanna Decryptor: what is the NSA 'atom bomb of ransomware' behind the NHS attack?
FortuitousAdroit Discussion Player 3 Has Entered the Game: Say Hello to 'WannaCry'
FortuitousAdroit Discussion Customer Guidance for WannaCrypt attacks; Microsoft releases WannaCrypt protection for out-of-support products Windows XP, Windows 8, & Windows Server 2003
middleeastnewsman Discussion NHS cyber-attack: Amber Rudd says lessons must be learnt
FortuitousAdroit Discussion 'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack
campuscodi Discussion Microsoft Releases Patch for Older Windows Versions to Protect Against Wana Decrypt0r
_JCDK Discussion PSA: Kill switch for WannaCry found and active.
bevmoon Discussion Researcher finds 'kill switch' for cyberattack ransomeware
HaroldSmith_1 Discussion Malware, from NSA documents, hacks computers worldwide
FortuitousAdroit Discussion Huge Ransomware Attack Spreads Across Globe: What to Do
jimmyradola Discussion Major Cyber-Attack Hits NHS - Hackers Demand Ransom £233
maxwellhill Discussion NSA Tools, Built Despite Warnings, Used in Global Cyber Attack
tellman1257 Discussion Full coverage of the massive ransomware attacks that hit hospitals across the world today, May 12, 2017 (Click the downward arrow to the left of "More" to see all headlines and tweets)
littleaurora Discussion Update your Windows systems now. Right now.
FortuitousAdroit Discussion Wcrypt 'ransom ware' infections over the last 24 hours
stupidstupidreddit Discussion Global extortion cyberattack hits dozens of nations
FortuitousAdroit Discussion Leaked NSA Malware Is Helping Hijack Computers Around the World
Imnaha2 Discussion Massive Global Ransomware Attack Underway, Patch Available
BauerHouse Discussion Massive ransomware cyber-attack hits 74 countries around the world
eye_josh Discussion What We Know and Don't Know About the International Cyberattack, NYT Live updates
Lighting Discussion Massive Malware Cyberattack Hits English Hospitals, FedEx. Attackers demand bitcoin.
aaron7897 Discussion Massive ransomware attack hits 74 countries
rafaelloaa Discussion Malware, described in leaked NSA documents, cripples computers worldwide
callcybercop Discussion Ransomware infections reported worldwide
PHPiyan Discussion NHS cyber-attack: GPs and hospitals hit by ransomware - BBC News
nowhathappenedwas Discussion Apparent NSA tools behind massive hospital ransomware attacks around the world
I_have_no_mercy Discussion Cyberattacks in 12 Nations Said to Use Leaked N.S.A. Hacking Tool
thatshirtman Discussion Ransomware infections reported worldwide
ancsunamun Discussion WannaCrypt0r Ransomware Using NSA Exploit Leaked by Shadow Brokers Is on a Rampage
stupidstupidreddit Discussion English hospitals divert ambulances after 'ransomware' cyber attack
Bevmoon Discussion Hospitals across England hit by ransomware cyber attack, systems knocked offline
Imnaha2 Discussion WCry ransomware explodes in massive distribution wave
paradiselost79 Discussion NHS England hit by 'cyber attack'
sidcool1234 Discussion NHS hospitals hit by cyber attack 'creeping' across England
Henderino Discussion NHS England hit by 'cyber attack'
LUXURY_COMMUNISM_NOW Discussion NHS cyber attack: Large-scale hack forces hospitals across England to divert emergency patients
I_have_no_mercy Discussion Cyberattacks in 12 Nations Said to Use Leaked N.S.A. Hacking Tool
Grepnork Discussion Hospitals across England hit by large-scale cyber-attack
TheoDW Discussion Spanish companies hit by ransomware cyber attack
submitted by abrownn to technology [link] [comments]

10 Most Dangerous Viruses in Internet History.

Getting a computer virus has happened to many users in some fashion or another. To most, it is simply a mild inconvenience, requiring a cleanup and then installing that antivirus program that you’ve been meaning to install but never got around to. But in other cases, it can be a complete disaster, with your computer turning into a very expensive brick which which no amount of antivirus can protect.
In this list, we will highlight some of the worst and notorious computer viruses that have caused a lot of damage in real life. And since people usually equate general malware like worms and trojan horses as viruses, we’re including them as well. These malware have caused tremendous harm, amounting to billions of dollars and disrupting critical real life infrastructure. Here are the 10 most famous and malicious computer viruses.
Recommended Reading: 10 Signs Your PC Has Been Compromised

1. ILOVEYOU

The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it’s not hard to see why. The virus managed to wreck havoc on computer systems all over the world, causing damages totaling in at an estimateof $10 billion. 10% of the world’s Internet-connected computers were believed to have been infected. It was so bad that governments and large corporations took their mailing system offline to prevent infection.
📷via BBC
The virus was created by two Filipino programers, Reonel Ramones and Onel de Guzman. What it did was use social engineering to get people to click on the attachment; in this case, a love confession. The attachment was actually a script that poses as a TXT file, due to Windows at the time hiding the actual extension of the file. Once clicked, it will send itself to everyone in the user’s mailing list and proceed to overwrite files with itself, making the computer unbootable. The two were never charged, as there were no laws about malware. This led to the enactment of the E-Commerce Law to address the problem.

2. Code Red

Code Red first surfaced on 2001 and was discovered by two eEye Digital Security employees. It was named Code Red because the the pair were drinking Code Red Mountain Dew at the time of discovery. The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system. It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes. Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources.
📷via F-Secure
It will then launch a denial of service attack on several IP address, famous among them the website of the White House. It also allows backdoor access to the server, allowing for remote access to the machine. The most memorable symptom is the message it leaves behind on affected web pages, "Hacked By Chinese!", which has become a meme itself. A patch was later released and it was estimate that it caused $2 billion in lost productivity. A total of 1-2 million servers were affected, which is amazing when you consider there were 6 million IIS servers at the time.

3. Melissa

Named after an exotic dancer from Florida, it was created by David L. Smith in 1999. It started as an infected Word document that was posted up on the alt.sex usenet group, claiming to be a list of passwords for pornographic sites. This got people curious and when it was downloaded and opened, it would trigger the macro inside and unleash its payload. The virus will mail itself to the top 50 people in the user’s email address book and this caused an increase of email traffic, disrupting the email services of governments and corporations. It also sometimes corrupted documents by inserting a Simpsons reference into them.
📷via MSN Canada
Smith was eventually caught when they traced the Word document to him. The file was uploaded using a stolen AOL account and with their help, law enforcement was able to arrest him less than a week since the outbreak began.He cooperated with the FBI in capturing other virus creators, famous among them the creator of the Anna Kournikova virus. For his cooperation, he served only 20 months and paid a fine of $5000 of his 10 year sentence. The virus reportedly caused $80 million in damages.

4. Sasser

A Windows worm first discovered in 2004, it was created by computer science student Sven Jaschan, who also created the Netsky worm. While the payload itself may be seen as simply annoying (it slows down and crashes the computer, while making it hard to reset without cutting the power), the effects were incredibly disruptive, with millions of computers being infected, and important, critical infrastructure affected. The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS), which controls the security policy of local accounts causing crashes to the computer. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically.
📷via HP
The effects of the virus were widespread as while the exploit was already patched, many computers haven’t updated. This led to more than a million infections, taking out critical infrastructures, such as airlines, news agencies, public transportation, hospitals, public transport, etc. Overall, the damage was estimated to have cost $18 billion. Jaschen was tried as a minor and received a 21 month suspended sentence.

5. Zeus

Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing. The majority of computers were infected either through drive-by downloads or phishing scams. First identified in 2009, it managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.
📷via Abuse.ch
In the US alone, it was estimated that more than 1 million computers were infected, with 25% in the US. The entire operation was sophisticated, involving people from around the world to act as money mules to smuggle and transfer cash to the ringleaders in Eastern Europe. About $70 million were stolen and in possession of the ring. 100 people were arrested in connection of the operation. In late 2010, the creator of Zeus announced his retirement but many experts believe this to be false.

6. Conficker

Also known as Downup or Downadup, Conficker is a worm of unknown authorship for Windows that made its first appearance in 2008. The name comes form the English word, configure and a German pejorative.It infects computers using flaws in the OS to create a botnet. The malware was able to infect more than 9 millions computers all around the world, affecting governments, businesses and individuals. It was one of the largest known worm infections to ever surface causing an estimate damage of $9 billion.
📷via Wikipedia
The worm works by exploiting a network service vulnerability that was present and unpatched in Windows. Once infected, the worm will then reset account lockout policies, block access to Windows update and antivirus sites, turn off certain services and lock out user accounts among many. Then, it proceeds to install software that will turn the computer into a botnet slaveand scareware to scam money off the user. Microsoft later provided a fix and patch with many antivirus vendors providing updates to their definitions.

7. Stuxnet

Believed to have been created by the Israeli Defence Force together with the American Government, Stuxnet is an example of a virus created for the purpose of cyberwarfare, as it was intended to disrupt the nuclear efforts of the Iranians. It was estimated that Stuxnet has managed to ruin one fifth of Iran’s nuclear centrifuges and that nearly 60% of infections were concentrated in Iran.
📷via IEEE
The computer worm was designed to attack industrial Programmable Logic Controllers (PLC), which allows for automation of processes in machinery. It specifically aimed at those created by Siemens and was spread through infected USB drives. If the infected computer didn’t contain Siemens software, it would lay dormant and infect others in a limited fashion as to not give itself away. If the software is there, it will then proceed to alter the speed of the machinery, causing it to tear apart. Siemens eventually found a way to remove the malware from their software.

8. Mydoom

Surfacing in 2004, Mydoom was a worm for Windows that became one of the fastest spreading email worm since ILOVEYOU. The author is unknown and it is believed that the creator was paid to create it since it contains the text message, “andy; I’m just doing my job, nothing personal, sorry,”. It was named by McAfee employee Craig Schmugar, one of the people who had originally discovered it. ‘mydom’ was a line of text in the program’s code (my domain) and sensing this was going to be big, added ‘doom’ into it.
📷via Virus.Wikidot.com
The worm spreads itself by appearing as an email transmission error and contains an attachment of itself. Once executed, it will send itself to email addresses that are in a user’s address book and copies itself to any P2P program’s folder to propagate itself through that network. The payload itself is twofold: first it opens up a backdoor to allow remote access and second it launches a denial of service attack on the controversial SCO Group. It was believed that the worm was created to disrupt SCO due to conflict over ownership of some Linux code. It caused an estimate of $38.5 billion in damages and the worm is still active in some form today.

9. CryptoLocker

CryptoLocker is a form of Trojan horse ransomware targeted at computers running Windows. It uses several methods to spread itself, such as email, and once a computer is infected, it will proceed to encrypt certain files on the hard drive and any mounted storage connected to it with RSA public key cryptography. While it is easy enough to remove the malware from the computer, the files will still remain encrypted. The only way to unlock the files is to pay a ransom by a deadline. If the deadline is not met, the ransom will increase significantly or the decryption keys deleted. The ransom usually amount to $400 in prepaid cash or bitcoin.
📷via Bleepingcomputer.com
The ransom operation was eventually stopped when law enforcement agencies and security companies managed to take control part of the botnet operating CryptoLocker and Zeus. Evgeniy Bogachev, the ring leader, was charged and the encryption keys were released to the affected computers. From data collected from the raid, the number of infections is estimated to be 500,000, with the number of those who paid the ransom to be at 1.3%, amounting to $3 million.

10. Flashback

Though not as damaging as the rest of the malware on this list, this is one of the few Mac malware to have gain notoriety as it showed that Macs are not immune. The Trojan was first discovered in 2011 by antivirus company Intego as a fake Flash install. In its newer incarnation, a user simply needs to have Java enabled (which is likely the majority of us). It propagates itself by using compromised websites containing JavaScript code that will download the payload. Once installed, the Mac becomes part of a botnet of other infected Macs.
📷via CNET
The good news is that if it is infected, it is simply localized to that specific user’s account. The bad news is that more than 600,000 Macs were infected, including 274 Macs in the Cupertino area, the headquarters of Apple. Oracle published a fix for the exploit with Apple releasing an update to remove Flashback from people’s Mac. It is still out in the wild, with an estimate of 22,000 Macs still infected as of 2014.
submitted by bogdan9409 to u/bogdan9409 [link] [comments]

Of Wolves and Weasels - Day 522 - Weekly Wrapup #68 - Sharing Sunday Edition!

Hey all, GoodShibe here!
Today is our second 'Sharing Sunday' and the concept is really quite simple.
Wear your Dogecoin shirt and go out and do some good for your local community today.
Volunteer at your church, or help at a soup kitchen or go help clean up the local park or help out at the local animal shelter.
Do good things, be a part of your community while opening an invite to ours. :D)
This is a fantastic opportunity to be a great Shibe out there today, my friends!
And, please, share some pics and a story of what you did here on the sub!
If you can't get out there today, please consider joining the Dogecoin.com FreeRice team and helping to earn some free food for those who truly need it!.
Finally, this was your week in Dogecoin.
This Week’s oWaWs
Announcements
Top Images/Memes of the Week
Other Cool Stuff
Did I miss something? Of course I did! Please let me know in the comments and I'll add it in! :D)
It's 8:42AM EST and we've found 99.78% of our first 100 Billion DOGEs! Our Global Hashrate is up from ~1150 to ~1170 Gigahashes per second and our Difficulty is up from ~14160 to ~15734.
As always, I appreciate your support!
GoodShibe
submitted by GoodShibe to dogecoin [link] [comments]

Mass Surveillance News Collection from 2010

>>>>>>>>> Mass Surveillance
>>>>>>>>> Cognitive Infiltration and Mass Social Psychology Abuse
>>>>>>>> Smartphone Intrusion, Remote activation of Mics and Cameras
>>>>>>>>>>>>>>>>>>>>>>> Ways and Means; Technology and Law
>>>>>>> AT&T
>>>>>>>>>> Amazon, Apple, Facebook, Google, Microsoft, Twitter, Yahoo
>>>>>>>> Goals
>>>>>>>>>>> Lies, Coverups, Resource Misuse, and Danger of Tacit Complicity
>>>>>> Global Deep State Cooperation and Imitation
>>>>>>>>> Hardware, Rootkit, FIrmware Spyware
>>>>>>>> Blowback
>>>>>> Exoteric, Stated Goals of the Security State Have Failed
....CONTINUED IN COMMENTS
submitted by 911bodysnatchers322 to conspiracy [link] [comments]

CNN - YouTube Bitcoin Price Live Stream!! - YouTube Bitcoin Exchange Bot  Best Online Bitcoin Trading Bot  Bitcoin Exchange Robot Part 3 Ethereum Crash Live Stream! Bitcoin - YouTube Bitcoin: Beyond The Bubble - Full Documentary - YouTube

On Dec. 6, 2017, approximately USD $52 million worth of Bitcoin mysteriously disappeared from the coffers of NiceHash, a Slovenian company that lets users sell their computing power to help others ... DOJ moves to take down Joanap botnet operated by North Korean state hackers. The DOJ, FBI, and US Air Force to contact victims infected with the Joanap malware. Edition. U.S. International; Arabic; Español ... the bot is given $100 in Bitcoin to buy a new, random item. Hide Caption. 6 of 20. Photos: Shopping in the dark. The parcels are generally ... Watch breaking news videos, viral videos and original video clips on CNN.com. View the latest news and breaking news today for U.S., world, weather, entertainment, politics and health at CNN.com.

[index] [48621] [47866] [23659] [11553] [1053] [35189] [39848] [41471] [2919] [414]

CNN - YouTube

Here are Today's MadBits: Bitcoin prices took a bit of a tumble down to a Low of $86, a Last of $90 and a High of $98 with a Volume of 54,937. 1.) Botcoin: Bitcoin Mining by Botnet Bitcoin fake transaction is a software which allows you to send false bitcoin transactions with 100% confirmation (watch the demo video live) and which can also be canceled. Before using the ... Thanks for watching! For donations: Bitcoin - 1CpGMM8Ag8gNYL3FffusVqEBUvHyYenTP8 bitcoin adder! download here https://rocketr.net/buy/d4e179a87799 Steve Mckay As Seen On Cnn News Fortune Steve Mckay From Bitcoin Loophole http://bitcoin-loophole.com Bitcoin Loophole - Bitcoin Loophole Review -. Bitcoin L...

#