Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
WannaCry Remains No. 1 Ransomware Weapon
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2019 | 1:29:02 PM
WannaCry

The main lesson is to keep the systems up to date, obvisuly. 

 

tdsan
50%
50%
tdsan,
User Rank: Ninja
8/28/2019 | 6:48:52 PM
Re: The most effective defense?
Andrew, I must agree with you, there is no excuse.

Companies are still holding on to Windows 7 (wow), this is what it means to be loyal to a fault or not have the personnel on staff to make this migration happen (holding on to the very end).

After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7

I do think there are solutions to this problem, roll-out VDI solution and deploy desktops in a virtual session, this can be easily done without breaking the bank. VMware HorizonView or Citrix XenDesktop/XenApp work, if they want to go to the cloud, use WorkSpaces, there are a number of things they could have done.

At the end of the day, it is time to move off this platform, this says a lot about companies not taking into consideration the time and planning stages they could have planned to create a seamless migration process. When companies are hacked, the business owners, executive staff members should be removed from their position because they did not follow best practices and follow due-diligence.

Windows 7 End of Life

T
AndrewfOP
50%
50%
AndrewfOP,
User Rank: Moderator
8/28/2019 | 9:20:57 AM
Re: The most effective defense?
"All good points. But when their apps or processes still rely on antiquated OSes like Win7 and updating disrupts the biz, then some orgs just ride it out with security tools to catch these threats, etc."

While I sympathize with the familiarities of existing business tools on machines with old Window systems and the disruptions caused on replacing them, it's still no excuse not to plan for the future with new tools fitting business needs that would be compatible with the latest OS. Especially now that Microsoft seems to be getting out of making-new-Windows-to-make-money business, future disruptions to business should be minimal and all the more reason to get new tools with security features built in.

 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
8/27/2019 | 2:54:38 PM
Re: The most effective defense?
True and the OS update issue is the responsibility of the IT staff and team to make clear and evident - THAT is their job and all too often, well, disrupting the business is just TOO HARD.  Like that patch that brought down Equifax.  Right?   I work with a CSirt team using great tools and while every firm and small business may not have access, it still has to be tackled as best allowed.  But keeping old W7 systems running now is asking for trouble.  As it was with XP ( of which alot of that is still out there on legacy boxes).  The IT staff has a daunting job sometimes but it is THEIR JOB and if they do not like it, there are always trade school courses on welding. 

Disclaimer: I am something of an expert on disaster recovery techniques when 18 years ago I had to walk down out of my office building in lower Manhattan and shortly later the data center on the 103rd floor of the south tower followed me down.  I am a survivor of that day from Aon, on the 101st floor, S-tower, of the World Trade Center.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/27/2019 | 2:33:48 PM
Re: The most effective defense?
All good points. But when their apps or processes still rely on antiquated OSes like Win7 and updating disrupts the biz, then some orgs just ride it out with security tools to catch these threats, etc.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
8/27/2019 | 2:30:45 PM
The most effective defense?
An educated user pool to start with with basic rules of email iusage.  Secondly a verified, vetted and tested  backup and restoration plan --- make sure it works.  Third are active patching and firewall monitoring.  All fall under the care of the internal IT staff and if they do not do these chores ..... well, Welcome to Hell.  
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Data Loss Spikes Under COVID-19 Lockdowns
Seth Rosenblatt, Contributing Writer,  5/28/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13777
PUBLISHED: 2020-06-04
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TL...
CVE-2020-10548
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10549
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10546
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10547
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.