Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
WannaCry Remains No. 1 Ransomware Weapon
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
8/27/2019 | 2:30:45 PM
The most effective defense?
An educated user pool to start with with basic rules of email iusage.  Secondly a verified, vetted and tested  backup and restoration plan --- make sure it works.  Third are active patching and firewall monitoring.  All fall under the care of the internal IT staff and if they do not do these chores ..... well, Welcome to Hell.  
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/27/2019 | 2:33:48 PM
Re: The most effective defense?
All good points. But when their apps or processes still rely on antiquated OSes like Win7 and updating disrupts the biz, then some orgs just ride it out with security tools to catch these threats, etc.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
8/27/2019 | 2:54:38 PM
Re: The most effective defense?
True and the OS update issue is the responsibility of the IT staff and team to make clear and evident - THAT is their job and all too often, well, disrupting the business is just TOO HARD.  Like that patch that brought down Equifax.  Right?   I work with a CSirt team using great tools and while every firm and small business may not have access, it still has to be tackled as best allowed.  But keeping old W7 systems running now is asking for trouble.  As it was with XP ( of which alot of that is still out there on legacy boxes).  The IT staff has a daunting job sometimes but it is THEIR JOB and if they do not like it, there are always trade school courses on welding. 

Disclaimer: I am something of an expert on disaster recovery techniques when 18 years ago I had to walk down out of my office building in lower Manhattan and shortly later the data center on the 103rd floor of the south tower followed me down.  I am a survivor of that day from Aon, on the 101st floor, S-tower, of the World Trade Center.
AndrewfOP
50%
50%
AndrewfOP,
User Rank: Moderator
8/28/2019 | 9:20:57 AM
Re: The most effective defense?
"All good points. But when their apps or processes still rely on antiquated OSes like Win7 and updating disrupts the biz, then some orgs just ride it out with security tools to catch these threats, etc."

While I sympathize with the familiarities of existing business tools on machines with old Window systems and the disruptions caused on replacing them, it's still no excuse not to plan for the future with new tools fitting business needs that would be compatible with the latest OS. Especially now that Microsoft seems to be getting out of making-new-Windows-to-make-money business, future disruptions to business should be minimal and all the more reason to get new tools with security features built in.

 
tdsan
50%
50%
tdsan,
User Rank: Ninja
8/28/2019 | 6:48:52 PM
Re: The most effective defense?
Andrew, I must agree with you, there is no excuse.

Companies are still holding on to Windows 7 (wow), this is what it means to be loyal to a fault or not have the personnel on staff to make this migration happen (holding on to the very end).

After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7

I do think there are solutions to this problem, roll-out VDI solution and deploy desktops in a virtual session, this can be easily done without breaking the bank. VMware HorizonView or Citrix XenDesktop/XenApp work, if they want to go to the cloud, use WorkSpaces, there are a number of things they could have done.

At the end of the day, it is time to move off this platform, this says a lot about companies not taking into consideration the time and planning stages they could have planned to create a seamless migration process. When companies are hacked, the business owners, executive staff members should be removed from their position because they did not follow best practices and follow due-diligence.

Windows 7 End of Life

T
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2019 | 1:29:02 PM
WannaCry

The main lesson is to keep the systems up to date, obvisuly. 

 

Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2019 | 1:31:39 PM
Re: The most effective defense?
"Companies are still holding on to Windows 7"

Yes I'm working with a few other companies where they are still using Windows 7. It is running but will not be secure anymore. 

 

Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2019 | 1:33:06 PM
Re: The most effective defense?
"When companies are hacked, the business owners, executive staff members should be removed from their position because they did not follow best practices and follow due-diligence."

I would say there should be some responsibilities, not everybody is directly involved into this type of activities such as upgrading Win 7.

 

Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2019 | 1:34:19 PM
Re: The most effective defense?
"VMware HorizonView or Citrix XenDesktop/XenApp work, if they want to go to the cloud, use WorkSpaces"

I agree, that is true but they are very expensive at the same time.

 

Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2019 | 1:36:10 PM
Re: The most effective defense?
"it's still no excuse not to plan for the future with new tools fitting business needs that would be compatible with the latest OS"

I would agree with this, there shouldn't be so much effort anyway as long as you standardized your upgrade process.

 

Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4229
PUBLISHED: 2020-06-05
IBM Worklight/MobileFoundation 8.0.0.0 does not properly invalidate session cookies when a user logs out of a session, which could allow another user to gain unauthorized access to a user's session. IBM X-Force ID: 175211.
CVE-2020-4448
PUBLISHED: 2020-06-05
IBM WebSphere Application Server Network Deployment 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 181228.
CVE-2020-4449
PUBLISHED: 2020-06-05
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional could allow a remote attacker to obtain sensitive information with a specially-crafted sequence of serialized objects. IBM X-Force ID: 181230.
CVE-2020-4450
PUBLISHED: 2020-06-05
IBM WebSphere Application Server 8.5 and 9.0 traditional could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects. IBM X-Force ID: 181231.
CVE-2020-8103
PUBLISHED: 2020-06-05
A vulnerability in the improper handling of symbolic links in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects Bitdefender Antivirus Free versions prior to 1.0.17.178.