Microsoft Emergency security patches

90°
Deal Subedar
mengde_adi

Download this latest security patches to be protected from Ransomware by Microsoft
http://www.catalog.update.microsoft.com/Search....

5 Comments  |  
4 Dimers
  • Sort By
Entertainer Entertainer
Link Copied

Ok

Deal Newbie Deal Newbie
Link Copied

For those who wish to check the details/summary http://technet.microsoft.com/en-us/library/security/ms17-010.aspx can refer to the Technet/MSDN MS17-010 bulletin.
also, besides exercising generaal caution, one can even use robust and yet free anti-virii or firewalls like those from Comodo.
[one can find the video review of this ransomware pitted against Comodo firewall, at many on-line forums and youtube, but the idea of auto-containment is age old.]
reading this brief blog-post from 2015 might help get insights http://blog.comodo.com/containment/fileinfectors-vs-comodo-auto-containment.

a young (22 years ol’) Brit tech/security analyst/researcher (who goes by the pseudonym MalwareTech) has already (accidentally) activated the kill switch earlier this week by registering the weird long domain name meant for the ping and stop. so this variant of WannaCry is no longer spreading unrestricted.

MS released it as ‘critical’ update.
but as per habit (and after having burnt ones finger due to buggy updates) I always prefer to keep the discretion to download and the discretion to install the patches or updates.
Keeping it open or allowing auto update to do it all is not required when one has a fairly good idea of which updates are really relevant for one’s rig or one can find out (research) if the released update/ KB is free from glitches.
[in the days of http://v6.windowsupdate.microsoft.com or Microsoft Update (Office suie) it was not uncommon for the .Net related updates to screw things UP https://cdn3.desidime.com/assets/textile-editor/icon_sad.gif unexpectedly. sometimes irreversible/ KB could not be ’uninstalled.]
Microsoft Knowledge Base Article 4013389
re-directs to region/location specific page like https://support.microsoft.com/en-gb/help/4013389/title
Article ID: 4013389 – Last Review: 14-Mar-2017 – Revision: 5

Deal Newbie Deal Newbie
Link Copied

missed to post it day before
or other threads came up on top/first page in the sub-forum

@bux wrote:
http://www.360totalsecurity.com/en/tools/document-protector/?utm_content=Toolbox.ransomwaredecryptor&utm_medium=link&utm_source=IA

Hi @bux, the thought behind this was really nice that you are sharing
what you think to be a helpful tool.
however in times of confusion and panic, going to rather lesser known
or if one is gullible… then going to any random link someone gets
MIGHT INCREASE THEIR (the gullible person’s) vulnerability or issues
with some other stuff.
We all know how adware and spyware or data leechers sneak into such
‘your computer is affected’ utilities (most of whom have their own
agenda).

THEN there are whatsapp junkies https://cdn2.desidime.com/assets/textile-editor/icon_evil.gif who further the cause of
mischief mongers by regurgitating things that may or may not be
relevant or even true.
(itzdreaming, sajid.miz1994828 can please take a bow for ⇫ the abovehttps://i.imgur.com/9HTeVNo.gif)
(in so far as i know) the kill switch is already (accidentally) activated by
the 22 year ol’ Brit security guy (MalwareTech) who registered the long domain name
which (would have) acted as a ping checker for the malware.

so now this variant at-least is NOT spreading any-more.


as for the auto containment and OS affected.
Since this one was MS-Windows specific
I think it’d be more beneficial if THIS page/link http://technet.microsoft.com/en-us/library/security/ms17-010.aspx
since it is authentic and reliable source to plug at-least one side
of the issue (operating system).


FOR GENERIC AUTO CONTAINMENT AND SANDBOXING, there are rather simple,
small and even free software and firewalls available WHICH WORK AS
GOOD AS paid products.
NOT promoting COMODO (their video review of the firewall stopping
WannaCry is easily searched)
But their confidence in their product has always been there http://blog.comodo.com/containment/fileinfectors-vs-comodo-auto-containment
people can understand this if they want to and then chose any product
of their own liking for day zero protection (blocking based on
pattern).



symantec.com/security_response/attacksignatures/detail.jsp?asid=23737
Incidentally, ever since ‘System Restore’ first came as a feature on
MS-Windows, I’ve made sure to disable it/keep it off. (barely 3-4
months is what I used long time back to realise it was a rather sharp,
twin edged sword).

as DealSeeker rightly pointed out, being cautious even if it is
restrictive does not hurt as much.
I think I am not the only person who usually keeps javascript
completely OFF or on a tight leash. there are others too who do so,
despite having to forgo functionality on many sites (for example, on
desktop site of Desidime, tagging auto suggestion only works via
scripts).
@wolf you are so right friend.. https://cdn2.desidime.com/assets/textile-editor/icon_wink.gif for many seniors in the extended family, even to this date the habit to refer to EVERYthing by the generic ‘virus’ aa gaya. once even a simply (non virus related) hard-disk bad sector (later detected as: possibly physical damage) too was virus. https://cdn2.desidime.com/assets/textile-editor/icon_toungueout.gif `

’…but from what i understand, unless i have any malicious file downloaded to my system, the execution of this ransomware is not possible…"
@srp321 may be not ransomware (or THIS ransomware) but malicious code can be and does get injected even by opening/running ‘some’ sites.
so this is just appending to what DS re-re-re-iterated, generally it is best to quarantine or isolate or have a VPC when doing carefree (careless) browsing.
In the hey-days of javascript executed machine takeover (using it for botnet) or those pesky stuff that attacks critical background processes or simply loves deleting files..
i could STILL MANAGE TO KEEP MY (back then XP) MACHINE FREE FROM ISSUES EVEN during a brief spell (40-45 days) WITHOUT ANY ANTI-VIRUS, simply by limiting my use to ONLY bare essential sites and manually checking for the suspects (if any) in the known folders or periodically comparing previously noted signatures of specific Windows files.
@rak it was and always wil be subjective. for the time being, most Windows machines are safe and on individual level you might be ‘safe’ (as you call it).
but overall such stuff keeps evolving fast and only one’s own caution and some really robost day zero protection/ sandboxing software (anti virri, Firewalls, internet gateway monitoring utilities) can help.
THIS makes for a good read and one can get a fair idea of ‘how to’ http://www.symantec.com/connect/blogs/guide-zero-day-exploits
Disclaimer: have been a user of SEP, Comodo, MSSE and few others at various points. Found out Nortons in early years of starting to use a PC, thus always have a slight bias for Symantec. (always used legit SEP, mostly on corporate or office machines)

Deal Colonel Deal Colonel
Link Copied

hi bro how are you toungueout

View 1 more reply
replyuser
Click here to reply
Reply