A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows 7 » Windows 7 Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Almost all WannaCry victims were running Windows 7



 
 
Thread Tools Rate Thread Display Modes
  #1  
Old May 20th 17, 10:54 AM posted to alt.privacy.anon-server, alt.windows7.general,comp.os.linux.advocacy, alt.comp.hardware.pc-homebuilt
Anonymous Remailer (austria)
external usenet poster
 
Posts: 550
Default Almost all WannaCry victims were running Windows 7


One week after it first hit, researchers are getting a better
handle on how the WannaCry ransomware spread so quickly — and
judging from the early figures, the story seems to be almost
entirely about Windows 7.

According to data released today by Kaspersky Lab, roughly 98
percent of the computers affected by the ransomware were running
some version of Windows 7, with less than one in a thousand
running Windows XP. 2008 R2 Server clients were also hit hard,
making up just over 1 percent of infections.

https://www.theverge.com/2017/5/19/1...cry-windows-7-
version-xp-patched-victim-statistics

Ads
  #2  
Old May 20th 17, 12:37 PM posted to alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy,alt.comp.hardware.pc-homebuilt
burfordTjustice
external usenet poster
 
Posts: 246
Default Almost all WannaCry victims were running Windows 7

On Sat, 20 May 2017 11:54:17 +0200 (CEST)
"Anonymous Remailer (austria)" wrote:

Organization: dizum.com - The Internet Problem Provider



You are not believable.
  #3  
Old May 20th 17, 02:29 PM posted to alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy,alt.comp.hardware.pc-homebuilt
Nobody[_8_]
external usenet poster
 
Posts: 52
Default Almost all WannaCry victims were running Windows 7

On 05/20/2017 06:37 AM, burfordTjustice wrote:
On Sat, 20 May 2017 11:54:17 +0200 (CEST)
"Anonymous Remailer (austria)" wrote:

Organization: dizum.com - The Internet Problem Provider



You are not believable.


The article is posted on The Verge, not written by the OP.

"One week after it first hit, researchers are getting a better handle on
how the WannaCry ransomware spread so quickly — and judging from the
early figures, the story seems to be almost entirely about Windows 7."

"According to data released today by Kaspersky Lab, roughly 98 percent
of the computers affected by the ransomware were running some version of
Windows 7, with less than one in a thousand running Windows XP. 2008 R2
Server clients were also hit hard, making up just over 1 percent of
infections."

https://www.theverge.com/2017/5/19/1...tim-statistics



  #4  
Old May 20th 17, 04:19 PM posted to alt.windows7.general
David E. Ross[_2_]
external usenet poster
 
Posts: 1,035
Default Almost all WannaCry victims were running Windows 7

On 5/20/2017 6:29 AM, Nobody wrote:
On 05/20/2017 06:37 AM, burfordTjustice wrote:
On Sat, 20 May 2017 11:54:17 +0200 (CEST)
"Anonymous Remailer (austria)" wrote:

Organization: dizum.com - The Internet Problem Provider



You are not believable.


The article is posted on The Verge, not written by the OP.

"One week after it first hit, researchers are getting a better handle on
how the WannaCry ransomware spread so quickly — and judging from the
early figures, the story seems to be almost entirely about Windows 7."

"According to data released today by Kaspersky Lab, roughly 98 percent
of the computers affected by the ransomware were running some version of
Windows 7, with less than one in a thousand running Windows XP. 2008 R2
Server clients were also hit hard, making up just over 1 percent of
infections."

https://www.theverge.com/2017/5/19/1...tim-statistics




However, Micro$oft released a security update to Windows 10 to block
WannaCry and WannaCrypt. To me, this indicates that Windows 10 was no
less vulnerable than Windows 7.

No matter what systems were actually attacked, much of the blame should
be focused on the U.S. National Security Agency (NSA). The NSA
developed the tool used for ransomware and failed to secure its own
computer systems against theft of that malware. The NSA therefore put
United States -- people, businesses, organizations, and even the
government itself -- at risk instead of protecting us.

See my "The Great Computer Plague of 2017" at
http://www.rossde.com/editorials/edtl_PCplague.html.

--
David E. Ross
http://www.rossde.com

Consider:
* Most state mandate that drivers have liability insurance.
* Employers are mandated to have worker's compensation insurance.
* If you live in a flood zone, flood insurance is mandatory.
* If your home has a mortgage, fire insurance is mandatory.

Why then is mandatory health insurance so bad??
  #5  
Old May 20th 17, 04:24 PM posted to alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy,alt.comp.hardware.pc-homebuilt
burfordTjustice
external usenet poster
 
Posts: 246
Default Almost all WannaCry victims were running Windows 7

On Sat, 20 May 2017 08:29:47 -0500
Nobody wrote:

From: Nobody
Subject: Almost all WannaCry victims were running Windows 7
Date: Sat, 20 May 2017 08:29:47 -0500
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101
Icedove/31.7.0 Newsgroups:
alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy ,alt.comp.hardware.pc-homebuilt
Organization: albasani.net


So what?
  #6  
Old May 20th 17, 05:14 PM posted to alt.windows7.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default Almost all WannaCry victims were running Windows 7

David E. Ross wrote:
On 5/20/2017 6:29 AM, Nobody wrote:
On 05/20/2017 06:37 AM, burfordTjustice wrote:
On Sat, 20 May 2017 11:54:17 +0200 (CEST)
"Anonymous Remailer (austria)" wrote:

Organization: dizum.com - The Internet Problem Provider

You are not believable.

The article is posted on The Verge, not written by the OP.

"One week after it first hit, researchers are getting a better handle on
how the WannaCry ransomware spread so quickly — and judging from the
early figures, the story seems to be almost entirely about Windows 7."

"According to data released today by Kaspersky Lab, roughly 98 percent
of the computers affected by the ransomware were running some version of
Windows 7, with less than one in a thousand running Windows XP. 2008 R2
Server clients were also hit hard, making up just over 1 percent of
infections."

https://www.theverge.com/2017/5/19/1...tim-statistics




However, Micro$oft released a security update to Windows 10 to block
WannaCry and WannaCrypt. To me, this indicates that Windows 10 was no
less vulnerable than Windows 7.

No matter what systems were actually attacked, much of the blame should
be focused on the U.S. National Security Agency (NSA). The NSA
developed the tool used for ransomware and failed to secure its own
computer systems against theft of that malware. The NSA therefore put
United States -- people, businesses, organizations, and even the
government itself -- at risk instead of protecting us.

See my "The Great Computer Plague of 2017" at
http://www.rossde.com/editorials/edtl_PCplague.html.


I don't think we should really exaggerate the risk level
for this, at least for home users.

In a corporate environment, it's an issue of "scale".

1) Just the worm-like network packets sent, can slow
a network down. Even if the AV on a target machine
blocks the effects of an incoming packet, the packets
being sent use up network bandwidth. This is why some
enterprises claimed they were "disturbed" by WannaCrypt,
but not turned into a meltdown.

2) There can be a lot more machines on one LAN segment,
compared to a home user.

For a home user, the level of risk is relatively the
same between Locky, and WannaCrypt. Certain flavors of
Locky can crawl through existing file share mounts, or
mount the disk in question (if the mount does not
require the user to type a password perhaps). If you
have only two running computers on your home LAN right
now, Locky could end up encrypting most of the partitions,
while WannaCrypt could encrypt all of them.

In terms of preparedness, both require a complete home
backup strategy, for best protection.

At the current time, you still have to click on an
email attachment, to be infected, for WannaCrypt to
get inside your LAN. The typical IPV4 NAT router
protects against incoming worm-like behavior. It
takes effort for the average user, to have port-forwarded
the necessary port(s), for a Port Forwarded file share
to be an (original) infection vector.

The situation is lamentable, but the solutions
really aren't all that different than preparing
for a visit from Locky.

Now, if any of these things use an Adobe Flash exploit
as the entry vehicle (no matter which Ransomware is involved),
*then* we're in deep trouble. Popular web sites still sell
advertising space involving Flash content from unknown sources.
Whether WannaCrypt or Locky were to get in that way, it
would be a mess. No amount of patching of Adobe Flash,
seems to be enough.

Personally, I'm still worried about Locky.

Paul
  #7  
Old May 20th 17, 06:18 PM posted to alt.windows7.general
Mayayana
external usenet poster
 
Posts: 6,438
Default Almost all WannaCry victims were running Windows 7

"David E. Ross" wrote

| The NSA
| developed the tool used for ransomware and failed to secure its own
| computer systems against theft of that malware.

I'm imagining the NSA using the marketing
logic of the gun lobby: "If you outlaw malware
only outlaws will have malware. And we can't
have that."

There was even news recently that the NSA
had developed "hassleware", to cause general
disruption of 3rd-party software on target
machines:

https://www.bleepingcomputer.com/new...user-software/

Your tax dollars at work. I have to wonder how
much of this is adult teenagers without enough
supervision. It's hard to imagine any useful purpose
for planting malware that periodically kills Firefox
or IE processes. That's just juvenile nonsense.



  #8  
Old May 20th 17, 08:56 PM posted to alt.privacy.anon-server, alt.windows7.general,comp.os.linux.advocacy, alt.comp.hardware.pc-homebuilt
Anonymous Remailer (austria)
external usenet poster
 
Posts: 550
Default Almost all WannaCry victims were running Windows 7


In article
burfordTjustice wrote:

On Sat, 20 May 2017 11:54:17 +0200 (CEST)
"Anonymous Remailer (austria)" wrote:

Organization: dizum.com - The Internet Problem Provider



You are not believable.


Nobody gives a **** about your opinion because it doesn't matter.

  #9  
Old May 21st 17, 03:33 AM posted to alt.windows7.general
Steve Hayes[_2_]
external usenet poster
 
Posts: 1,089
Default Almost all WannaCry victims were running Windows 7

On Sat, 20 May 2017 13:18:52 -0400, "Mayayana"
wrote:

"David E. Ross" wrote

| The NSA
| developed the tool used for ransomware and failed to secure its own
| computer systems against theft of that malware.

I'm imagining the NSA using the marketing
logic of the gun lobby: "If you outlaw malware
only outlaws will have malware. And we can't
have that."

There was even news recently that the NSA
had developed "hassleware", to cause general
disruption of 3rd-party software on target
machines:


Didn't the NSA insist that OS vendors leave a backdoor for them and
try to force them to do so?


--
Steve Hayes
http://www.khanya.org.za/stevesig.htm
http://khanya.wordpress.com
  #10  
Old May 21st 17, 03:47 AM posted to alt.windows7.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default Almost all WannaCry victims were running Windows 7

Steve Hayes wrote:
On Sat, 20 May 2017 13:18:52 -0400, "Mayayana"
wrote:

"David E. Ross" wrote

| The NSA
| developed the tool used for ransomware and failed to secure its own
| computer systems against theft of that malware.

I'm imagining the NSA using the marketing
logic of the gun lobby: "If you outlaw malware
only outlaws will have malware. And we can't
have that."

There was even news recently that the NSA
had developed "hassleware", to cause general
disruption of 3rd-party software on target
machines:


Didn't the NSA insist that OS vendors leave a backdoor for them and
try to force them to do so?


Here, some Linux people have their little joke.

https://www.theregister.co.uk/2013/0...door_intrigue/

The thing that should bother you about that article,
was the removal of the Elephant Diffuser from
later versions of BitLocker. Maybe a back door wasn't
planted when the FBI wanted one, but it was made a
little less secure by removal of the elephant Diffuser
(for "performance" reasons). People who invoke
security/privacy in their computing, always place
an emphasis on performance over privacy, right ? Right ?

You're in good hands with All State.

https://theintercept.com/2015/06/04/...sk-encryption/

"it explained why it removed the Elephant diffuser, citing
worries over performance and compatibility that will appease
some, but certainly not all, concerned parties"

"Windows Vista ... AES-CBC ... along with ... Elephant diffuser"

"Windows 8 silently removed the Elephant diffuser
even though it still uses AES-CBC."

"Removing the Elephant diffuser doesn't entirely break BitLocker.
If someone steals your laptop, they still won't be able to
unlock your disk and access your files. But they might be
able to modify your encrypted disk and give it back to
you in order to hack you the next time you boot up."

HTH,
Paul
  #11  
Old May 21st 17, 01:43 PM posted to alt.windows7.general,comp.os.linux.advocacy,alt.comp.hardware.pc-homebuilt
burfordTjustice
external usenet poster
 
Posts: 246
Default Almost all WannaCry victims were running Windows 7

On Sat, 20 May 2017 21:31:15 +0100 (BST)
Nathan Hale wrote:

Booford



LOL grade school level..stay in school.
  #12  
Old May 21st 17, 07:16 PM posted to alt.privacy.anon-server, alt.windows7.general,comp.os.linux.advocacy, alt.comp.hardware.pc-homebuilt
mail.m2n Anonymous
external usenet poster
 
Posts: 31
Default Almost all WannaCry victims were running Windows 7

In article
burfordTjustice wrote:

On Sat, 20 May 2017 08:29:47 -0500
Nobody wrote:

From: Nobody
Subject: Almost all WannaCry victims were running Windows 7
Date: Sat, 20 May 2017 08:29:47 -0500
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101
Icedove/31.7.0 Newsgroups:
alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy ,alt.comp.hardware.pc-homebuilt
Organization: albasani.net


So what?


That's what your mom said when she coughed you out head first on
a concrete floor.

  #13  
Old May 21st 17, 10:06 PM posted to alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy,alt.comp.hardware.pc-homebuilt
tesla sTinker
external usenet poster
 
Posts: 134
Default Almost all WannaCry victims were running Windows 7

Ransom ware is mal ware, same ****.

the way this company programmed its malware remover,
is that if its not of the op system files, it checks it,
and marks it. So its like, say goodbye to malware if
your using it...

It will locate several of them first time you run it.
And it matters not, if you have run malware removers before.
And what is amazing, is this thing is only 2mb in size.

Would not be caught dead without it... Malware Remover
Or many of his other good small softwares that are free.

http://www.novirusthanks.org/free-tools/


On 5/20/2017 2:54 AM, Anonymous Remailer (austria) scribbled:
One week after it first hit, researchers are getting a better
handle on how the WannaCry ransomware spread so quickly — and
judging from the early figures, the story seems to be almost
entirely about Windows 7.

According to data released today by Kaspersky Lab, roughly 98
percent of the computers affected by the ransomware were running
some version of Windows 7, with less than one in a thousand
running Windows XP. 2008 R2 Server clients were also hit hard,
making up just over 1 percent of infections.

https://www.theverge.com/2017/5/19/1...cry-windows-7-
version-xp-patched-victim-statistics

  #14  
Old May 22nd 17, 12:18 AM posted to alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy,alt.comp.hardware.pc-homebuilt
Chris Ahlstrom[_4_]
external usenet poster
 
Posts: 169
Default Almost all WannaCry victims were running Windows 7

tesla sTinker wrote this copyrighted missive and expects royalties:

Ransom ware is mal ware, same ****.

the way this company programmed its malware remover,
is that if its not of the op system files, it checks it,
and marks it. So its like, say goodbye to malware if
your using it...

It will locate several of them first time you run it.
And it matters not, if you have run malware removers before.
And what is amazing, is this thing is only 2mb in size.

Would not be caught dead without it... Malware Remover
Or many of his other good small softwares that are free.

http://www.novirusthanks.org/free-tools/


I get my "novirus" at debian.org.

--
The Public is merely a multiplied "me."
-- Mark Twain
  #15  
Old May 22nd 17, 07:18 AM posted to alt.privacy.anon-server, alt.windows7.general,comp.os.linux.advocacy, alt.comp.hardware.pc-homebuilt
Anonymous Remailer (austria)
external usenet poster
 
Posts: 550
Default Almost all WannaCry victims were running Windows 7


In article
Chris Ahlstrom wrote:

tesla sTinker wrote this copyrighted missive and expects royalties:

Ransom ware is mal ware, same ****.

the way this company programmed its malware remover,
is that if its not of the op system files, it checks it,
and marks it. So its like, say goodbye to malware if
your using it...

It will locate several of them first time you run it.
And it matters not, if you have run malware removers before.
And what is amazing, is this thing is only 2mb in size.

Would not be caught dead without it... Malware Remover
Or many of his other good small softwares that are free.

http://www.novirusthanks.org/free-tools/


I get my "novirus" at debian.org.


Can you P2P stream NFL games on debian?

 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 06:08 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.