Yep, that's one of the best attack vectors! - Josh
On May 23, 2017 6:26 AM, "Mike Hammett" <[email protected]> wrote: > Some of them take advantage of vulnerabilities in anti-malware systems so > the user really doesn't have to do anything. > > > > ----- > Mike Hammett > Intelligent Computing Solutions <http://www.ics-il.com/> > <https://www.facebook.com/ICSIL> > <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> > <https://www.linkedin.com/company/intelligent-computing-solutions> > <https://twitter.com/ICSIL> > Midwest Internet Exchange <http://www.midwest-ix.com/> > <https://www.facebook.com/mdwestix> > <https://www.linkedin.com/company/midwest-internet-exchange> > <https://twitter.com/mdwestix> > The Brothers WISP <http://www.thebrotherswisp.com/> > <https://www.facebook.com/thebrotherswisp> > > > <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> > ------------------------------ > *From: *"Josh Reynolds" <[email protected]> > *To: *[email protected] > *Sent: *Tuesday, May 23, 2017 12:25:06 AM > *Subject: *Re: [AFMUG] malware > > It's very possible, I've just never heard of an exploit that doesn't > actually require you to run the payload > > - Josh > > On May 23, 2017 12:22 AM, "Steve Jones" <[email protected]> wrote: > >> that's like super old (not that wannacry is all that new) >> its amazing to me that malware is such a thing >> fuckballs stuxnet is still live >> are humans retarded? >> >> On Tue, May 23, 2017 at 12:15 AM, Josh Reynolds <[email protected]> >> wrote: >> >>> I don't know which one that you are talking about, but there is a much >>> more advanced exploit floating around. One of the infection methods is to >>> auto download a file when loading a web page... When the user opens the >>> folder, the windows handler that loads the file icon from inside the >>> program, which then silently transmits that users credentials to a remote >>> SMB server. >>> >>> Nasty stuff. >>> >>> - Josh >>> >>> On May 23, 2017 12:03 AM, "Steve Jones" <[email protected]> >>> wrote: >>> >>>> lol, better not be another one >>>> just seems like this wannacry thing is way blown out of proportion, I >>>> haven't seen anything to indicate its any more virulent or invasive than >>>> the standard malware, just happens it did a targeted phish of known >>>> unprotected targets >>>> >>>> On Mon, May 22, 2017 at 10:16 PM, Jay Weekley < >>>> [email protected]> wrote: >>>> >>>>> Is this a new way of announcing your wife is having a baby? >>>>> >>>>> Steve Jones wrote: >>>>> >>>>>> I not an absurd lack of hype over this on this list when every other >>>>>> list is popping off >>>>>> Am I the only one that sees this as similar to the whole UBNT mishap? >>>>>> don't follow standard practices, pay the price? >>>>>> I'm inclined to block the ports as a mechanism of being a good >>>>>> steward of the interwebs, but shouldn't I have already been dropping >>>>>> those? >>>>>> as an ISP >>>>>> I'm tempted to push OS migration, but shouldn't I have already been >>>>>> doing so as an IT services guy. >>>>>> I'm tempted to keep current patches, but shouldn't I have already >>>>>> been doing so? >>>>>> I have no expectation that none of my contact customers will not be >>>>>> impacted... by choices they made in our contract. >>>>>> This doesn't seem like its a NEW thing >>>>>> >>>>>> <http://www.avg.com/email-signature?utm_medium=email& >>>>>> utm_source=link&utm_campaign=sig-email&utm_content=emailclient> >>>>>> Virus-free. www.avg.com <http://www.avg.com/email- >>>>>> signature?utm_medium=email&utm_source=link&utm_campaign= >>>>>> sig-email&utm_content=emailclient> >>>>>> >>>>>> <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2> >>>>>> >>>>> >>>>> >>>> >> >
