Boeing production plant hit by malware, apparently WannaCry ransomware

By Waqas
The world’s largest aerospace company Boeing has been hit by a
This is a post from HackRead.com Read the original post: Boeing production plant hit by malware, apparently WannaCry ransomware
Continue reading Boeing production plant hit by malware, apparently WannaCry ransomware

The fear over WannaCry is still very real

This is the reality now. With Wednesday’s apparent tempest-in-a-teapot ransomware attack at Boeing, the possibility remains for even the biggest organizations to come to a crippling halt at the mere hint that WannaCry has been redeveloped, reworked and set out in the wild. The Seattle Times’ initial story relayed as much, as Boeing’s chief engineer sent out a companywide memo Wednesday calling for “all hands on deck” in the initial aftermath. A few hours passed, and suddenly what was WannaCry’s next great casualty was nothing more than an uncomfortable afternoon for the aviation giant’s IT teams. “A number of articles on a malware disruption are overstated and inaccurate,” a Boeing statement read. “Our cybersecurity operations center detected a limited intrusion of malware that affected a small number of systems. Remediations were applied and this is not a production or delivery issue.” Yet while Boeing avoided being labeled as infosec’s Next Great […]

The post The fear over WannaCry is still very real appeared first on Cyberscoop.

Continue reading The fear over WannaCry is still very real

‘Limited intrusion’ detected at Boeing, company says WannaCry articles are ‘overstated and inaccurate’

News that a WannaCry attack has allegedly hit a South Carolina facility owned by Boeing is now downplayed by the aerospace company on Twitter. According to their statement, “articles on a malware disruption are overstated and inaccurate,” a… Continue reading ‘Limited intrusion’ detected at Boeing, company says WannaCry articles are ‘overstated and inaccurate’

Symantec: Look for cryptojacking to tie into IoT devices

In its newest yearly report, cybersecurity giant Symantec says internet-connected devices are becoming an attractive target for hackers looking to hijack processing power to mine cryptocurrency. The Internet Security Threat Report, which looks back on threat trends for 2017, states cryptojacking — co-opting unsuspecting users’ CPU power to mine cryptocurrency — was one of the biggest growth areas in cybercrime last year. Combine that threat with an overall increase in attacks on devices that make up the Internet of Things, and there is now a wide new target for criminals to potentially exploit for financial gain. “Symantec already found a 600 percent increase in overall IoT attacks in 2017, which means that cyber criminals could exploit the connected nature of these devices to mine en masse,” the report says. The company has seen some instances of connected devices being used to mine for cryptocurrency, according to Kevin Haley, director of Symantec Security Response. He anticipates growing […]

The post Symantec: Look for cryptojacking to tie into IoT devices appeared first on Cyberscoop.

Continue reading Symantec: Look for cryptojacking to tie into IoT devices

SMBv1, The Phoenix of Protocols?

Everybody still reminds the huge impact that Wannacry had in many companies in 2017? The ransomware exploited the vulnerability, described in MS17-010, which abuse of the SMBv1 protocol. One of the requirements to protect against this kind of attacks was to simply disable SMBv1 (besides the fact to NOT expose

[The post SMBv1, The Phoenix of Protocols? has been first published on /dev/random]

Continue reading SMBv1, The Phoenix of Protocols?