that's like super old (not that wannacry is all that new) its amazing to me that malware is such a thing fuckballs stuxnet is still live are humans retarded?
On Tue, May 23, 2017 at 12:15 AM, Josh Reynolds <j...@kyneticwifi.com> wrote: > I don't know which one that you are talking about, but there is a much > more advanced exploit floating around. One of the infection methods is to > auto download a file when loading a web page... When the user opens the > folder, the windows handler that loads the file icon from inside the > program, which then silently transmits that users credentials to a remote > SMB server. > > Nasty stuff. > > - Josh > > On May 23, 2017 12:03 AM, "Steve Jones" <thatoneguyst...@gmail.com> wrote: > >> lol, better not be another one >> just seems like this wannacry thing is way blown out of proportion, I >> haven't seen anything to indicate its any more virulent or invasive than >> the standard malware, just happens it did a targeted phish of known >> unprotected targets >> >> On Mon, May 22, 2017 at 10:16 PM, Jay Weekley <par...@cyberbroadband.net> >> wrote: >> >>> Is this a new way of announcing your wife is having a baby? >>> >>> Steve Jones wrote: >>> >>>> I not an absurd lack of hype over this on this list when every other >>>> list is popping off >>>> Am I the only one that sees this as similar to the whole UBNT mishap? >>>> don't follow standard practices, pay the price? >>>> I'm inclined to block the ports as a mechanism of being a good steward >>>> of the interwebs, but shouldn't I have already been dropping those? as an >>>> ISP >>>> I'm tempted to push OS migration, but shouldn't I have already been >>>> doing so as an IT services guy. >>>> I'm tempted to keep current patches, but shouldn't I have already been >>>> doing so? >>>> I have no expectation that none of my contact customers will not be >>>> impacted... by choices they made in our contract. >>>> This doesn't seem like its a NEW thing >>>> >>>> <http://www.avg.com/email-signature?utm_medium=email&utm_sou >>>> rce=link&utm_campaign=sig-email&utm_content=emailclient> >>>> Virus-free. www.avg.com <http://www.avg.com/email-sign >>>> ature?utm_medium=email&utm_source=link&utm_campaign=sig-emai >>>> l&utm_content=emailclient> >>>> >>>> <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2> >>>> >>> >>> >>