https://haveibeenpwned.com

- Josh

On May 23, 2017 1:04 AM, "Steve Jones" <thatoneguyst...@gmail.com> wrote:

> I have had the same Hotmail password for 23 years, that account has become
> the primary Microsoft account, ive changed it two times, back to the
> original in that time.
>
> Its really not that hard to be safe, I'm not very diligent. Its very hard
> to give up your info, yet people do and the media makes it sound like all
> :hackers" are "tunneling in"
>
> the truth is humans are just stoopid
>
> On Tue, May 23, 2017 at 12:49 AM, Josh Reynolds <j...@kyneticwifi.com>
> wrote:
>
>>
>> https://fossbytes.com/hacking-windows-login-details-using-go
>> ogle-chrome-sfc-files/
>>
>> 6 days ago
>> - Josh
>>
>> On May 23, 2017 12:46 AM, "Steve Jones" <thatoneguyst...@gmail.com>
>> wrote:
>>
>>> when this hit, that's what they said, then when they realized it was
>>> like every other malware, the news tried the "wannacry not delivered via
>>> attachements" headlines for like 40 seconds til the tech community lashed
>>> out (btw the tech community is the only legitimately non partisan community
>>> out there) and they STFU.
>>> I never understood when our customers get het with malware, why the
>>> people who don't use UPS insist on always opening the UPS attachments
>>> granted, this propagates from an infected machine to others if you
>>> didn't apply the three month old patch, so "technichally it doesn't have
>>> user interaction" but unless its dropping an executable in a startup
>>> folder, does it really?
>>>
>>> I just wonder if I'm missing something. I sat through a UTM webinar the
>>> other day on this, expecting to gain insight. The gist of this one is "yer
>>> fukt" because it was distributed by what equates to a 3 year old with an
>>> iPhone, and paying the ransom doesn't get you a key. There was a post
>>> webinar Q&A that disconnected because the UTM vendor didn't realize the guy
>>> who started the session had to actually stay in it to keep it going....
>>> that's the level of non starter I perceive wannacry as.
>>>
>>> On Tue, May 23, 2017 at 12:25 AM, Josh Reynolds <j...@kyneticwifi.com>
>>> wrote:
>>>
>>>> It's very possible, I've just never heard of an exploit that doesn't
>>>> actually require you to run the payload
>>>>
>>>> - Josh
>>>>
>>>> On May 23, 2017 12:22 AM, "Steve Jones" <thatoneguyst...@gmail.com>
>>>> wrote:
>>>>
>>>>> that's like super old (not that wannacry is all that new)
>>>>> its amazing to me that malware is such a thing
>>>>> fuckballs stuxnet is still live
>>>>> are humans retarded?
>>>>>
>>>>> On Tue, May 23, 2017 at 12:15 AM, Josh Reynolds <j...@kyneticwifi.com>
>>>>> wrote:
>>>>>
>>>>>> I don't know which one that you are talking about, but there is a
>>>>>> much more advanced exploit floating around. One of the infection methods 
>>>>>> is
>>>>>> to auto download a file when loading a web page... When the user opens 
>>>>>> the
>>>>>> folder, the windows handler that loads the file icon from inside the
>>>>>> program, which then silently transmits that users credentials to a remote
>>>>>> SMB server.
>>>>>>
>>>>>> Nasty stuff.
>>>>>>
>>>>>> - Josh
>>>>>>
>>>>>> On May 23, 2017 12:03 AM, "Steve Jones" <thatoneguyst...@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>>> lol, better not be another one
>>>>>>> just seems like this wannacry thing is way blown out of proportion,
>>>>>>> I haven't seen anything to indicate its any more virulent or invasive 
>>>>>>> than
>>>>>>> the standard malware, just happens it did a targeted phish of known
>>>>>>> unprotected targets
>>>>>>>
>>>>>>> On Mon, May 22, 2017 at 10:16 PM, Jay Weekley <
>>>>>>> par...@cyberbroadband.net> wrote:
>>>>>>>
>>>>>>>> Is this a new way of announcing your wife is having a baby?
>>>>>>>>
>>>>>>>> Steve Jones wrote:
>>>>>>>>
>>>>>>>>> I not an absurd lack of hype over this on this list when every
>>>>>>>>> other list is popping off
>>>>>>>>> Am I the only one that sees this as similar to the whole UBNT
>>>>>>>>> mishap? don't follow standard practices, pay the price?
>>>>>>>>> I'm inclined to block the ports as a mechanism of being a good
>>>>>>>>> steward of the interwebs, but shouldn't I have already been dropping 
>>>>>>>>> those?
>>>>>>>>> as an ISP
>>>>>>>>> I'm tempted to push OS migration, but shouldn't I have already
>>>>>>>>> been doing so as an IT services guy.
>>>>>>>>> I'm tempted to keep current patches, but shouldn't I have already
>>>>>>>>> been doing so?
>>>>>>>>> I have no expectation that none of my contact customers will not
>>>>>>>>> be impacted... by choices they made in our contract.
>>>>>>>>> This doesn't seem like its a NEW thing
>>>>>>>>>
>>>>>>>>> <http://www.avg.com/email-signature?utm_medium=email&utm_sou
>>>>>>>>> rce=link&utm_campaign=sig-email&utm_content=emailclient>
>>>>>>>>> Virus-free. www.avg.com <http://www.avg.com/email-sign
>>>>>>>>> ature?utm_medium=email&utm_source=link&utm_campaign=sig-emai
>>>>>>>>> l&utm_content=emailclient>
>>>>>>>>>
>>>>>>>>> <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>
>>>
>

Reply via email to