back to article WannaCrypt ransomware snatches NSA exploit, fscks over Telefónica, other orgs in Spain

Workers at Telefónica's Madrid headquarters were left staring at their screen on Friday following a ransomware outbreak. Telefónica was one of several victims of a widespread file-encrypting ransomware outbreak, El Pais reports. Telefónica has confirmed the epidemic on its intranet while downplaying its seriousness, saying …

Page:

  1. Alister

    Nobody thinks this and the NHS are related?

    Telefónica does provide VoIP and Network facilities to the NHS as far as I know.

    1. Anonymous Coward
      Anonymous Coward

      BBC are reporting the following:

      "A massive ransomware campaign appears to have attacked a number of organisations around the world.

      Screenshots of a well known program that locks computers and demands a payment in Bitcoin have been shared online by parties claiming to be affected.

      There have been reports of infections in the UK, USA, China, Russia, Spain, Italy, Vietnam, Taiwan and others."

      Difficult to definitely link them as there are probably ransomware hits around the world every day anyway and therefore this is just normal, however it could be a significant outbreak.

      1. TheVogon

        Received the downloader for this yesterday - and it wasn't detected by much - so I immediately submitted it to Kaspersky, Microsoft and Sophos so hopefully I saved a few thousand victims...

      2. Dodgy Geezer Silver badge

        ...BBC are reporting the following:

        "A massive ransomware campaign appears to have attacked a number of organisations around the world....

        From which we can infer that the BBC have been hit themselves...

    2. faibistes

      I'm pretty sure it's not related in that way. It only affects Windows PC's (AFAIK Windows 7, maybe other versions too), none of those services are Windows systems. It's not impacting operations per se... but if an operator needs access to those systems and he needs to do it from his Windows seat, he's screwed.

    3. Anonymous Coward
      Anonymous Coward

      I suspect it also might be related to Windows preferring to execute emailed malware rather than than scan it. It nicely removes the user actually having to do anything.

      This is Avery good reminder why windows is such a security cesspit, and unless you need to run Windows stuff, you are far more secure running a Chromebook with its signed read-only runtime.... It's pretty much unhackable

    4. Anonymous Coward
      Anonymous Coward

      Stop Being Teresa May

      While I understand that we have to declare war on Eurasia soon, our dear idiot Geography teacher and fuhrer wannabie is a bit rushing it here.

      The common denominator between Telefonica R&D and NHS are that they are underfunded badly maintained Windows shops. I have had dealing with both, there is plenty of unpatched machines running "this special application" which prevents them from updates and upgrades, they are networked in a flat non-segmented network and it is a perfect environment for a network worm.

      There is no attack. There is just a mass infection of populations which are vulnerable by design and were going to be infected sooner rather than later.

      There will be more of that, but the root cause in both - flat networking, lack of zoning and chronic underfunding will not be fixed.

    5. sanmigueelbeer

      No, this is not related. Seriously, NHS? AGAIN?

      I'd like to classify NHS as a soft- and OPEN target. How many times have various NHS sites been hit with ransomwares in the last 2 years?

      The people who manage their IT needs to be taken out the back and ...

  2. Your alien overlord - fear me

    Spanish people working in the afternoon? Will no one think of the siesta?

    1. faibistes

      It happened around 12. Siesta is happening sooner today

    2. Dan 55 Silver badge

      I expect more than one PFY will be unhappy about this, big companies tend to work until 2pm on Fridays in Spain.

      Some people maintain it makes up for working till 7pm or later in the week.

  3. Anonymous Coward
    Anonymous Coward

    Smug mode - Linux user.

    1. Anonymous Coward
      Anonymous Coward

      It's about the only thing you have to be smug about.

    2. adnim

      Smug mode

      Experienced enough to never open an email attachment or follow a link from an email address I don't know.

      Experienced enough to recognise an email attachment from an email address I do know and a link in an email from an address I do know could be dangerous. The body of the message usually gives enough clues as to the legitimacy of the email.

      Linux and Windoze user... Who's last virus infection was the Saddam virus on my Amiga 500. Getting old sucks but the wisdom it brings has benefits.

      1. JLV
        Black Helicopters

        Re: Smug mode

        >The body of the message usually gives enough clues as to the legitimacy of the email

        Actually, if you can be bothered, get into the habit of adding some personalized content when you share links. Something that is recognizably yours.

        "Dude, this reminds of that time we had that really bad beer", rather than just "check this out!".

        It's not uncommon for infections to spread via email contacts. Make it clear it's actually you and get your friends to understand you appreciate the favor returned.

        1. adnim

          Re: JLV - Smug mode

          I get a lot of emails from addresses I know with attachments or links to somewhere. I can always tell if they are legit. It is obvious that it is a spoofed sender or hacked account email. In fact It is painfully obvious. I don't think I am particularly smart.. to be honest I can be pretty stupid. I just know my clients even though I have many of them.

          I sign all my emails with PGP and send all in plain text. I also explain this to my clients and send my public key attached. If they click on a link or open an attachment from an email that looks like it is from me that is not signed... fsck 'em. I can't look after every slow thinker on the planet.

          I also see my received emails in plain text. Who needs html email? Aint that what websites are for?

      2. Rob D.

        Re: Smug mode

        Wisdom is definitely a handy by-product of the grey hair but for the SMB vulnerability being referenced as a possible vector for this to spread, you also need wisdom from everyone else on your network or an IT shop that provides its employees with properly patched/protected systems.

        The diagnostics and analysis on how this thing actually arrived and spread may prove quite entertaining.

        Reserving a little smugness in the belief that the vulnerability is Windows only, but not too much as the NSA et al may yet have the kit to do similar to Linux.

      3. Anonymous Coward
        Anonymous Coward

        Re: Smug mode

        Wouldn't agree.

        I had a CFO and CEO, both of whom are sharper than me, persistently arguing with me that the quote for business that they had received from a trading partner with an outlook applied signature must be released.

        They expected a lookalike, and didn't let up until I had the make and model of the virus to display to them, and would have attempted forwarding to phones and switching off wifi. Murphy's law.

        The business fashion of being abrupt and minimalist in communication is easy to spoof.

        (And is anyone else horrified by the Microsoft common clipboard proposed between devices in Windows 10 Creator Fall edition?)

      4. Planty Bronze badge

        Re: Smug mode

        Windows defender executes code as part of its scanning. Don't be too smug, you don't need to click anything, you just need to receive it via email.

        Windows is a real life security cesspit.

  4. ShortLegs

    Related?

    Its a huge coincidence that the day the NHS suffers a ransomeware attack, so do many other large organisations around the globe.

    I'm willing to punt a pint they are all related attacks. Too much of a coincidence that several un-related attacks would all be launched on the same day.

  5. JimmyPage Silver badge
    WTF?

    WTF ..., WT actual F ?????

    As the patch for this vulnerability is recent (March 14th), many enterprises have not applied it and therefore they are at risk," he added.

    March 14th !!!! nearly 8 weeks ago ?!?!?!

    1. Anonymous Coward
      Anonymous Coward

      Re: WTF ..., WT actual F ?????

      You've clearly never worked in a company with more employees than would fit in your car.

      1. Richard 12 Silver badge

        Re: WTF ..., WT actual F ?????

        We usually roll them out within a fortnight - the ones we can roll out.

        MS have made it a lot harder of late by putting too much in each basket. I would not be surprised if several of these places could not apply this patch because one of the other things in the same blob broke something important.

        1. TheVogon

          Re: WTF ..., WT actual F ?????

          "I would not be surprised if several of these places could not apply this patch because one of the other things in the same blob broke something important."

          Much more likely it's because the OS version they are using went out of support a decade ago...

          1. John Brown (no body) Silver badge

            Re: WTF ..., WT actual F ?????

            "Much more likely it's because the OS version they are using went out of support a decade ago..."

            Except, of course, in the case of the NHS, that support is still on-going (at a price) as per stories on the very site.

      2. tom dial Silver badge

        Re: WTF ..., WT actual F ?????

        US DoD, for years, has allowed ten days to deploy patches to Category I vulnerabilities, which the vulnerability in question surely is given that it involves remote code execution. It now is 58 days since the patch was made available and 47 days since The Register reported leak of the EternalBlue tool. We were allowed 60 days, if I remember correctly, for significantly less severe Category II vulnerabilities. Requirements were not always met, but failure carried a requirement for detailed and frequent requirements and the implied threat of suspension of an Authority to Operate for the affected devices.

        1. Charles 9

          Re: WTF ..., WT actual F ?????

          So what happens when a patch for a Cat I vulnerability broke something critical in the process, creating a dilemma because the critical machine was inoperable either way?

          1. Anonymous Coward
            Anonymous Coward

            Re: WTF ..., WT actual F ?????

            So you don't patch *every* machine because one has an issue?

            There will be no place soon for the lazy sysadmin...

            1. Danny 14

              Re: WTF ..., WT actual F ?????

              WSUS then set critical and securoty to auto approve. Thats about it really.

              1. Anonymous Coward
                Anonymous Coward

                Re: WTF ..., WT actual F ?????

                I was caught a few times with WSUS auto-approval on my learning curve with AD servers. Can I suggest having your preparation notes on AD rollback and Microsoft's Lingering Objects Liquidator tool done in advance?

                And when it gets to serious stuff...

                https://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/ucm085281.htm

                the manufacturing devices and system have to undergo at least system verification before patches goes into production.

                So they get their own private offline WSUS / RHN equivalent and VLANs.

                Set the Quality dept vs the Accounts dept and let them yell at each other.

          2. P. Lee

            Re: WTF ..., WT actual F ?????

            >So what happens when a patch for a Cat I vulnerability broke something critical in the process, creating a dilemma because the critical machine was inoperable either way?

            You reduce the attack surface by making sure critical systems are segregated and get extra protection. For example, you don't run web browsers or email clients on critical servers. Maybe you don't map drives to large swathes of critical files, make sure write access is only granted to those who really need it; maybe provide terminal server access for things which are important, so you can control the environment more easily.

            Standard security precautions really. How much have you saved by not hiring a security team? Are you sure you've saved money?

        2. Chairman of the Bored

          Re: WTF ..., WT actual F ?????

          Quite right... 10 days for cat I. But boy oh boy is the actual implementation completely random! God help you if you are a poor bastard at an ashore installation and get caught with your, er, patches down.

          But then I go shipboard and find unpatched, unsecured, bog standard Win XP running radars (Northrup Sperry... looking at you) that are actually networked with the ships' nets. So I ask the obvious questions. What it all comes down to is that the more powerful program offices and septic think tanks can get waivers due to a combination of stupidity and raw political clout. Gotta love it!

  6. Tony W

    Antivirus?

    I assume most or all of the infected PCs were running some form of anti-malware, at least MS Security Essentials. Do these things do anything useful?

    1. Anonymous Coward
      Windows

      Re: Antivirus?

      "These things" pay for Microsoft employees and shareholders' mortgages, is that something useful? :)

    2. TRT Silver badge

      Re: Antivirus?

      MS Security Essentials would auto-run certain viral payloads for you, with elevated privileges to boot!

      1. Danny 14

        Re: Antivirus?

        Our sophos intercept-x hasnt tripped yet.

    3. TheVogon

      Re: Antivirus?

      Did Microsoft security essentials even run on XP?! If it did then updates likely ended a decade ago...

      1. tfewster
        Facepalm

        Re: Antivirus?

        Yes, it ran very nicely on XP - at one time it was the most effective AND least intrusive scanner available.

        From memory, package updates ended about 3 years ago, and virus signature updates about a year* ago.

        * Length of a year may vary, depending on which planet you live on.

    4. Doctor Syntax Silver badge

      Re: Antivirus?

      "Do these things do anything useful?"

      The updates you get today should protect you against stuff that's been known for x* days. That means that some people will be infected in the period between release and the discovery and distribution of the AV update. In the normal state of affairs this will be a small proportion of vulnerable systems. When the virus spreads as rapidly as this today's updates are already too late.

      *where x is however long it takes for the vendor to confirm reports and put together their update.

  7. clocKwize
    Facepalm

    So, erm, I'm going to say it first.. This is why government organisations shouldn't hoard vulnerabilities. They will get leaked and they will get used by others who are less trustworthy (grey area..). If you find a vulnerability and don't want to be a part of breaking the internets, please submit it in privacy to the vendor.

    1. Charles 9

      But what if they WANT to be part of breaking the Internet...or simply don't care?

    2. GrapeBunch
      Pint

      NSA didn't "hoard" vulnerabilities, it stockpiled, it weaponised, it planned to use them for its own attacks. MS probably knew about the vulns all along, but when news spread about their being imminently released, MS pointedly patched SOME OF its operating systems. So your appeal is definitely aimed at somebody else's choir.

      Here's an IPA for the El Reg reader(s) who pointed out a way to shut down SMB (which I obviously didn't need) a couple of weeks ago, on my two XP systems, as a vaccine for the Doublepulsar vuln. Downvote me for mentioning XP or for mentioning India, or for implicitly criticizing MS; nobody but you will know precisely which.

    3. Alumoi Silver badge

      Less trustworthy? Less???

      Even the Albanian mob is more trustworthy than any government.

  8. mark l 2 Silver badge

    It wouldn't surprise me if some other UK gov organizations also got hit by this. But if its MOD, GCHQ or Police etc they won't got public with it.

    1. Christian Berger

      Seriously if they were...

      ... it only goes to show that they are not up to the task of running computers in a security critical environment.

      This worm spreads over SMB, a service you only need on fileservers. A service which is known to be one of the most complex file sharing protocols, which is therefore likely to have a significant amount of security critical bugs. This particular bug was found before and apparently even patched already.

      So any organisation can be blamed for 3 main things:

      1. Running Windows

      2. Running Windows with the SMB server enabled on non servers

      3. Not updating Windows quickly after security critical bugs get public

      If they avoided any of those things, they wouldn't have had any problem with this.

      1. John Brown (no body) Silver badge

        Re: Seriously if they were...

        "This particular bug was found before and apparently even patched already."

        And considering it came to light in the NSA toolkit leak, it's been around for a long time and US officialdom, at least in the NSA, was aware of the potential but did nothing about it. I wonder if any affected US orgs will try suing the agency whose role includes protecting the US for knowingly failing to do their job? Likewise, allies of the US are not likely to be happy that they didn't share this info sooner.

  9. Dodgy Geezer Silver badge

    People who have been in the Malicious Software field for as long as I have will remember the Aids Information Floppy disk (5 1/4"!) of 1989. That was an early ransomware hit, and the fact that it was presented as a quasi-medical service ensured a wide copy across the UK medical services.

    People in technical specialisms are often very unthinking about security when communicating with their colleagues...

  10. Anonymous Coward
    Anonymous Coward

    Cost (not just of cleanup)?

    Which stovepipe's budget is going to be picking up the cost of cancelled appointments, wasted time, etc?

    Will it be the IT directors, IT departments and their suppliers?

    If not, why not? Who else is responsible?

    Surely there's an SLA in this picture? Nothing can go wrong if there's an SLA, can it?

    Where there's a claim there's a blame...

    1. Anonymous Coward
      Anonymous Coward

      Re: Cost (not just of cleanup)?

      When you leave school/college/uni you'll find in business, finances are finite. So the Head of IT/Director has to go cap in hand to some idiot bean counter [FD/CFO] who sees IT as a cost and not as an integral part of the business - to simplify it for you, accountants see IT like plumbing, not a shiny store front.

      Add to that it's the NHS, where, you know, things are a little 'tight'... And we'll cancel your Granny's hip replacement and a few dozen heart transplants because something 'might' happen?

      Getting the picture yet?

      Yes, there's probably some bad network designs out there, and less than perfectly configured PC/Servers, often for some long forgotten historical reason i.e. PoS software/hardware. But your post shows an infantile understanding of both business and the complexity and scale of NHS IT

      /rant

      1. Anonymous Coward
        Anonymous Coward

        Re: Cost (not just of cleanup)?

        If budgets are that tight then they are not running shiney new windows and apps, so then what does old windows offer that you couldn't get more securely from a Linux Distro and those available apps. In fact, if money is that tight then Linux and those apps should be used. Certainly changes would be required but TCO would be significantly lower over time. Maybe the NHS could through a few million per annum at Debian or other to help ensure updates and new dev continues. Honest to F&%# it's not that difficult. Although the cash packets and jobs would stop flowing to the purchasers/decision makers, so won't ever happen.

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like