Report warns lack of security talent, glut of legacy hardware pose imminent threat.
A congressionally mandated healthcare industry task force has published the findings of its investigation
into the state of health information systems security, and the diagnosis is dire.
Health Care Industry Cybersecurity Task Force report (PDF), published on June 1, warns that all
aspects of health IT security are in critical condition and that action is needed both by government
and the industry to shore up security. The recommendations to Congress and the Department of Health
and Human Services (HHS) included programs to drive vulnerable hardware and software out of health
care organizations. The report also recommends efforts to inject more people with security skills
into the healthcare work force, as well as the establishment of a chain of command and procedures
for dealing with cyber attacks on the healthcare system.
The problems healthcare organizations face probably cannot be fixed without some form of government
intervention. As the report states, "The health care system cannot deliver effective and safe care
without deeper digital connectivity. If the health care system is connected, but insecure, this connectivity
could betray patient safety, subjecting them to unnecessary risk and forcing them to pay unaffordable
personal costs. Our nation must find a way to prevent our patients from being forced to choose between
connectivity and security."
At the same time, government intervention is part of what got health organizations into this situation-by
pushing them to rapidly adopt connected technologies without making security part of the process.
by the 2015 Cybersecurity Act , was supposed to be filed to Congress by May 17. However, just
five days before it was due, the
WannaCry ransomware worm struck the UK's National Health Service , affecting 65 hospitals.
"The HHS stance is pretty much that we got incredibly lucky in the US [with WannaCry], and our
luck is going to run out," Joshua Corman, co-founder of the information security non-profit organization
I Am The Cavalry and a member of the task force, told Ars. The report was delayed by the WannaCry
outbreak, Corman said, who observed that the task force members were disappointed that they hadn't
gotten the report out sooner: "because if the report had been out a week or two prior to WannaCry,
you could have bet that every Congressional staffer would have been reading it during the outbreak."
The task force was co-chaired by Emery Csulak, the chief information security officer for the
Centers for Medicare and Medicaid Services, and Theresa Meadows, who is a registered nurse and chief
information officer of the Cook Children's Health Care System. The task force also included representatives
from the security industry, government and private health care organizations, pharmaceutical firms,
medical device manufacturers, insurers, and others from the wider health care industry-as well as
healthcare data journalist and patient advocate
Fred Trotter . Corman said that the task force was "probably the hardest thing I've ever done
and maybe the most important thing I'll ever do-especially if some of these recommendations are acted
But it's not certain that the report will spur any immediate action, given the current debate
over healthcare costs in Congress and the stance of the Trump administration on regulation. Even
so, Corman explained:
Brace for impact
When we were working on this, we realized that if it was summarily ignored by the next administration,
or if it was ignored for being too costly, the report could still be a backstop-in that when the
first crisis happens, this will be the most recently available report that will be the blueprint
for what to do next. It's just an indicator of how many minutes to midnight we are on this particular
clock-we may be out of time to get in front of it, but we can certainly try to see which of these
measures can be put in place in parallel [with a security crisis].
The ransomware attack on Hollywood Presbyterian Medical Center, which happened just a few weeks
after President Obama signed the legislation that established the task force, helped establish the
urgency of the work the group was doing (
Ars' coverage of the ransomware attack is cited in the task force's final report). At the task
force's first in-person meeting in April, Corman said he brought up the Boston Marathon bombing.
"I said, imagine if you combined something like this physical attack with something like the logical
attack [at Hollywood Presbyterian]." The impact-disrupting the ability to give urgent medical care
during a physical attack-could potentially magnify the loss of life and shatter public confidence,
The recommendations generated by the task force amount to a Herculean to-do list:
Define and streamline leadership, governance, and expectations for health care industry cybersecurity.
Increase the security and resilience of medical devices and health IT. Develop the healthcare
workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.
Increase health care industry readiness through improved cybersecurity awareness and education.
Identify mechanisms to protect research and development efforts, as well as intellectual property,
from attacks or exposure. Improve information sharing of industry threats, weaknesses, and mitigations.
That list is no short order. And it may already be too late to prevent another major incident.
In the wake of the
Hollywood Presbyterian ransomware attack last year, "the obscurity we've enjoyed is gone," Corman
explained. "We've always been prone, we've always been prey-we just lacked predators. Once the Hollywood
Presbyterian attack happened, there were a lot more sharks because they smelled blood in the water."
As a result, hospitals went from being off attackers' radar to "the number-one attacked industry
in less than a year," he said.
The task force's long-term target is to get the health industry to adopt the risk management strategies
Critical Infrastructure Cybersecurity Framework . But that's a long way off, considering the
potential costs associated and the bare-bones nature of many health providers' IT. Many healthcare
delivery organizations "are target rich and resource poor, and [they] can't fathom further investment
in cyber hygiene, period," said Corman.
The challenges to securing health IT identified by the task force, including some of the problems
exposed by the Hollywood Presbyterian attack, are substantial:
A severe lack of security talent in the industry. As the report points out, "The majority of health
delivery organizations lack full-time, qualified security personnel." Small, mid-sized, and rural
health providers may not even have full-time IT staff, or they depend on a service provider and have
little in the way of resources to attract and retain a skilled information security staff.
Premature and excessive connectivity. Health providers rapidly embraced networked systems, in
many cases without thought to secure design and implementation. As the report states, "Over the next
few years, most machinery and technology involved in patient care will connect to the Internet; however,
a majority of this equipment was not originally intended to be Internet accessible, nor designed
to resist cyber attacks."
In some significant ways, this is a problem that Congress helped create with the unintended consequences
of the Health Information Technology for Economic and Clinical Health (HITECH) Act. Passed in 2009
as part of the American Recovery and Reinvestment Act, it gave financial incentives for hospitals
to rapidly deploy electronic health records and offered billions of dollars in incentives for quickly
demonstrating "meaningful use" of EHRs. Combined with the Merit-Based Incentive Payment System used
by Medicare and Medicaid, the HITECH Act forced many health providers to quickly adopt technology
they didn't fully understand. While EHRs have likely improved patient care, they also introduced
technology that care providers couldn't properly secure or support.
Legacy equipment running on old, unsupported, and vulnerable operating systems . Since a large
number of medical systems rely on older versions of Windows-Windows 7, and in many cases, Windows
XP-"there's zero learning curve for an ideological adversary," Corman said. "There's nothing new
to learn." The systems were never intended to be connected to the Internet in many cases-or to any
network at all. Some systems, Corman said, "have such interoperability issues-forget security issues-that
they're so brittle, most hospitals will say that, even if you just do a port scan, you'll crash them-you
don't even need to hack them."
On top of that, some of the legacy medical devices on hospitals' networks now are unpatchable
or unsecurable, and they would have to be completely retired and replaced. The task force recommended
government incentives to get rid of these devices, following a "cash for clunkers" model. But that
may not be effective in luring some health organizations to get rid of them, simply because of the
other costs associated with getting new hardware in. And many of the newer systems they would use
to replace older ones with are still based on legacy software anyway.
A wealth of vulnerabilities, and it only takes one to disrupt patient care. The increased connectivity
of health providers without proper network segmentation and other security measures exposed other
systems that were never meant to touch the network-medical devices powered by embedded operating
systems that may never have been patched and have 20-year lifecycles. According to the task force
report, one legacy medical technology system they documented had more than 1,400 vulnerabilities
on its own. And the exploitation of a single vulnerability on a single system was able to affect
patient care during the Hollywood Presbyterian attack.
Furthermore, because these legacy systems are often based on older, common technologies, virtually
no special set of skills is required to perform such an attack. Basic, common hacking tools could
be used to gain access and wreak havoc. This is
demonstrated in attacks like the one at MedStar hospitals in Maryland last March, in which an
old JBoss vulnerability was exploited (likely with an open source tool) to give attackers access
to the medical network's servers.
It was clear to everyone on the task force, Corman noted, that there were no technical barriers
to a "sustained denial of patient care like what happened at Hollywood Presbyterian, on purpose"
at virtually any healthcare facility in the United States. "I said we all make fun of security through
obscurity, but what if that's all we have?" Corman recounted. "Seriously. What if that's all we have?"
Planning for "right of boom"
Given that untargeted and incidental attacks on hospitals have already happened, it seems inevitable
that someone will carry out a targeted attack at some point. Corman said that increases the importance
of doing disaster planning and simulations now to optimize responses, "so we can see who needs to
have control-is it FEMA, the White House, DHS, HHS, the hospitals? We drill with our kids what you're
supposed to do in a fire. Before we have a boom, we need to prioritize simulations, practice, and
Another part of planning for the post-attack scenario-or "right of boom"-is to make sure that
the right supports are in place to quickly recover. "We need to make sure that we've done enough
scaffolding now so that we can have a more elegant response," Corman said, "because if this looks
like Deepwater Horizon, and we're on the news every night, every week, gushing into the Gulf, that's
going to shatter confidence. If we have a prompt and agile response, maybe we can mitigate the harm."
Sean is Ars Technica's IT Editor. A former Navy officer, systems administrator, and network systems
integrator with 20 years of IT journalism experience, he lives and works in Baltimore, Maryland.
The cyberattack that hit some 200,000 computers around the world last Friday, apparently using
malicious software developed by the US National Security Agency, is only expected to escalate and
spread with the start of the new workweek.
The cyber weapon employed in the attack, known as "WannaCrypt," has proven to be one of the most
destructive and far-reaching ever. Among the targets whose computer systems were hijacked in the
attack was Britain's National Health Service, which was unable to access patient records and forced
to cancel appointments, treatments and surgeries.
Major corporations hit include the Spanish telecom Telefonica, the French automaker Renault, the
US-based delivery service Fedex and Germany's federal railway system. Among the worst affected countries
were reportedly Russia, Ukraine and Japan.
The weaponized software employed in the attacks locks up files in an infected computer by encrypting
them, while demanding $300 in Bitcoin (digital currency) to decrypt them and restore access.
Clearly, this kind of attack has the potential for massive social disruption and, through its
attack on institutions like Britain's NHS, exacting a toll in human life.
This event, among the worst global cyberattacks in history, also sheds considerable light on issues
that have dominated the political life of the United States for the past 10 months, since WikiLeaks
began its release of documents obtained from the hacked accounts of the Democratic National Committee
and John Podesta, the chairman of Hillary Clinton's presidential campaign.
The content of these leaked documents exposed, on the one hand, the DNC's machinations to sabotage
the presidential campaign of Bernie Sanders, and, on the other, the subservience of his rival, Hillary
Clinton, to Wall Street through her own previously secret and lavishly paid speeches to financial
institutions like Goldman Sachs.
Read also: Obama Warned to Defuse Tensions with Russia
This information, which served to discredit Clinton, the favored candidate of the US military
and intelligence apparatus, was drowned out by a massive campaign by the US government and the corporate
media to blame Russia for the hacking and for direct interference in the US election, i.e., by allegedly
making information available to the American people that was supposed to be kept secret from them.
Ever since then, US intelligence agencies, Democratic Party leaders and the corporate media, led
by the New York Times , have endlessly repeated the charge of Russian hacking, involving
the personal direction of Vladimir Putin. To this day, none of these agencies or media outlets have
provided any probative evidence of Russian responsibility for "hacking the US election."
Among the claims made to support the allegations against Moscow was that the hacking of the Democrats
was so sophisticated that it could have been carried out only by a state actor. In a campaign to
demonize Russia, Moscow's alleged hacking was cast as a threat to the entire planet.
Western security agencies have acknowledged that the present global cyberattack-among the worst
ever of its kind-is the work not of any state agency, but rather of a criminal organization. Moreover,
the roots of the attack lie not in Moscow, but in Washington. The "WannaCrypt" malware employed in
the attack is based on weaponized software developed by the NSA, code-named Eternal Blue, part of
a bundle of documents and computer code stolen from the NSA's server and then leaked by a hacking
group known as "Shadow Brokers."
Read also: The End of Freedom? Secret Services developing like a Cancer
Thus, amid the hysterical propaganda campaign over Russian hacking, Washington has been developing
an array of cyber-weapons that have the capability of crippling entire countries. Through the carelessness
of the NSA, some of these weapons have now been placed in the hands of criminals. US authorities
did nothing to warn the public, much less prepare it to protect itself against the inevitable unleashing
of the cyber weapons it itself had crafted.
In its report on the global cyberattacks on Saturday, the New York Times stated: "It
could take months to find out who was behind the attacks-a mystery that may go unsolved."
The co-author of these lines was the New York Times chief Washington correspondent David
E. Sanger, who, in addition to writing for the "newspaper of record," finds time to lecture at Harvard's
Kennedy School of Government, a state-connected finishing school for top political and military officials.
He also holds membership in both the Council on Foreign Relations and the Aspen Strategy Group, think
tanks that bring together capitalist politicians, military and intelligence officials and corporate
heads to discuss US imperialist strategy.
All of this makes Sanger one of the favorite media conduits for "leaks" and propaganda that the
CIA and the Pentagon want put into the public domain.
It is worth contrasting his treatment of the "WannaCrypt" ransomware attack with the way he and
the Times dealt with the allegations of Russian hacking in the run-up to and aftermath of
the 2016 US presidential election.
There was no question then of an investigation taking months to uncover the culprit, much less
any mystery going unsolved. Putin and Russia were declared guilty based upon unsubstantiated allegations
and innuendo. Ever since, the Times, serving as the propaganda outlet of the US intelligence
services, has given the lead to the rest of the media by endlessly repeating the allegation of Russian
state direction of the hacking of the Democratic Party, without bothering to provide any evidence
to back up the charge.
Read also: Political Coverup of Iraq Atrocities
With the entire world now under attack from a weapon forged by Washington's cyberwarfare experts,
the hysterical allegations of Russian hacking are placed in perspective.
From the beginning, they have been utilized as war propaganda, a means of attempting to promote
popular support for US imperialism's steady escalation of military threats and aggression against
Russia, the world's second-largest nuclear power.
Since Trump's inauguration, the Democratic Party has only intensified the anti-Russian propaganda.
It serves both as a means of pressuring the Trump administration to abandon any turn toward a less
aggressive policy toward Moscow, and of smothering the popular opposition to the right-wing and anti-working
class policies of the administration under a reactionary and neo-McCarthyite campaign painting Trump
as an agent of the Kremlin.
way it evaporated in Google, unless you use VPN. But even in this case there are ways to "bound" your
PC to you via non IP based methods.
lyman alpha blob ,
May 19, 2017 at 1:58 pm
There are other search engines, browsers, email services, etc. besides those operated by the
giants. DuckDuckGo, protonmail, and the Opera browser (with free built-in VPN!) work well for
The problem is, if these other services ever do get popular enough, the tech giants will either
block them by getting their stooges appointed to Federal agencies and regulating them out of existence,
or buy them.
I've been running from ISP acquisitions for years, as the little guys get bought out I have
to find an even littler one.
Luckily I've found a local ISP, GWI, that I've used for years now. They actually came out against
the new regulations that would allow them to gather and sell their customers' data. Such anathema
will probably wind up with their CEO publicly flayed for going against all that is good and holy
according to the Five Horsemen.
The title and message were edited so now we know what is needed.
How to Create a System Restore Point in Windows 7
How to Do a System Restore in Windows 7
System Protection - Change Disk Space Usage
How to Turn System Protection On or Off in Windows 7
Adjusting the amount of disk space System Restore uses to hold restore points
How To Change How Much Space System Restore Can Use
Vssadmin ShadowStorage Commands
Volume Shadow Copy Service
Volume Shadow Copy Service
Windows Vista System Restore Guide
Controlling Shadow Copies in Vista (and Windows 7!)
A good utility :
Shadow Explorer - Free
Hope this helps.
Rob Brown - Microsoft
MVP <- profile - Windows and Devices for IT: Bicycle - Mark Twain said it right.
The time has finally come: Microsoft is dropping the banhammer on mixing modern processors
with classic Windows operating systems.
Users are reporting their Windows 7 and 8.1 PCs
with Kaby Lake and Ryzen processors are being blocked from receiving updates, according to
That means all updates, including security updates, will be unavailable on PCs with
brand new hardware running the two older operating systems. The first hints of this were
revealed in March, when a Microsoft support page appeared detailing the policy of
updates for Kaby Lake and Ryzen-toting
PCs using Windows 7 or 8.1.
Microsoft's stance on PCs running a classic Windows build with newer processors actually
goes back to January 2016. At that time, Microsoft announced a plan to ease the transition
to Windows 10 for enterprises by certifying
some Skylake processors to run Windows 7 and Windows 8.1
for a limited time. The
company also added that Intel's Kaby Lake, Qualcomm's 8996 Snapdragon processsors, and what
we now call AMD Ryzen would all require Windows 10.
Since then, Microsoft has proved
more flexible on the Skylake front
. Select members of that processor generation will be
able to run Windows 7 and Windows 8.1 until both systems reach the end of their extended
support periods in 2020 and 2023 respectively. For Ryzen and Kaby Lake, however, Microsoft
hasn't budged, with
Intel and AMD willing to play along
WannaCrypt may be exclusively a problem for Windows users, but the worm/virus combination could hit
a Mac user with a Boot Camp partition or Windows virtual machines in VMware Fusion, Parallels, or
other software. If you fit that bill and haven't booted your Windows system since mid-March or you
didn't receive or install Microsoft's vital security update (MS17-010) released at that time, read
It's critical that you don't start up a Windows XP or later installation that's unpatched and
let it connect to the Internet unless you're absolutely sure you have the SMB file-sharing service
disabled or firewall or network-monitoring software installed that will block any attempt from an
Also, if you use Windows XP or a few later releases of Windows that are past Microsoft's end of
support since mid-March, you wouldn't have received the security updates that Microsoft was reserving
only for corporate subscribers
until last Friday . At that point, they made these updates generally available. If you booted
any of those systems between mid-March and Friday, you're unprotected as well.
If your Mac is on a network that uses NAT and DHCP to provide private IP addresses, which is most
home networks and most small-office ones, and your router isn't set up to connect the SMB file service
from outside the local private network to your computer (whether Boot Camp or a VM), then the WannaCrypt
worm can only attack your system from other computers on the same network. If they're already patched
or there are no other Windows instances of any kind, you can boot up the system, disable SMBv1, and
apply the patches.
If you don't want to take that chance or you have a system that can be reached from the greater
Internet directly through whatever method (a routable IP or router port mapping to your Mac), you
should disable networking on your computer before restarting into Boot Camp or launching a VM. This
is easy with ethernet, but if you're using Wi-Fi for your Windows instance, you need to unplug your
network from the Internet.
After booting, disable SMBv1. This prevents the worm from reaching your computer, no matter where
it is. Microsoft offers instructions for Windows 7 and later
at this support note . If you have a Windows XP system, the process requires directly editing
the registry, and you will want to install firewall software to prevent incoming connections to SMB
(port 445) before proceeding. The firewall approach is a good additional method for any Windows instance.
Once you've either disabled SMBv1 or have a firewall in place, you can enable network access and
install all the patches required for your release, including MS17-010.
In some cases, you no longer need SMBv1, already known to be problematic, and can leave it disabled.
If for legacy reasons you have to re-enable it, make sure you have both networking monitoring and
firewall software (separately or a single app) that prevents unwanted and unexpected SMB access.
"... Danish firm Heimdal Security warned on Sunday that the new Uiwix strain doesn't include a kill-switch domain, like the one that proved instrumental in minimising the harm caused by WannaCrypt last week, although this is subject to some dispute. ..."
"... Other researchers, including Kevin Beaumont, are also telling us they haven't yet seen a variant of WannaCrypt without a kill switch. ..."
"... Certainly the NSA should have reported it to Microsoft but they apparently didn't ... ..."
"... Implying that Windows 8, and Windows 10 are better than an unmaintained Windows XP SP3 Installation. Which can still do it's job. Probably better than those other Two numbskull OSs. Assuming Microsoft were kind enough to continue supporting it. But, alas that way only madness lay. As XP does not contain Tracker's, and (Cr)App Stores to take your Moneyz. ..."
"... It's clear the NSA intended to not inform Microsoft at all as this was part or their arsenal, a secret tool on their version of a Bat Belt. We must blame the NSA as they developed it, hoarded it and then lost control of it when it got out. This should be an example of how such organisations should not be using such methods. ..."
"... The NSA found it. Kept it secret, then lost the code due to real humans making mistakes or breaking in who discover a pot of "hacker gold" runnable and mature from the fist double click. ..."
"... In my experience with embedded systems there is nothing particularly fancy about the way the PC talks to the special hardware. There is nothing that says it can't be upgraded to say 32 bit Windows 7 or even rewritten for Linux. Much of the code is written in C or Delphi. It would take a bit of work but not impossible. ..."
"... The problem is that like Microsoft the manufacturers have moved on. They are playing with their next big thing and have forgotten about that old stuff. ..."
"... And in a few years it will all be forgotten. Nachi / Blaster anyone? ..."
"... Patching and AV inevitably often is bolting the stable door after horses gone for the first hit. Yet proper user training and proper IT configuration mitigates against almost all zero day exploits. I struggle to think of any since 1991. ..."
"... Firewalls, routers, internal email servers (block anything doubtful), all superfluous services and applications removed, no adhoc sharing. users not administrators, and PROPER training of users. ..."
"... Went to the doctor's surgery this morning. All the computers were down. I queried if they'd been hit with the malware, but apparently it was as a preventative measure as their main NHS trust has been badly hit, so couldn't bring up any records or even know what the wife's blood test was supposed to be for. Next I'm expecting the wife's hospital appt to be canceled due to the chaos it is causing. ..."
"... The answer is not to avoid Windows. It's for our so-called security agencies to get to understand that they are not supposed to be a dirty tricks department collecting weapons for use against others, but that they are supposed to work on our national security - which includes public and private services and businesses as well as the Civil Service. ..."
"... Windows 10 STILL has SMBv1 needlessly enabled by default. Should either be disabled by default or removed all together. Wonder when someone will find another exploitable weakness. Staying secure means turning off protocols you don't need. ..."
"... Instead of that, criminally stupid idots at NHS IT in the affected trusts as well as other enterprises which were hit: 1. Put these unpatchable and unmaintainable machines in the same flat broadcast domain with desktop equipment. There was no attempt at isolation and segmentation whatsoever. ..."
"... Each of these should be a sackable offense for the IT staff in question. ..."
"... Systems vendors to the NHS are borderline criminal. In pharmacy, there are only 1 of 4 mandated systems vendors you can choose. The 3 desktop based ones have so much legacy crap etc that they still only work on windows 7. They also insist on bundling in a machine to just a stupid high cost to a tech illiterate customer base - generally a cut down crappier version of something you could by uin argos for 300 quid they will charge over a grand for. Their upgrade cycles are a f**king joke and their business model makes their customers very reluctant to do so as they have fork out silly money ..."
"... Firstly, a state actor attack would be far better targeted. Stuxnet, for example, actually checked the serial numbers of the centrifuges it targeted to ensure that it only hit ones created in the right date span to impact only those bought by Iran. The vector on this attack, on the other hand, literally just spammed itself out to every available IP address that had port 445 open. ..."
"... most of the original bits of this were actually quite shittily written. Oh sure, there was a genuine bit of high-tech NSA code in there from the shadow broker leak... but there was also a fair load of primitive crap there too. It's a bit like an 16 year old came into possession of an F-16; it was destructive as hell but he didn't really know how to fly it. ..."
"... there's literally 5 different layers of my SMB's security that blocked this (patching, permissions, firewall, commercial AV, VLANs). And we're not exactly cutting-edge - just running best practice. ..."
"... In short, if this was state-backed, then the state in question would have to be somewhere like Honduras, not one of the big-league infosec powers. ..."
"... I read the Malwaretech log (excellent description of why you'd look for a nonexistent domain to determine if you're sandboxed) and thought: OK, so the virus writer should check a randomly generated domain, instead of a fixed one. That way, they can't all be registered, your virus can't be kill-switched the way this one was, and your virus can still tell if it's being run in a sandbox. ..."
"... the code is not proxy aware and the kill switch would not work in well structured environments where the only access to the net is via a configured non transparent proxy. ..."
"... In this case, knowing there are a number of nation state backed cyber defence teams looking into this... they either a) have balls big enough to need a wheelbarrow and believe that they wont get caught no matter what and cyber defence is really too hard to deliver effectively, regardless of backers. or b) that they are insanely stupid and greedy and are not following the news... ..."
"... Given that the only safe/undetected way of laundering the bitcoins will be to buy drugs or guns or other such illegal goods on the darkweb and then turn that into cash by selling it on then the perps are as you say both greedy and insanely (criminally) stupid. ..."
"... If Microsoft had an update channel for security patches only, not unwanted features and M$'s own brand of malware, people would but alot more inclined to stay up to date. ..."
"... Rumors running around that this is Deep State sponsored coming out of various cliques in intelligence agencies in retaliation for the Vault 7 leaks. ..."
15 May 2017 at 09:42, John Leyden
Miscreants have launched a ransomware worm variant that abuses the same vulnerability as the
Danish firm Heimdal Security
on Sunday that the new Uiwix strain doesn't include a kill-switch domain, like the one that proved
instrumental in minimising the harm caused by WannaCrypt last week, although this is subject to some
"As far as I know there's only been two variants (one this morn) and none without [a kill]switch,"
security researcher Dave Kennedy
told El Reg
. Other researchers, including Kevin Beaumont, are also telling us they haven't yet
seen a variant of WannaCrypt without a kill switch.
What isn't in question is that follow-up attacks based on something similar to WannaCrypt are
likely and that systems therefore really need protecting. Black hats might well create a
worm that attacks the same Windows vulnerability more stealthily to install a backdoor on the many
vulnerable systems still out there, for example.
The WannaCrypt ransomware spread to devastating effect last week using worm -like capabilities
that relied on a recently patched vulnerability in Microsoft's SMB file-sharing services (MS17-010).
WannaCrypt used a purloined EternalBlue exploit originally developed by the US National Security
Agency before it was leaked by the Shadow Brokers last month.
WannaCrypt's victims included the National Health Service, Spain's Telefónica and numerous other
organisations across the world. A techie at Telefónica confirmed that the initial infection vector
phishing email . The scale of the attack prompted Microsoft to take the highly unusual step of
for unsupported operating systems , including Windows XP. ®
Don't blame the NSA - anyone could have discovered this issue and weaponized it. Certainly
the NSA should have reported it to Microsoft but they apparently didn't ... who knows.
The real issue here is that Microsoft stopped has patching XP and Vista systems in an attempt
to force users to upgrade -- that's where the real money is in these vulnerabilities. So who's
going to make out like a bandit from WannaCry et al? Expect Microsoft Win 10 share to increase
over the next few months - they are the real winners here.
Re: The real issue here is that Microsoft stopped has patching XP
Actually technically they haven't stopped. (Vista yes).
BUT THE PATCHING IS NEARLY IRRELEVANT!
Like most other spam borne "attacks" this would be totally mitigated by
1) User training and common sense.
2) Better configured systems.
XP use by NHS is a red herring.
Even if EVERYONE used Linux* and it was updated daily, it will NOT stop this until the USERs are
better trained and use email properly.
[*Because all the spam based attacks would be aimed at Linux]
"Because the likes of the FSB & PLA must be too stupid to have also discovered these types
If they knew about them, they didn't do a very good job of protecting their own gear from them.
Your Comment: "Yes, the NSA is criminal for making these immoral and unlawful cyber weapons..."
Unlawful? By what law, specifically? (NOTE: Title 10 and Title 50 authorities directly - and
legally - trump certain US laws.) As an analogy - It's not "illegal" for a policeman to speed
to catch up to a criminal. It's not "illegal" for the NSA to create tools to compromise computers.
You can argue all day as to whether it is illegal to DEPLOY tools, once created, against CERTAIN
computers, but I don't think you have a leg to stand on calling the fact that NSA *creates* such
a tool - if they even did create one themselves - in any way an illegal act.
Implying that Windows 8, and Windows 10 are better than an unmaintained Windows XP SP3 Installation.
Which can still do it's job. Probably better than those other Two numbskull OSs. Assuming Microsoft
were kind enough to continue supporting it. But, alas that way only madness lay. As XP does not
contain Tracker's, and (Cr)App Stores to take your Moneyz.
"Don't blame the NSA - anyone could have discovered this issue and weaponized it. Certainly
the NSA should have reported it to Microsoft but they apparently didn't ... who knows."
It's clear the NSA intended to not inform Microsoft at all as this was part or their arsenal,
a secret tool on their version of a Bat Belt. We must blame the NSA as they developed it, hoarded
it and then lost control of it when it got out. This should be an example of how such organisations
should not be using such methods.
The only way Microsoft knew about this and patched this was because the NSA lost control of
the code to ShadowBrokers who then reported it to Microsoft giving them enough time to roll out
a patch before a public release.
As you correctly say, anyone could have developed code that exploits the flaw. But who detected
that flaw first? So who should have the social responsibility to improve the "cyber" defense of
at least their own nation by disclosing such a flaw?
The NSA found it. Kept it secret, then lost the code due to real humans making mistakes or
breaking in who discover a pot of "hacker gold" runnable and mature from the fist double click.
For this very reason Apple, correctly, refused to create a version of iOS that could be installed
on an iphone to weaken the pin entry screen to allow the FBI entry. Apple knew they could not
simply trust that this hacked version of iOS could be kept under control.
"blaming a commercial company for not patching a 13 year"
I think blaming and criticising a company that sold you buggy vulnerable crap and refuses to
fix bugs because someone else didn't find and advise them of them soon enough is entirely justified.
I have some compilers from a company with a policy that finding a bug in an obsolete unsupported
version of the compiler entitles you to a free upgrade to a current supported version. That would
be the policy of a decent company (which Microsoft clearly isn't). Of course Microsoft's current
supported version being a piece of shit that no one wants would stymie such a policy.
Re: So you're blaming a commercial company for not patching a 13 year old OS?
In my experience with embedded systems there is nothing particularly fancy about the way the
PC talks to the special hardware. There is nothing that says it can't be upgraded to say 32 bit
Windows 7 or even rewritten for Linux. Much of the code is written in C or Delphi. It would take
a bit of work but not impossible.
The problem is that like Microsoft the manufacturers have moved on. They are playing with their
next big thing and have forgotten about that old stuff.
What is needed is a commitment from the manufacturers to either support the gear for 30 years
or share the code and the schematics. Obviously a consideration would be required from the buyer,
I don't see why they should do that for free.
The easiest thing would be to keep XP going and Microsoft will do that if you pay them. The
next thing would be to fit each XP system with a hardware firewall. Don't expect XP to protect
itself, put a packet sniffing firewall in between.
You could look at an event such as that of the last few days as the Internet's version of a wildfire.
In the short run some damage is done but in the long run the fire's job is to clear out dead wood
and enable the regrowth of a stronger, healthier ecosystem. Short term pain for long term gain.
Lost all faith...
And in a few years it will all be forgotten.
Nachi / Blaster anyone?
"We've installed the MS security patch, we've restored from back-up. Everything's OK now".
Papworth NHS Trust has had something like 16 of these ransomware attacks in the last 12 months,
and hasn't done anything. It is going to take a lot more than this to change management attitudes.
Internet's version of a wildfire.
No, because very few organisations and users will learn the real lessons.
Patching and AV inevitably often is bolting the stable door after horses gone for the first
hit. Yet proper user training and proper IT configuration mitigates against almost all zero day
exploits. I struggle to think of any since 1991.
Firewalls, routers, internal email servers (block anything doubtful), all superfluous services
and applications removed, no adhoc sharing. users not administrators, and PROPER training of users.
I wish! The idiots who think it's fine to run XP are paid ten times more than me and they'll
still be in the same role this time next year. They'll be no getting rid of dead wood, just more
winging it and forcing underpaid Techies to work more weekends after more screw ups.
Is it just me?
Its surely incredible that a lone pizza stuffed actor could get immediate access to the worm
and spend a night before he spotted the 'call home' vector? Is that really that hard? And beat
the best resourced detection agencies worldwide?
Surely every IT detective agency including GCHQ would have sandboxed it on first sight, thrown
their best at it if only to beat their friends across the pond, to save Jeremy Hunt & Mother Theresa's
bacon just ahead of a new funding opportunity (aka new government).
It all smells not only of pizza but planted news. And if it is genuine what on earth are we
paying this organisation and every anti-virus firm for?
Re: Experts all giving advice how how to stay secure
Voyna i Mor
Went to the doctor's surgery this morning. All the computers were down. I queried if they'd
been hit with the malware, but apparently it was as a preventative measure as their main NHS trust
has been badly hit, so couldn't bring up any records or even know what the wife's blood test was
supposed to be for. Next I'm expecting the wife's hospital appt to be canceled due to the chaos
it is causing.
I wonder if we can get a go-fund-me page set up to hire someone to track down this hacker scum
and take out a hit on them? A bullet to the brain may give other scumbags something to think about.
Re: Experts all giving advice how how to stay secure
The answer is not to avoid Windows. It's for our so-called security agencies to get to understand
that they are not supposed to be a dirty tricks department collecting weapons for use against
others, but that they are supposed to work on our national security - which includes public and
private services and businesses as well as the Civil Service.
The fact that May and Rudd seem totally unable to get what could go wrong post-Snowden suggests
that when one of them became PM, a school somewhere missed the bullet of a particularly anal retentive
Re: Experts all giving advice how how to stay secure
Actually Windows 10 was affected, but because it patches more aggressively the March fix was
already applied to must unless they had different WSUS settings in a business/edu environment.
Re: Experts all giving advice how how to stay secure
Windows 10 STILL has SMBv1 needlessly enabled by default. Should either be disabled by default
or removed all together. Wonder when someone will find another exploitable weakness. Staying secure
means turning off protocols you don't need.
I have a dual boot laptop that has not booted to Windows since before March - I need to review
what services it has enabled to make it a bit more secure before I connect it to the Internet
to download latest patches.
Patching and anti-virus software take time to apply after a vulnerability has been discovered.
That can be too late.
Re: Experts all giving advice how how to stay secure
Voland's right hand
"Customers running Windows 10 were not targeted by the attack today."
Re: Experts all giving advice how how to stay secure
Some people do not have any choice. When the X-ray machines in the affected hospital trusts
were bought using Windows XP (or even 2001) imaging software, that was state of the art. The issue
is that the life of a piece of equipment like this vastly exceeds the lifespan of the OS that
was used for the control system. On top of that, quite often these cannot be patched as the software
is written so badly that it will work only with a specific patch-level of the core OS.
That CAN and SHOULD be mitigated by:
0. Considering each and every one of those a Typhoid Mary in potentia
2. Preventing any communication except essential management and authentication/authorization
3. Providing a single controlled channel to ship out results to a location which we CAN maintain
and keep up to date.
Instead of that, criminally stupid idots at NHS IT in the affected trusts as well as other
enterprises which were hit:
1. Put these unpatchable and unmaintainable machines in the same flat broadcast domain with
desktop equipment. There was no attempt at isolation and segmentation whatsoever.
2. In some cases allowed use of unrelated desktop applications (at ridiculously ancient patch-levels)
such as Outlook or even Outlook Express.
3. Opened file sharing on the machines in question.
Each of these should be a sackable offense for the IT staff in question.
Re: Experts all giving advice how how to stay secure
It's more than incompetent IT people and way worse and virtually impossible to fix.
There is a lot of niche or specialist custom software used in the nhs that can only work on
XP and ie 6 period. Most of the people who wrote are dead or retired etc
Systems vendors to the NHS are borderline criminal. In pharmacy, there are only 1 of 4 mandated
systems vendors you can choose. The 3 desktop based ones have so much legacy crap etc that they
still only work on windows 7. They also insist on bundling in a machine to just a stupid high
cost to a tech illiterate customer base - generally a cut down crappier version of something you
could by uin argos for 300 quid they will charge over a grand for. Their upgrade cycles are a
f**king joke and their business model makes their customers very reluctant to do so as they have
fork out silly money
for a new shit machine just cos their vendors tells they have to .. our superdupa crap shit
fuck software will only work on a machine we provide. Emis/proscript have alot to answer for ..
Lots of the staff and their employers are basically proud of being a digital numbskull. "I
am healthcare professional, why should i have to know anything about this" and the drones are
so poorly paid / bitched at incessantly about everything they just have an" i dunno i just work
here, that's not my job attitude" I have to screenshare to train people how to use our websites
.. this means i have to get them stick a url into their browser, that's it ... you have no idea
how many can't do that .. then get all offended when i ask them what browser they are using ..
"i don;t know, why should i know that, i just use google" is always the response .. when half
the nhs work force doesn't know what a f**king browser is and peversely proud of the fact they
can't type a url into a brower address bar, how on earth are we ever going to hav any sunnvbnf0ijgogjrnb;vzjnav;kjnnf;kqgfnjv;jnf;jjvn;w
Data Security has turned into one of these tick box things, everyone has dire warning, you
will be fined loads of money for doing something wrong that you don't understand and actively
don't want to understand so no one gives a f**k as long as they can say they ticked the right
A dish best served cold
Now, I would *hate* to start an internet rumour... but didn't the USA promise a retaliation?
Yupp, there was some collateral damage amongst their allies, but thats the new normal.
Anon because I might be right ;-)
Re: A dish best served cold
"Anon because I might be right"
Firstly, a state actor attack would be far better targeted. Stuxnet, for example, actually
checked the serial numbers of the centrifuges it targeted to ensure that it only hit ones created
in the right date span to impact only those bought by Iran. The vector on this attack, on the
other hand, literally just spammed itself out to every available IP address that had port 445
Second, US retaliation would almost certainly involve using a few zero-days. If you want to
prove that you have vastly more power than your opponent, then you want to do something that literally
resembles friggin' magic from his point of view. You want to show him that he can do nothing whatsoever
to defend his critical infrastructure from your attacks. This did not; nothing in this hadn't
already been discovered and patched. If the best thing the US can throw at Russia could be taken
out by just switching on your WSUS server in the past three months, then there's no point even
doing it because it would make them look weak, not strong.
Thirdly, and most importantly, most of the original bits of this were actually quite shittily
written. Oh sure, there was a genuine bit of high-tech NSA code in there from the shadow broker
leak... but there was also a fair load of primitive crap there too. It's a bit like an 16 year
old came into possession of an F-16; it was destructive as hell but he didn't really know how
to fly it.
I've just finished in a webinar on the incident, and there's literally 5 different layers of
my SMB's security that blocked this (patching, permissions, firewall, commercial AV, VLANs). And
we're not exactly cutting-edge - just running best practice.
In short, if this was state-backed, then the state in question would have to be somewhere like
Honduras, not one of the big-league infosec powers.
On the topic of NSA exploits being used by WannaCry, was the DOUBLEPULSAR exploit patched with
I can't help thinking that announcing the discovery of the kill switch might not have been
a good idea.
And you should see the number of downvotes I got in another thread for suggesting exactly that.
Another commentator stated (if I understood him correctly) that the "public announcement" was
more or less irrelevant because security experts' chatter on blogs would have given the game away
In turn that made me think along the lines of " FFS what sort of security experts swap notes
on blogs that may be / almost certainly are open to being read by the hackers "
I think I despair... if the above is true then there is simply no hope.
Possibly not an intentional kill switch
As the Malwaretech blog entry here:
points out, it was quite possibly not an intentional kill switch.
Some malware probes for the existence of a selection of randomly generated domains. Some sandbox
VMs respond to all DNS lookups by providing back the IP address of the sandbox VM instance. If
the malware sees a positive response to the DNS lookups (which should fail), then the logic is
that it is probably running in a sandbox VM, which may well be being used to analyse/investigate
the malware, so the malware stops running.
The single lookup of the unusual domain name was possibly a poor implementation of this technique.
Alternatively, it is an intentional kill switch, used during development, with a local DNS
server on the malware developer's LAN, the function of which was to prevent infection of other
devices on the same LAN. If anyone keeps records of DNS lookups, it might be interesting to see
where the first lookups came from.
Re: Possibly not an intentional kill switch
@Norman Nescio : "...The single lookup of the unusual domain name was possibly a poor implementation
of this [sandbox detection] technique."
I read the Malwaretech log (excellent description of why you'd look for a nonexistent domain
to determine if you're sandboxed) and thought: OK, so the virus writer should check a randomly generated domain, instead of a fixed one. That
way, they can't all be registered, your virus can't be kill-switched the way this one was, and
your virus can still tell if it's being run in a sandbox.
Except the folks creating sandboxes might take the precaution of checking the domain. Instead
of returning a valid result for any garbage domain, check to see if it's been registered first.
Suddenly, the virus can no longer tell that it's running in a sandbox.
Except then, the virus author checks four or five valid domains; if they all return identical
results, you know you're running in a sandbox. (Reading further, I see that this method is actually
used in some cases.)
Except that _then_, the sandbox authors do some revisions so that seemingly accurate results
are returned that are actually remapped by the sandbox code.
This is all outside my area of expertise. Still, I could see a nearly endless cycle of fix/counter-fix
going on here.
Ransome code is not proxy aware, kill switch won't work in most enterprises.
the code is not proxy aware and the kill switch would not work in well structured environments
where the only access to the net is via a configured non transparent proxy.
Enterprises will need to think a bit harder about how they ensure the kill switch is effective
this time. The miscreants wont make this same mistake next time.
Talking about the kill switch is good, wouldn't have taken the miscreants long to work out
something was not right anyway.
What is the motivation here? Is all it seems to be...
<Black Helicopter Icon>
Ransomware usually works on a relatively widespread basis but usually SMB, and domestic users.
Big organisations and governments, generally are defended (although clearly some well publicised
The beneficiaries are usually relatively safe as law enforcement cannot usually be bothered
to investigate and the cash rolls in for the most desperate victims.
In this case, knowing there are a number of nation state backed cyber defence teams looking
into this... they either a) have balls big enough to need a wheelbarrow and believe that they
wont get caught no matter what and cyber defence is really too hard to deliver effectively, regardless
of backers. or b) that they are insanely stupid and greedy and are not following the news...
Or is this already a state backed exercise from somewhere and is simply a global experiment
at our expense? The fact the original flaw was used by the NSA is not really relevant, it simply
got it publicity but was clearly available for a long time.
Re: What is the motivation here? Is all it seems to be...
Given that the only safe/undetected way of laundering the bitcoins will be to buy drugs
or guns or other such illegal goods on the darkweb and then turn that into cash by selling it
on then the perps are as you say both greedy and insanely (criminally) stupid. No doubt they'll
have their comeuppance shortly - without being "caught" by any nation state backed cyber
team - probably up some dark alley being stiffed by gangbangers.
Probably just some kid :-(
The warning was there in Sep 2016!!
We were told to stop using SMB v1 in Sep 2016. The only reason to keep it enabled is to use
it with XP!
MS should hire the NSA hackers
maybe they can teach them something about software
In light of this threat I just got around to patching a somewhat neglected Windows 7 PC. And
now it's got a message from Microsoft (falsely) saying it's not genuine. It may not be registered
but it's certainly a legitimately purchased copy. So far it's just a tiny message in the corner
of the screen but who knows what else it'll do. I don't have time for this. Guess I'll roll back
the update and take my chances.
This bullshit is what I blame more than anything, even the NSA, for outbreaks like this. If
Microsoft had an update channel for security patches only, not unwanted features and M$'s own
brand of malware, people would but alot more inclined to stay up to date.
The goal here was 2 fold.
1. Hurt Russia.
2. Hurt NSA credibility.
Everything else is gravy for the attackers. Rumors running around that this is Deep State sponsored
coming out of various cliques in intelligence agencies in retaliation for the Vault 7 leaks.
John Smith 19
The scum are obviously in hiding - either on a luxury yacht on the Black Sea or in a basement
somewhere. I'd hazard a guess it is the latter. There must be other scum in the same racket who
know who the are. I wonder if they have earned any street creds for what they did?
- - chaos (not really)
- - financial bonanza (nope)
- - media attention (big win)
- - shit disturbing (yep - mostly stirred the NSA and Microsoft)
- - rattle some chains (mostly IT departments)
- - peer envy (I doubt it)
Their reward beyond the $30K they collected will be prison (blackmail and extortion are felonies).
So the haul from this little operation is currently what $60K?
V. Poor criminal work. Extortion technique needs more work. Clean up costs have probably been
in the $m.
Re: So the haul from this little operation is currently what $60K?
This is a fairly typical ratio of realized proceeds of crime to cost of crime and prevention
measures. The economic case for crime reduction is overwhelming. But it's easier said than done.
People are creative, even (especially?) criminals.
Its a sign of the times that no government is actually interested in Universal security, for the
greater good of human kind. We're at a point where everything is now based online, and everyone
in the world is connected.
The internet has removed the idea of 'borders' in the traditional sense!! I don't have to get
on a plane to Italy, to see Italy. I can log onto remote cameras and a host of other online services,
which mean I can be in the country without having to physically be in the country!
The NSA wasn't even bothered about protecting their own country... They didn't release this
data, to allow the problem to be solved. If I were American I would be Pissed that my own government
has been complicit in this entire debacle by keeping this quiet, and didn't release the information
to the wider security community when they found the holes!!
If your doctor found you had terminal cancer, but they had a product that would guaranteed
slowing of the cancer or entire removal of the disease then you would expect them to tell you
wouldn't you?! But when the shady NSA finds a potentially life threatening exploit, they keep
it to themselves?!... the middle letter of NSA stands for SECURITY for effs sake!!
There is no such thing as trust anymore between so called 'allies' as the NSA has just proved.
It has also proved that life is worthless to them. This is clearly due to their inability to see
the bigger picture of what they have A. Created, and B. Allowed to be released into the wild!!
Yes someone in their bedroom could have found the exploit, but that's a bedroom hacker/cracker.
But you put pretty much unlimited resources and man power behind a department, then they are clearly
going to come up with the exploit a billion times faster than a sole agent. Or even a collective
of agents separated over the globe.
So all this stupidity that the NSA shouldn't be held accountable should be rethought. Because
they CLEARLY are at fault here, for NOT DISCLOSING THE INFORMATION LAST YEAR!!!
"... At a minimum, Microsoft clearly should have provided the critical update in March to all its users, not just those paying extra. Indeed, " pay extra money to us or we will withhold critical security updates " can be seen as its own form of ransomware. ..."
"... This attack happened because the US Government didn't do it's job. It's primary task is national defense. It kept a vulnerability to itself to attack foreigners instead of protecting it's own infrastructure, businesses and individuals. The government had these tools taken and passed around for everyone to use. And crap like this is why governments can never be allowed to have backdoors. The secrets will always get out. Everyone is vulnerable. ..."
"... There are more than enough XP users in the world for Microsoft to dedicate resources and turn a profit supporting it. Arbitrary sunset dates disconnected from reality of who is still using software amount to nothing more than sales tools intended to extort upgrade revenue.... buy this or get owned. ..."
"... I personally don't believe vendors should be allowed to walk away from safety defects in products in order to make money on upgrades. Buffer overflows are entirely preventable classes of software failures. It is a tractable problem to solve. That it may not be in the case of XP isn't the end users problem. ..."
"... XP was far easier to lock down and fully secure than 8 or 10 with that bullshit telemetry, and it had far fewer hardware restrictions. It is smaller and faster and more capable at most of my tasks than most modern systems (example: I use ManyCam 3.0.80 - 2000/XP-Era multi-cam software. Runs like a champ on XP with 4 webcams, I go 7 [Ultimate] or higher, I can no longer use more than 2 webcams despite the software having the ability to access them and me having more than enough USB bandwidth for the uncompressed video streams.) ..."
"... Most real IT pros know that XP was far superior to the locked-down and (quite often) over-optimized (as in the optimizations go so far as to make the code more complex and actually runs slower due to shit like cache misses and what not) bullshit that is anything after Windows 7. ..."
"... Forever support isn't reasonable, but at the same time vendors using security update channels to push unwanted upgrades for the benefit of the vendor is equally bad. ..."
"... They already exist. They're called routers. Network routers can be configured to provide great deal of protection to machines that are older and cannot be patched. Many contain firewall software. Even simple ones can be configured to block traffic on vulnerable ports. ..."
"... Abandoning Operating Systems is a cruel trick played by vendors who want the new revenue from upgrades...no matter what the cost in lost-business, learning-curves, and incompatibilities with existing practices may be to the customers.. Spending money on maintaining the security (even excluding features) of superceded products distracts from development of improved products, and is not in the vendors' self-interest. ..."
"... do those devices NEED internet connection? serious question as i don't know. if not, no problem ..."
"... Bad car analogy. Firstly many old cars are banned from using critical infrastructure like highways (or in some cases any roads) for their obvious threat to third parties and their owners. ..."
aftermath of ransomware spread
over the weekend, Zeynep Tufekci, an associate professor at the School of Information and
Library Science at the University of North Carolina, writes an opinion piece for The New York
At a minimum, Microsoft clearly should have provided the critical update in March to
all its users, not just those paying extra. Indeed, "pay
extra money to us or we will withhold critical security updates" can be seen as its own
form of ransomware.
In its defense, Microsoft probably could point out that its operating systems have
come a long way in security since Windows XP, and it has spent a lot of money updating old
software, even above industry norms.
However, industry norms are lousy to horrible, and it is reasonable to expect a company
with a dominant market position, that made so much money selling software that runs critical
infrastructure, to do more.
Microsoft supported Windows XP for over a decade before finally putting it to sleep.
In the wake of ransomware attacks, it stepped forward to release a patch --
a move that
has been lauded by columnists. That said, do you folks think it should continue to push
security updates to older operating systems as well?
acoustix ( 123925 ) on Monday May 15, 2017 @01:01PM (#54419597)
Wrong Approach (Score:2)
This attack happened because the US Government didn't do it's job. It's primary task is
national defense. It kept a vulnerability to itself to attack foreigners instead of protecting
it's own infrastructure, businesses and individuals. The government had these tools taken and
passed around for everyone to use. And crap like this is why governments can never be allowed
to have backdoors. The secrets will always get out. Everyone is vulnerable.
WaffleMonster ( 969671 ) on Monday May 15, 2017 @12:09PM (#54419177)
Artificial scarcity (Score:2)
There are more than enough XP users in the world for Microsoft to dedicate resources
and turn a profit supporting it. Arbitrary sunset dates disconnected from reality of who is
still using software amount to nothing more than sales tools intended to extort upgrade
revenue.... buy this or get owned.
I personally don't believe vendors should be allowed to walk away from safety defects
in products in order to make money on upgrades. Buffer overflows are entirely preventable
classes of software failures. It is a tractable problem to solve. That it may not be in the
case of XP isn't the end users problem.
jrifkin ( 100192 ) on Monday May 15, 2017 @11:55AM (#54419015)
Yes. It's like vaccinations (Score:2)
If the number of older systems is large enough, then Yes, Microsoft should release patches
They should do this for two reasons:
1) Reducing the number of infected systems helps protect others from infections
2) It protects the innocent, like those whose Medical Care was interrupted in the UK, from
Who pays for it? Microsoft. They have benefited from the sale of all those systems, and
certainly have enough cash to divert some to supported old but prevalent systems. Also, the
fact that people still use MS systems, even if they're old, benefits MS in some way by helping
them maintain market share (and "mindshare"). Odds are that these systems will eventually be
replaced by more MS systems, representing future revenue for MS.
Khyber ( 864651 ) <firstname.lastname@example.org> on Monday May 15, 2017 @11:50AM (#54418981) Homepage
Re: Silly idea (Score:2)
"I think there is clearly one party at fault, and it is IT."
Why so? XP was far easier to lock down and fully secure than 8 or 10 with that bullshit
telemetry, and it had far fewer hardware restrictions. It is smaller and faster and more
capable at most of my tasks than most modern systems (example: I use ManyCam 3.0.80 -
2000/XP-Era multi-cam software. Runs like a champ on XP with 4 webcams, I go 7 [Ultimate] or
higher, I can no longer use more than 2 webcams despite the software having the ability to
access them and me having more than enough USB bandwidth for the uncompressed video streams.)
Most real IT pros know that XP was far superior to the locked-down and (quite often)
over-optimized (as in the optimizations go so far as to make the code more complex and
actually runs slower due to shit like cache misses and what not) bullshit that is anything
after Windows 7.
swb ( 14022 ) on Monday May 15, 2017 @12:20PM (#54419293)
It's an existential problem (Score:2)
Forever support isn't reasonable, but at the same time vendors using security update
channels to push unwanted upgrades for the benefit of the vendor is equally bad.
My guess is that we're going to be getting to the end of the road of the "nasty, brutish
and short" state of nature in the software industry and start seeing more regulations.
Vendors will be able to EOL their products, but will also have to supply security updates
for N years after the product is officially ended. Vendors will be required to maintain a
security update channel which may not be used for pushing upgrades or unrequested new
An interesting solution would be to let vendors "expire" a version by inserting a patch
that boots the OS at a warning page requiring a firm verbal commitment ("I agree this is
obsolete") before booting any further. Vendors would be REQUIRED to do this for operating
systems they had obsoleted but only after their N years of post-EOL support had ended.
This way, nobody escapes the product being EOL. Customers can still use it, but must
affirmatively acknowledge it is obsolete. Vendors are required to keep supporting it for a
really long time after official EOL, but they can kill it more completely but only after the
EOL support period.
Anonymous Coward on Monday May 15, 2017 @10:44AM (#54418429)
No (Score:5, Insightful)
No. You can't support legacy software forever. If your customers choose to stay with it
past it's notified EOL then they are SOL. Any company using XP that got hit by this can only
jellomizer ( 103300 ) on Monday May 15, 2017 @10:48AM (#54418451)
Re:No (Score:4, Insightful)
I will need to agree with conditions. If the Tech company is selling service contracts for
that product, they will need to update it. However like XP and older, where the company isn't
selling support, and had let everyone know that it off service, they shouldn't need to keep it
updated. Otherwise I am still waiting for my MS DOS 6 patch as it is still vulnerable to the
AmiMoJo ( 196126 ) <mojo AT world3 DOT net> on Monday May 15, 2017 @12:11PM (#54419217)
Re:No (Score:4, Insightful)
The people providing support should be the ones making MRI scanners, ATMs and other expensive
equipment that only works with XP. Even when XP was brand new, did they really expect those
machines to only have a lifetime of around 10 years? Microsoft was clear about how long
support was going to be provided for.
It seems that people are only just waking up to the fact that these machines have software and
it needs on-going maintenance. The next decade or two will be littered with software bricked
but mechanically sound hardware, everything from IoT lightbulbs to multi-million Euro medical
In fact it's already happening. You can buy DNA sequencers on eBay, less than a decade old and
original price $500,000, now barely worth the shipping because the manufacturer abandoned
number6x ( 626555 ) on Monday May 15, 2017 @12:18PM (#54419269)
They already exist (Score:4, Insightful)
They already exist. They're called routers. Network routers can be configured to
provide great deal of protection to machines that are older and cannot be patched. Many
contain firewall software. Even simple ones can be configured to block traffic on vulnerable
In this case, a router could be configured to keep the SMB port (445) blocked. A router,
with updated software, and a firewall gateway can help protect even older devices with
embedded code that may no longer be supported.
Of course, it goes to say, that you must keep the router's software updated and not use
default credentials on the router.
The NHS decided to not upgrade many old systems because the threat was deemed minimal.
Offices were urged to upgrade but funds were not made available and infrastructure budgets
were cut again and again. Multiple bad decisions led to this result.
Many things could have prevented it. Better funding, better threat assessment, the NSA
informing Microsoft of the vulnerability so it could have been patched years ago, and on and
In the end we are here, and hopefully threats will be re-prioritized and better protections
will be put in place in the future (I could not keep a straight face while typing that and
finally burst out laughing).
bugs2squash ( 1132591 ) on Monday May 15, 2017 @10:45AM (#54418433)
Don't be silly (Score:2)
this did not need to be fixed with an OS patch, it could have been prevented with better
network security policies. I would be surprised if someone hadn't said something about
addressing the vulnerability earlier but probably got ignored because of some budgetary issue.
It would be more reasonable to call for continued money to be made available to address
these vulnerabilities after a system has gone into production and a move to use more open
source solutions where users can share patches.
CAOgdin ( 984672 ) on Monday May 15, 2017 @11:07AM (#54418613)
I recommend a Subscription model... (Score:3)
Abandoning Operating Systems is a cruel trick played by vendors who want the new revenue
from upgrades...no matter what the cost in lost-business, learning-curves, and
incompatibilities with existing practices may be to the customers.. Spending money on
maintaining the security (even excluding features) of superceded products distracts from
development of improved products, and is not in the vendors' self-interest.
Given that a new Operating system (retail) is in the $100-$150 range, I'd propose "Life
Extension" service subscription, solely for security updates in the $30-35/year range...with a
required minimum of 10,000 customers to keep maintaining the service. That provides enough
revenue ($1,000,000+ per annum) to support a small, dedicated staff.
Frankly, there's no reason that a M$ couldn't engage in a Joint Venture with a small
qualified, independent security firm to provide the service, with special access to
proprietary information within the O.S. vendor.
It would be an investment in the rehabilitation of the O.S. vendors' reputation, because M$
has gotten quite high-handed in recent years, dictating (or even forcing) software on
unwilling customers.who have existing businesses to run.
ToTheStars ( 4807725 ) on Monday May 15, 2017 @11:29AM (#54418801)
What if we tied support to copyright? (Score:5, Interesting)
Slashdot generally doesn't like ludicrously-long copyright terms, right? What if we made
maintenance a requirement for retaining copyright over software? If Microsoft (or whoever)
wants to retain a copyright on their software for 70 years, then they'd better be prepared to
commit to 70 years of support. If they want to EOL it after 5 years or 20 years or whatever,
and wash their hands of responsibility, that's fine, but then it's public domain. Why should
we let companies benefit from software they don't support anymore?
This could also work for art works, as well -- because copyright exists "To promote the
Progress of Science and useful Arts," we could make it a requirement that an author (or
company, or whatever) needs to be distributing (or licensing for distribution) a work to have
copyright on it. When it's out of print, it enters the public domain.
Hartree ( 191324 ) on Monday May 15, 2017 @11:07AM (#54418625)
Yes, because WinXP was never killed off. (Score:2)
It also lives on in many scientific instruments. An old mass spec that runs XP (or even
older. I regularly maintain X Ray diffraction machines that still run DOS) usually can still
do the day to day job just fine. The software usually hasn't been supported for many years and
won't run on anything newer. But replacing the instrument could cost a large amount of money
(250K or up in many cases).
Research budgets aren't growing and I work for a university in a state that can't pass a
budget. We just don't have the money to throw out older systems that work well just because
the software is outdated. We just take them off the network and use other means to get the
data transferred off of them.
ganjadude ( 952775 ) on Monday May 15, 2017 @11:37AM (#54418873) Homepage
Yes, because WinXP was never killed off. (Score:2)
do those devices NEED internet connection? serious question as i don't know. if not, no
DontBeAMoran ( 4843879 ) on Monday May 15, 2017 @11:22AM (#54418727)
Re:Bitcoin is the problem (Score:2)
Because ransomware did not exist before Bitcoin. :rolleyes:
jellomizer ( 103300 ) on Monday May 15, 2017 @11:12AM (#54418661)
Re:Silly idea (Score:2)
What happens if a still used software isn't owned by anyone any more. The Company is out of
business, There is no source code available. There is a point where the end user has some
responsibility to update their system. Like the Model-T they may still keep it, and use it for
a hobby, but knowing full well if you take it on the Highway and get in an accident you are
probably going to get killed.
thegarbz ( 1787294 ) on Monday May 15, 2017 @12:08PM (#54419169)
Re:Silly idea (Score:3)
Bad car analogy. Firstly many old cars are banned from using critical infrastructure
like highways (or in some cases any roads) for their obvious threat to third parties and their
Also this isn't hobbies we're talking about. No one gives a crap if someone's Model T toy
breaks down, just like no one will cry about the Windows XP virtual machine I play with at
The only complaints are against critical services, internet connected machines that operate
and provide livelihoods for the owners. If the software isn't owned by anyone, ... well I'm
sure the owner provided an unbiased risk assessment as to whether they should migrate to
something that is supported by someone right? Didn't think so.
The end user has 100% of the responsibility, and dollars don't change that.
WannaCry offers free decryption for some random number of files in the folder C:\Intel\<random
folder name>\f.wnry. We have seen 10 files decrypted for free.
In the first step, the malware checks the header of each encrypted file. Once successful, it calls
the decryption routine, and decrypts all the files listed in C:\Intel\<random folder name>\ f.wnry.
A code snippet of the header check:
The format of the encrypted file:
To decrypt all the files on an infected machine we need the file 00000000.dky, which contains
the decryption keys. The decryption routine for the key and original file follows:
WannaCry uses three Bitcoin wallets to receive payments from its victims. Looking at the payment
activity for these wallets gives us an idea of how much money the attackers have made.
The current statistics as of May 13 show that not many people have paid to recover their files:
- Wallet 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
- Wallet 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
- Wallet 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
The attackers appear to have earned a little over BTC 15.44 (US$27,724.22). That is not much considering
the number of infected machines, but these numbers are increasing and might become much higher in
the next few days. It's possible that the sink holing of two sites may have helped slow things down:
Multiple organizations across more than 90 countries have been impacted, according to reports.
We will update this blog as we learn more.
"Cyber criminals may believe they are anonymous but we will use all the tools at our disposal
to bring them to justice," said Oliver Gower from the National Crime Agency.
A computer security expert
credited with stopping the spread of the ransomware on Saturday by activating a digital "kill
switch" warned on Sunday that a fresh attack was likely.
The expert, known only as MalwareTech on Twitter, said hackers could upgrade the virus. "Version
1 of WannaCrypt was stoppable but version 2.0 will likely remove the flaw,"
he said on
Twitter . "You're only safe if you patch ASAP."
On Sunday, Microsoft issued a security bulletin marked "critical" including security updates that
it said "resolves vulnerabilities in Microsoft Windows".
It emerged over the weekend that NHS Digital last month emailed 10,000 individuals in NHS organisations
warning them to protect themselves against the specific threat of ransomware and included a software
patch to block such hacks on the majority of systems. However, it would not work with outdated Windows
XP systems that still run on about 5% of NHS devices.
NHS Digital said it did not yet know how many organisations installed the update and this would
be revealed in a later analysis of the incident.
... ... ...
Amber Rudd, the home secretary, who is leading the response to the attack, said the same day:
"I don't think it's to do with ... preparedness. There's always more we can all do to make sure we're
secure against viruses, but I think there have already been good preparations in place by the NHS
to make sure they were ready for this sort of attack."
In a blog post late Sunday, Microsoft President Brad Smith appeared to tacitly acknowledge
what researchers had already widely concluded: The ransomware attack leveraged a hacking tool,
built by the US National Security Agency, that leaked online in April.
He also poured fuel on a long-running debate over how government intelligence services should
balance their desire to keep software flaws secret – in order to conduct espionage and cyber
warfare – against sharing those flaws with technology companies to better secure the internet.
"This attack provides yet another example of why the stockpiling of vulnerabilities by
governments is such a problem," Smith wrote. He added that governments around the world should
"treat this attack as a wake-up call" and "consider the damage to civilians that comes from
hoarding these vulnerabilities and the use of these exploits."
The NSA and White House did not immediately respond to requests for comment about the Microsoft
A general view of the Dharmais hospital in Jakarta, Indonesia May 14, 2017. REUTERS/Darren
The Dharmais hospital in Jakarta was targeted by the Wannacry "ransomware" worm. Photo:
US President Donald Trump on Friday night ordered his homeland security adviser, Tom Bossert, to
convene an "emergency meeting" to assess the threat posed by the global attack, a senior
administration official told Reuters.
Senior US security officials held another meeting in the White House Situation Room on Saturday,
and the FBI and the National Security Agency were working to help mitigate damage and identify
the perpetrators of the massive cyber attack, said the official, who spoke on condition of
anonymity to discuss internal deliberations.
The investigations into the attack were in the early stages, however, and attribution for
cyberattacks is notoriously difficult.
The original attack lost momentum late on Friday after a security researcher took control of a
server connected to the outbreak, which crippled a feature that caused the malware to rapidly
spread across infected networks.
Infected computers appear to largely be out-of-date devices that organizations deemed not worth
the price of upgrading or, in some cases, machines involved in manufacturing or hospital
functions that proved too difficult to patch without possibly disrupting crucial operations,
security experts said.
Microsoft released patches last month and on Friday to fix a vulnerability that allowed the worm
to spread across networks, a rare and powerful feature that caused infections to surge on Friday.
Code for exploiting that bug, which is known as "Eternal Blue," was released on the internet last
month by a hacking group known as the Shadow Brokers.
The head of the European Union police agency said on Sunday the cyber assault hit 200,000 victims
in at least 150 countries and that number would grow when people return to work on Monday.
"... French police said there were "more than 75,000 victims" around the globe, but cautioned that the number could increase "significantly". ..."
International investigators hunted for those behind an unprecedented cyber-attack that
affected systems in dozens of countries, including at banks, hospitals and government agencies, as
security experts sought to contain the fallout.
The assault, which began on Friday and was being described as the biggest-ever cyber ransom attack,
struck state agencies and major companies around the world - from Russian banks and British hospitals
to FedEx and European car factories.
"The recent attack is at an unprecedented level and will require a complex international investigation
to identify the culprits," said Europol, Europe's police agency. Europol said a special task force at its European Cybercrime Centre was "specially designed to
assist in such investigations and will play an important role in supporting the investigation".
The attacks used ransomware that apparently exploited a security flaw in Microsoft operating systems,
locking users' files unless they pay the attackers a designated sum in the virtual currency Bitcoin. Images appeared on victims' screens demanding payment of $300 in Bitcoin, saying: "Ooops, your
files have been encrypted!" Payment is demanded within three days or the price is doubled, and if none is received within
seven days the files will be deleted, according to the screen message.
But experts and government alike warn against ceding to the hackers' demands. "Paying the ransom does not guarantee the encrypted files will be released," the US Department
of Homeland Security's computer emergency response team said.
Mikko Hypponen, chief research officer at the Helsinki- based cyber security company F-Secure,
told AFP it was the biggest ransomware outbreak in history, saying that 130,000 systems in more than
100 countries had been affected.
... .... ....
French police said there were "more than 75,000 victims" around the globe, but cautioned that the number could increase "significantly".
on May 12, called "encryption" (Wannacry) "worm" blackmail software in large-scale spread around
the world.The software using the Windows SMB services vulnerabilities, documents, pictures, etc.
Of computer implementation of high-strength encryption, and ransom.Currently, including universities,
energy and other important information system, more class user attack, have serious security threat
to China's Internet network.
a, infected host emergency isolation methods given WannaCry worm has
a great risk, all the known infected host must isolate their work from the current network.
in view of the file has been damaged by worms, as of 2017/5/14 haven't found any effective means
to restore.To prevent further spread worms, it is forbidden to infected host any file copy to other
host or device, it is strictly forbidden to known infected host to access any network.
2, important documents emergency handling methods in order to ensure the important document is
not destroyed by WannaCry worms, minimize loss, all uninfected hosts or ban on uncertain whether
the type host need to adopt the method of physical copy for processing, i.e., the host opens by
the professionals, remove all the hard disk where important files, and use the external devices mounted
to determine uninfected hosts will be copied.
to prevent secondary infection, copy the file must be in the isolation zone for processing.
it is strictly forbidden to hard disk may be infected by the IDE and SATA motherboard interface
mounted directly to the copy machine, in order to prevent the copying machine use the hard disk boot,
leading to possible infection.
existing in the network, have access to all Windows host should adopt the method of important
after the physical copy process, in accordance with the: three, host, emergency detection strategy
is used to detect the emergency treatment.
the temporary absence of these conditions or because of some must be switched on, it is important
to ensure keep access to the Internet boot in out of the office network environment (such as 4 g
networks, ordinary broadband, etc.), at the same time must be the entire keep clear of the Internet.(access
to the Internet standard for success: can open the following web site in the browser, and see the
content as shown: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
for classified machine cannot access to the Internet, make sure the web server, network configuration
and the domain name resolution to access the Intranet server.
the Intranet server home page must return the following contents:
sinkhole. Tech - where the bots party hard and the researchers harder. & lt;!- h4 - & gt;At the
end of the temporary boot process, shutdown and physical copy process.
3, host, emergency detection strategies in view of the physical copy after the host, to make the
test be mounted hard drive Windows directory, see if there are files: mssecsvc. Exe, if there
in view of the host other boot, check whether there is a file system disk Windows directory: mssecsvc.
Exe.Check whether there is a service in the system mssecsvc2.0 (see specific operation at the end
of this section).Any one is exists to prove that is infected.
for there is a firewall with other logging equipment in the network, check whether there is in
the log of domain name: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, if any, prove the existence
of network within the infected host.In view of the infected host detect, be sure to at the end of
the physical copy process format for all the hard disk.
similar to the host if there is a backup before 2017/4/13, full recovery operations can be performed
(including system disk as well as other all), a backup after this time may have been infected, not
in view of the network known to exist the infected host, prohibit open closed host, at the same
time to physical copies of the host process.For the host has been switched on, immediately shut down,
and the physical copy process.Attachment: the method of inspection service:
Windows + R key to open the "run" window:
input services. MSC enter, open the service administration page:
check all items in the" name "column, there mssecsvc2.0 suggests that infected.
4, uninfected hosts emergency defense strategy
to an infected host, there are four emergency defense strategy.
one strategy as the most effective means of defense, but takes longer.Other strategies for temporary
solution for unable to implement strategies for temporary use.
application strategy two or three in the host will not be able to access the network sharing,
please carefully use.
in no immediate application strategy and suggestion first application strategy four temporary
defence.No matter use what kind of temporary strategy, all must be application strategy as soon as
possible in order to achieve complete defense.
under 10 version for Windows host, suggest to upgrade to Windows 10 and update to the latest version
of the system.Because of the situation cannot upgrade, be sure to use an emergency defense strategy
strategy one: install MS17-010 system patches
according to the system version, install patches MS17-010.With Windows 7 and above can be gained
through the automatic updates to install all patches, Windows xp, Windows 2003 and Windows vista
can be gained by installing temporary tools provided with the document.
strategy 2: closing loopholes related services
by professionals using the following command to close loopholes related services:
sc stop LmHosts
sc stop lanmanworkstation
sc stop LanmanServer
sc config LmHosts start = DISABLED
sc config lanmanworkstation start = DISABLED
sc config LanmanServer start = DISABLE
strategy 3: configure the firewall ban vulnerabilities related port
for Windows 2003 or Windows xp system, click on the start menu, and open the "control panel".
double click the" Windows firewall "option in control panel, click on the" exception "TAB,
and uncheck the" file and printer sharing ", and click ok.
for Windows 7 and above system, click on the start menu, open the control panel, click on the"
system and security "" Windows firewall".
in Windows firewall configuration page, click the" allow the procedure or function through
Windows firewall "option, click at the top of the" change Settings ":
in the list to find" file and printer sharing "checkbox, uncheck the, click ok in the end.
strategy 4: use the vulnerability defense tool
360 company provides tools for temporary immune defense worm, this tool can be downloaded in the
directly to perform this tool can be simple to defence, every time to restart the host must perform
this tool again.
5, emergency public server and network security defense strategy
on public server (such as web sites, public system, etc.) most can connect to the Internet, for
Windows server 2008 r2 and higher versions, suggested that open system "automatically update" function,
and install all patches.
for Windows server 2003, you can choose four, uninfected hosts emergency strategy of defense strategy
for defense, at the same time Suggestions as soon as possible to upgrade to higher version of the
server (such as Windows 2008 r2).
according to the internal network, need to ensure the safety of the host of the case to prevent
without using the sharing function, but on firewalls, routers and other equipment 445 port access
since this worm using domain name: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com as "switch",
instantly attacks when unable to access the domain name.Therefore, the ban on the network security
devices such as firewall and IPS intercept this domain name, otherwise it will trigger the infected
host encryption process, cause irreparable damage.
use Intranet private DNS, be sure to configure the domain analysis, and point to survive in the
Intranet web server.The Intranet server home page should be returned the following contents:
sinkhole. Tech - where the bots party hard and the researchers harder.
& lt;!- h4 - & gt;
net letter tianjin municipal party committee office, network security and information technology
Targets both large and small have been hit.
Renault said on Saturday it had halted
manufacturing at plants in Sandouville, France, and Romania to prevent the spread of
ransomware in its systems.
Among the other victims is a Nissan manufacturing plant in Sunderland, northeast
England, hundreds of hospitals and clinics in the British National Health Service,
German rail operator Deutsche Bahn and International shipper FedEx Corp
A Jakarta hospital said on Sunday that the cyber attack had infected 400 computers,
disrupting the registration of patients and finding records. The hospital said it
expected big queues on Monday when about 500 people were due to register.
'Ransom' paymentsmay rise
Account addresses hard-coded into the malicious WannaCry software code appear to show
the attackers had received just under US$32,500 in anonymous bitcoin currency as of 1100
GMT on Sunday, but that amount could rise as more victims rush to pay ransoms of US$300
or more to regain access to their computers, just one day before the threatened deadline
"I can confirm we've had versions without the kill switch domain connect since yesterday,"
Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on
TiggertheMad ( 556308 )
writes: on Friday May
12, 2017 @07:19PM (
Insecurity Agency (
Score: 4 , Informative) ]
ancientt ( 569920 )
email@example.com > on Friday May 12, 2017 @08:07PM (
The NSA (and other ABC agencies that are undoubtedly running the same game plan) are doing
what they are tasked with, finding ways to protect America and America's interests. Using hacking
as a tool to this end is (relatively) new in the old game of spycraft, so there are going to be
a few epic disasters like this before the black ops people start to figure out all the types of
blow back they can experience.
The US was really big on foreign covert action in the 50's, and it took the bay of pigs to
make people realize that there were ways that things could go horribly wrong. That didn't stop
covert action from being used, but I think it was employed more carefully afterwards. Having all
their shiny hacking toys stolen and having this happen is the hacking version of the 'Bay of Pigs'.
Also, while the NSA seems to have compiled a formidable array of exploits and tools to compromise
enemy systems, that doesn't mean that everyone else isn't playing the exact same game. The only
difference between the NSA and EVERY other state intelligence agency on the planet is that they
seem to be able to properly secure their black ops toys. Being one of the largest agencies of
this sort, there are going to be a lot of people in the know. And the more people involved, the
harder it is to keep a secret.
Mind you, that doesn't make this any less tragic or regrettable.
I sort of hope the CIA decides that it is in the US interest to find and vanish anyone connected
with this ransomware to make an example of them. Alas, that sort of thing only happens in implausible
Insecurity Agency (
Score: 3 )
mcswell ( 1102107 )
writes: on Friday May 12,
2017 @11:09PM (
Remotely exploitable network vulnerabilities shouldn't happen, but there seems no practical
hope that they'll stop anytime soon. It would be negligent of legitimate spy agencies to fail
to search for them and arguably be able to take advantage of them. Imagine you're trying to find
out when an ISIS group is planning a bombing and you discover they're running a messageboard on
a Windows machine with an SMB exploit, do you tell Microsoft to patch the exploit?
You never know which of the vulnerabilities you'll be able to use, but if you dedicate sufficient
resources to finding them and building exploits for them, then there is a good chance you'll be
able to spy on whichever bad guy your agency needs to spy on when the need arises. Getting all
the vendors to patch the exploits you find does limit your own agency's ability to spy but you
have to assume it doesn't impair your enemies as significantly since the enemy doubtless will
have exploits you don't have.
What's the best solution? I suspect the best thing to do is build force-patch worms for every
exploit. If you write an exploit, you should also dedicate resources to the task of writing a
version of the exploit which pressures the owner of the exploited system to fix the problem. So
in this instance, as soon as the attacks started being seen in the wild, the NSA servers should
have launched a MASSIVE attack against any and all systems with the vulnerability which would
disable the vulnerable systems in the least painful ways along with alerting the owners of the
need to update their systems. Instead of getting "your files are encrypted and give hackers bitcoin
to recover" messages, the people with exploitable systems should be seeing warnings like "Your
system has been temporarily patched by the NSA for your own protection, please secure or update
your device to protect it from malicious actors."
Hajime botnet [arstechnica.com] may actually already be just the thing I'm describing. I'd
prefer to see the NSA take public responsibility, and I'm doubtful the NSA is actually responsible
for that one, but it is an example of how it could be done.
If I have a vulnerable system, I'd much prefer to see it hacked by the NSA instead of some
ransomware writer. Do I wish it wasn't hackable? Of course, but I accept that anything plugged
into a network might be hackable. I do what I can to protect it from everyone, including the NSA.
It's not that I'm worried about the NSA (because they have the resources to gain physical access
if they really want it) but if I do my best to build secure systems, then it's less likely I'll
wake up to a ransomware message some morning
"thanks" to your "security"-agency... (
Score: 2 )
Anonymous Coward writes: on Friday May 12, 2017 @08:56PM (
And why do you think Microsoft was able to patch this *before* the exploit was leaked by Shadow
"thanks" to your "security"-agency... (
Score: 1 )
Man On Pink Corner
( 1089867 ) writes: on Friday
May 12, 2017 @08:29PM (
microsoft is partly guilty in this for sure because A LOT of people have the updates turned
off since the windows 10 debacle, the lies, the telemetry, the diagtrack process, the broken windows
update service that sits iddle consuming 25% of your cpu, etc
but even a monkey like me that hears about the smb vuln, even if i dont know what it means
exactly because im just a user and not an engineer, i could tell it was BAD, so i patched the
living shit out of my computer
sorry but if youve had experiences with blaster, conficker, etc, you should know about this
kind of things already, again, not an engineer at all, but just hearing about it, looking the
ports affected this thing looked really bad
only happened to idiots. (
Score: 3 )
Anonymous Coward , Friday May 12, 2017 @06:55PM (
Microsoft told lie after lie after lie about their intentions. There was absolutely no reason
to believe that setting your update threshold to "Critical Only" would save you from an unsolicited
Windows 10 installation.
The only rational course of action for those who didn't want Windows 10 was to turn off Windows
Update entirely. Deny this all you want, but be prepared for justified accusations of victim-blaming.
the NHS hard (
Score: 5 , Interesting)
TroII ( 4484479 )
writes: on Friday May 12, 2017
I'm a doctor in the NHS. It hit my hospital hard. The bosses triggered the MAJAX protocols
meaning everyone off work was called to come in and help. Computers are used for everything, so
blood tests, admissions, scan requests, referrals, all had to be done by hand. The public were
asked to keep away from A+E because hundreds of people were waiting. It was terrifying how little
failsafe infrastructure there was. The hospital just stopped working.
hit the NHS hard (
Score: 5 , Insightful)
guruevi ( 827432 )
evi@evcir[ ]ts.com ['cui' in gap] > on
Friday May 12, 2017 @07:03PM (
And you use unpatched computers in a hospital WHY?
Because patches are often broken . Imagine these hospitals had applied the patch when Microsoft
released it, but the patch was faulty in some way, and all of the hospital computers went down
as a result. Instead of complaining the hospitals were running unpatched, you and/or many people
like you would be bitching and moaning that they were negligent to install the patch too soon.
Updates from Microsoft frequently include at least one broken patch. There was one update last
year that broke millions of peoples' webcams. There have been several updates that interfered
with settings and reverted them back to default configurations, and several more updates that
seemingly deleted group policy objects that had been configured by the domain administrator. There
was a patch around the new year that inadvertently disabled the DHCP service, despite the update
itself having nothing to do with DHCP. (Things that make you go hmmm.) This particular fuck-up
rendered a lot of machines not only broken, but totally irreparable without manual human intervention,
i.e. dispatching someone clueful to each of your premises to clean up the mess.
Patch deployment in any enterprise environment requires extensive testing. You have to coordinate
with your software vendors to make sure their applications are compatible with the update. If
you install Patch XYZ without first getting approval from Vendor123, you wind up invalidating
your support contracts with them. All of this takes time. In 2016, there were several months
in a row where Microsoft had to un-issue, repair, supersede, and re-release a broken patch
they'd pushed out. Put yourself in the shoes of an admin team who got burned by Windows Update
breaking your systems, especially repeatedly. Are you going to be in any hurry to patch? If you
were bitten by the DHCP bug, do you trust that the "critical SMB patch" really only touches SMBv1,
and isn't going to inexplicably corrupt Office or remove IPV4 connectivity on every computer it
If the PC your kid plays Minecraft on gets hosed by a broken patch, it's not that big of a
deal. The business world is a different story.
my mind (
Score: 4 , Informative)
( 939350 ) , Saturday May 13, 2017
Is that there are still 45k Windows machine that are directly connected to the Internet.
Any Windows machine I manage (mostly very specific medical software and medical machines) are
either VM (and thus behind a firewall and any service proxied to a BSD or Linux host) or airgapped.
of blame to spread around (
Score: 2 )
1, Microsoft has always had a disclosure that their OS is not suitable for life-critical applications
2. NSA has a dual mission -- the second (neglected) mission is to ensure the security of domestic
Officials have claimed in the wake of the global ransomware attack that patient care has been
unaffected despite 45 NHS sites
But hospitals across England and Scotland were forced to cancel routine procedures and divert
emergency cases in the wake of the attack, which has shut down access to computers in almost 100
countries. Here, patients and NHS workers reveal how the crisis has affected them.
Bill, a doctor at a hospital in London
I have been unable to look after patients properly. However much they pretend patient safety is
unaffected, it's not true. At my hospital we are literally unable to do any X-rays, which are
an essential component of emergency medicine. I had a patient this evening who we could not do
an X-ray for, who absolutely should have had one. He is OK but that is just one example.
Theresa, 44, a breast cancer patient from Lincolnshire
My hospital is good in many ways but the IT system is appalling. I was shocked when I started
in hospital at how bad the systems are. I know the staff will do their very best to keep looking
after everyone, but there are no robust systems in place to deal with blackouts like this, information-sharing
is hard enough in a clinical environment when everything works.
Without the IT systems I suspect test results will be missed, and definitely delayed. Handovers
are much more difficult. It will absolutely certainly impact patient safety negatively, even if
that impact can't be clearly measured. This is basically all the result of chronic underfunding
and crap, short-sighted management.
I was halfway through my chemotherapy infusion when the attack happened. The treatment finished
without a hitch, but I then had to wait for a couple of hours for my medications to take home.
That's because all drugs have to be checked against prescriptions, and they are all computerised.
The hospital pharmacists worked quickly to produce paper copies, but it still took a while. The
horrible side-effects (nausea, exhaustion, dizziness) kicked in while I was stuck in rush-hour
traffic coming home. Fortunately, I wasn't driving.
Amber, 40, a community nurse from Essex
There were other patients in the ward waiting to start their chemo whose drugs had been delivered
but again couldn't be checked, so administration was delayed. In some cases treatment had to be
postponed entirely for another day. The oncology nurses and the hospital staff were brilliant
throughout, reassuring patients and doing their best in difficult circumstances. They were also
deeply apologetic, frustrated that they couldn't do their job, and angry that such an act had
put patients treatment – and lives – at risk.
We have been unable to check patient information and scheduled visits for this afternoon. I am
working this weekend and had to write down who we may see tomorrow from my own memory. Our own
call centre for community services is in lockdown and unable to receive any information regarding
authorisation for drug changes or referrals. We are also unable to look up patient addresses,
complete any documentation or check test results.
Alun Phillips, 45, a community pharmacist from Merseyside
Doctors in Liverpool have been advised to isolate their computer systems from the wider NHS network.
This has left many of our local surgeries unable to access patient records, which are cloud-based.
Surgeries are unable to issue prescriptions from their systems, most of which are now issued electronically
via the NHS spine. Even if they could, we (community pharmacy) are being advised to not connect
to the spine. We have had quite a few requests from local surgeries to tell them what medication
patient are on, as although they cannot access patient records we still have our copy of the patients'
medication records. We have also made some emergency supplies of medication to patients unable
to access GP services while they are down.
Kyle, 42, a patient from Maidestone
I am waiting for test results after a urine infection and pain in my kidneys. I called the doctors
this afternoon. They said it looks like I need a further prescription but the doctor will need
to call me back. Two hours later I get a call from the doctor advising me that they have had to
shut down their systems due to this hack, and that they can't give me any results till Monday.
I am now worried that my situation is going to get worse without any treatment.
Ben, 37, in the prescription team at a GP surgery in the north
We were unable to process any prescriptions for patients, including urgent requests. As a result
patients could potentially be left without asthma, epilepsy or diabetes medication over the weekend.
We also had a medical emergency on-site and waited over 40 minutes for an ambulance to attend.
Ali, a cardiologist from the north
I am a cardiology registrar. At work, on call for a tertiary cardiology centre. Treating patients
with heart attacks, attending cardiac arrests, seeing sick patients in resus. We are unable to
access to old notes, blood results, x-rays or order vital tests. Blood samples are being sent
to other hospitals. We have one working x-ray viewer for the entire hospital and emergency results
are being rung through already overloaded phone lines. All of which potentially delays vital treatment
and could jeopardise patient safety. Those with life-threatening problems are still receiving
appropriate care. Though this couldn't have happened at a worse time with the weekend looming,
patients are still being looked after safely thanks to the dedication of all the members of staff
at work tonight. It's been a stark reminder of the conditions we worked under over 20 years ago
– and on how reliant on computers we are even to do things as simple as prescribe basic drugs.
Kaley, 30, a receptionist at a large surgery in the north-west
Friday afternoons are usually one of our busiest times at the surgery. With already full clinics
and people ringing for emergency appointments there were five reception staff on duty. There was
no warning that there was anything wrong with the computer systems but at around 3pm the screens
all went black, indicating that the computers had crashed. We had no access to any patient information
for the GPs or nurses. There was no way of checking the patients in. Phones were still ringing.
The computers were down for about an hour but then we were able to get back on. We received notification
that there was a virus affecting the whole of the NHS. The practice manager received a text from
the CCG advising that we should invoke "emergency planning measures". This involves printing lists
out of patients due to attend all clinics from Friday afternoon until Monday afternoon. Then we
had to print out full medical information for each patient as the system was being taken down
to investigate the virus. It's been a difficult afternoon.
Some names and details have been changed.
Today, May 12th 2017, WikiLeaks publishes "AfterMidnight" and "Assassin", two CIA malware frameworks
for the Microsoft Windows platform.
"AfterMidnight" allows operators to dynamically load and execute malware payloads on a target machine.
The main controller disguises as a self-persisting Windows Service DLL and provides secure execution
of "Gremlins" via a HTTPS based Listening Post (LP) system called "Octopus".
Once installed on a target machine AM will call back to a configured LP on a configurable schedule,
checking to see if there is a new plan for it to execute.
If there is, it downloads and stores all needed components before loading all new gremlins in
memory. "Gremlins" are small AM payloads that are meant to run hidden on the target and either subvert
the functionality of targeted software, survey the target (including data exfiltration) or provide
internal services for other gremlins.
The special payload "AlphaGremlin" even has a custom script language which allows operators to
schedule custom tasks to be executed on the target machine.
"Assassin" is a similar kind of malware; it is an automated implant that provides a simple collection
platform on remote computers running the Microsoft Windows operating system. Once the tool is installed
on the target, the implant is run within a Windows service process. "Assassin" (just like "AfterMidnight")
will then periodically beacon to its configured listening post(s) to request tasking and deliver
Communication occurs over one or more transport protocols as configured before or during deployment.
The "Assassin" C2 (Command and Control) and LP (Listening Post) subsystems are referred to collectively
as" The Gibson" and allow operators to perform specific tasks on an infected target..
...The Barts Health Group, which helps manage some of the largest hospitals in London, said, "
We are experiencing a major IT disruption and there are delays at all of our hospitals. "
Patients had to be turned away from surgeries and appointments at medical facilities throughout
England, and ambulances had to be rerouted to other hospitals as well.
Telefonica, one of the largest telecommunications companies in Spain, was one target, though their
services and clients were not affected, as the malicious software only impacted certain computers
on an internal network.
49 Posted by EditorDavid on Saturday May 13, 2017 @06:57PM from the wanna-cry-more? dept.
Remember that "kill switch" which
shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and
Saturday, samples of the malware emerged without that debilitating feature, meaning that
attackers may be able to resume spreading ransomware even though a security researcher cut off
the original wave. "I can confirm we've had versions without the kill switch domain connect since
yesterday," Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard
on Saturday... Another researcher confirmed they have seen samples of the malware without the killswitch.
"... Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments. ..."
- Email is one of the main infection methods. Be wary of unexpected emails especially if
they contain links and/or attachments.
- Be extremely wary of any Microsoft Office email attachment that advises you to enable macros
to view its content. Unless you are absolutely sure that this is a genuine email from a trusted
source, do not enable macros and instead immediately delete the email.
- Backing up important data is the single most effective way of combating ransomware infection.
Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible.
If the victim has backup copies, they can restore their files once the infection has been cleaned
up. However organizations should ensure that back-ups are appropriately protected or stored off-line
so that attackers can't delete them.
- Using cloud services could help mitigate ransomware infection, since many retain previous
versions of files, allowing you to "roll back" to the unencrypted form.
After encryption the Trojan then deletes the shadow copies of the encrypted files.
The Trojan drops the following files in every folder where files are encrypted:
•!Please Read Me!.txt
The contents of the !Please Read Me!.txt is a text version of the ransom note with details of
how to pay the ransom.
The Trojan downloads Tor and uses it to connect to a server using the Tor network.
It then displays a ransom note explaining to the user what has happened and how to pay the ransom.
WannaCry encrypts files with the following extensions, appending .WCRY to the end of the file
Probably the best description of the worm on Youtube as of May 13, 2017...
Andy Beez, 9 hours ago
Thanks for the forensic deconstruction - a lot more info than the experts on Sky News!
Is it interesting the popup is written in accurate English with the correct use of capitals, commas
and full stops? Plus the grammar is correct. I understand the Italian version has the same grammatical
exactness. So not script kiddies from Chindia? This writers are well educated.
Anton, 10 hours ago
A kill switch already has been found in the code, which prevents new infections. This has been
activated by researchers and should slow the spread.
Colin Hardy, 8 hours ago
agree. Firstly, contain your network (block affected ports in/outbound), also look for compromised
hosts on your network using the various IOCs from the likes of Virus Total and other analysts
blogs. Remediate the machines, and rebuild the network - slowly, carefully and under good supervision!
Colin Hardy, 8 hours ago
this was an awesome find as well. see my new video https://youtu.be/d56g3wahBck
on how you can see it for yourself.
Symantec provides a better description of what you need to look at.
The WannaCry ransomware received and analyzed by US-CERT is a loader that contains an AES-encrypted
DLL. During runtime, the loader writes a file to disk named "t.wry". The malware then uses an embedded
128-bit key to decrypt this file. This DLL, which is then loaded into the parent process, is the
actual Wanna Cry Ransomware responsible for encrypting the user's files. Using this cryptographic
loading method, the WannaCry DLL is never directly exposed on disk and not vulnerable to antivirus
The newly loaded DLL immediately begins encrypting files on the victim's system and encrypts the
user's files with 128-bit AES. A random key is generated for the encryption of each file.
The malware also attempts to access the IPC$ shares and SMB resources the victim system has access
to. This access permits the malware to spread itself laterally on a compromised network. However,
the malware never attempts to attain a password from the victim's account in order to access the
This malware is designed to spread laterally on a network by gaining unauthorized access to the
IPC$ share on network resources on the network on which it is operating.
- Malwarebytes LABS: "WanaCrypt0r ransomware hits it big just before the weekend
- Malwarebytes LABS: "The worm that spreads WanaCrypt0r"
- Microsoft: "Microsoft Security Bulletin MS17-010"
- Forbes: "An NSA Cyber Weapon Might Be Behind A Massive Global Ransomware Outbreak"
- Reuters: "Factbox: Don't click - What is the 'ransomware' WannaCry worm?"
- GitHubGist: "WannaCry|WannaDecrypt0r NSA-Cybereweapon-Powered Ransomware Worm"
"... This vulnerability was patched in the Microsoft March update (MS17-010) ..."
"... Ensure that port 445 is blocked for firewall communications with all exceptions scrutinized and verified before adding. ..."
WanaCryptor 2.0, WannaCry, WCry or WCryp is currently a world-wide ransom-ware outbreak. These
are all versions of Crypto-locker, encrypting victim files and demanding payment via bit-coin.
This vulnerability was patched in the Microsoft March update (MS17-010).
The following links contain information about the exploit that the new malware is using (based
on ETERNAL BLUE) and the fix and temporary workaround for servers and local clients, as well as firewall
SMB v1 is the current exploit mechanism being used for moving within enterprise. Movement has been
detected from Cloud Sync file-share as well. The link contains information on disabling SMBv1 (which
is the only recommended service to disable) via Servers, Powershell, and local Client Firewall Configuration,
Ensure that port 445 is blocked for firewall communications with all exceptions scrutinized
and verified before adding.
India was among the countries worst affected by the Wanna Cry attack, data shared by Kaspersky,
a Russian anti-virus company, showed. According to initial calculations performed soon after the
malware struck on Friday night, around five per cent of all computers affected in the attack were
Mikko Hypponen, chief research officer at a Helsinki-based cyber security company called F-Secure,
told news agency AFP that the it was the biggest ransomware outbreak in history and estimated that
130,000 systems in more than 100 countries had been affected.
Hypponen added that Russia and India were hit particularly hard, largely because Microsoft's Windows
XP - one of the operating systems most at risk - was still widely used there.
WanaCrypt0r has been most effective-not only does the ransomware loop through every open RDP session
on a system and run the ransomware as that user, but the initial component that gets dropped on systems
appears to be a worm that contains and runs the ransomware, spreading itself using the
SMB vulnerability (
WinMain of this
executable first tries to connect to the website
It doesn't actually download anything there, just tries to connect. If the connection succeeds,
the binary exits.
This was probably some kind of kill switch or anti-sandbox technique. Whichever it is, it has
backfired on the authors of the worm, as the domain has been sinkholed and the host in question now
resolves to an IP address that hosts a website. Therefore, nothing will happen on any new systems
that runs the executable. This only applies to the binary with the hash listed above; there may well
be new versions released in the future. UPDATE: The second argument to InternetOpenA is 1 (INTERNET_OPEN_TYPE_DIRECT),
so the worm will still work on any system that requires a proxy to access the Internet, which is
the case on the majority of corporate networks.
... ... ...
[after kill switch check pass] ...
the first thing the worm does is check the number of arguments it was launched with. If it was run
with less than two arguments passed, it installs a service called
mssecsvc2.0 with display
Microsoft Security Center (2.0) Service (where the binary ran is itself with two
arguments), starts that service, drops the ransomware binary located in the resources of the worm,
and runs it.
If it was run with two arguments or more-in other words, if it was run as a service-execution
eventually falls through to the worm function.
This from the author "accidental kill switch discovery" : "I was able to set up a live tracking
map and push it out via twitter (you can still see it
here )." Fascinating...
As of May 13 9 PM worm is still spreading with the date probably a hundred hits per hour, but kill
switch prevents newly found instances from running their own instance of the worm. An interesting
side effect is that if network has proxy that prevent access the kill switch domain then the work will
spread at full speed. So propagation into proxied network with an isolated root server
network can lead to increase in the worm infection rate as kill switch site will not work.
In other words the work is the most dangerous for private networks with the private DNS root.
"... When I returned home at about 2:30, the threat sharing platform was flooded with posts about various NHS systems all across the country being hit, which was what tipped me of to the fact this was something big. ..."
"... contrary to popular belief, most NHS employees don't open phishing emails which suggested that something to be this widespread it would have to be propagated using another method) ..."
"... Using Cisco Umbrella, we can actually see query volume to the domain prior to my registration of it which shows the campaign started at around 8 AM UTC. ..."
"... more interestingly was that after encrypting the fake files I left there as a test, it started connecting out to random IP addresses on port 445 (used by SMB). ..."
"... The mass connection attempts immediately made me think exploit scanner, and the fact it was scanning on the SMB port caused me to look back to the recent ShadowBroker leak of NSA exploits containing .an SMB exploit. ..."
So finally I've found enough time between emails and Skype calls to write up on the crazy events
which occurred over Friday, which was supposed to be part of my week off (I made it a total of 4
days without working, so there's that). You've probably read about the WannaCrypt fiasco on several
news sites, but I figured I'd tell my story.
I woke up at around 10 AM and checked onto the UK cyber threat sharing platform where i had been
following the spread of the Emotet banking malware, something which seemed incredibly significant
until today. There were a few of your usual posts about various organisations being hit with ransomware,
but nothing significant yet. I ended up going out to lunch with a friend, meanwhile the WannaCrypt
ransomware campaign had entered full swing.
When I returned home at about 2:30, the threat sharing platform was flooded with posts about various
NHS systems all across the country being hit, which was what tipped me of to the fact this was something
Although ransomware on a public sector system isn't even newsworthy, systems being hit simultaneously
across the country is (contrary to popular belief, most NHS employees don't open phishing emails
which suggested that something to be this widespread it would have to be propagated using another
method). I was quickly able to get a sample of the malware with the help of Kafeine, a good friend
and fellow researcher.
Upon running the sample in my analysis environment I instantly noticed it
queried an unregistered domain, which i promptly registered.
Using Cisco Umbrella, we can actually see query volume to the domain prior to my registration
of it which shows the campaign started at around 8 AM UTC.
... ... ...
While the domain was propagating, I ran the sample again in my virtual environment to be met with
WannaCrypt ransom page; but more interestingly was that after encrypting the fake files I left there
as a test, it started connecting out to random IP addresses on port 445 (used by SMB).
connection attempts immediately made me think exploit scanner, and the fact it was scanning on the
SMB port caused me to look back to the recent ShadowBroker leak of NSA exploits containing .an SMB
exploit. Obvious I had no evidence yet that it was definitely scanning SMB hosts or using the
leaked NSA exploit, so I tweeted out my finding and went to tend to the now propagated domain.
... ... ...
Now one thing that's important to note is the actual registration of the domain was not on a whim.
My job is to look for ways we can track and potentially stop botnets (and other kinds of malware),
so I'm always on the lookout to pick up unregistered malware control server (C2) domains. In fact
I registered several thousand of such domains in the past year.
Our standard model goes something like this.
- Look for unregistered or expired C2 domains belonging to active botnets and point it to our
sinkhole (a sinkhole is a server designed to capture malicious traffic and prevent control of
infected computers by the criminals who infected them).
- Gather data on the geographical distribution and scale of the infections, including IP addresses,
which can be used to notify victims that they're infected and assist law enforcement.
- Reverse engineer the malware and see if there are any vulnerabilities in the code which would
allow us to take-over the malware/botnet and prevent the spread or malicious use, via the domain
In the case of WannaCrypt, step 1, 2 and 3 were all one and the same, I just didn't know it yet.
A few seconds after the domain had gone live I received a DM from a Talos analyst asking for the
sample I had which was scanning SMB host, which i provided. Humorously at this point we had unknowingly
killed the malware so there was much confusion as to why he could not run the exact same sample I
just ran and get any results at all. As curious as this was, I was pressed for time and wasn't able
to investigate, because now the sinkhole servers were coming dangerously close to their maximum load.
I set about making sure our sinkhole server were stable and getting the expected data from the
domain we had registered (at this point we still didn't know much about what the domain I registered
was for, just that anyone infected with this malware would connect to the domain we now own, allowing
us to track the spread of the infection). Sorting out the sinkholes took longer than expected due
to a very large botnet we had sinkholed the previous week eating up all the bandwidth, but soon enough
I was able to set up a live tracking map and push it out via twitter (you can still see it
Aris Adamantiadis > greggreen29 • 12 hours ago
To be fair, he said himself he thought at some point that registering the domain name triggered
the ransomware instead of disabling it. The story headline would have mentioned "Security research
accidentally armed a ransomware" in that case. His experience told him it was a good thing to
own domains used by C&C, his luck made it that it was a kill switch. I don't think "accidental"
is undeserved in this case.
Whatever, it's good job!
Dave > greggreen29 • 13 hours ago
The media is filled with people who don't do their research. This is both true in the IT world
along with the firearms world. Me being involved in both. Media however LOVES buzzwords without
even knowing what that word means nor use it in context correctly.
They make conclusions about things they don't even understand or refer to a real expert in
the field or multiple to get out of single sourced subjective analysis problems.
I am no total expert in either though I do know a lot, but I make my due diligience if I do
write aboit a subject, I do RESEARCH vs WEBSEARCH on it to draw conclusions. I also then employ
logic and personal experiences for supplimenting those conclusions if I have the experiences to
This is why I follow people I would deem as experts in the field, to learn more about what
we come across, to ask questions, and to constantly learn.
This is why I follow the Malwaretech crew and others like them in security and forensics.
Malwaretech, thank you for your service, not only for this incident, but all the research you
Susan O'neill > Dave • 10 hours ago
Well said Dave. Whilst I struggled to follow the report on his progress, it would seem that
he is connected to people who can offer a service and using his own expertise and by a process
of elimination, find the answers, but because he caught on to something very quickly(which he
might easily have missed, had he not been so thorough and alert) would have allowed the worm to
continue it's travels. I think a lot of people should be very thankful to MalwareTech and his
expertise - even if it does generate more business for him, it's probably well deserved.
How to enable or disable SMB protocols on the SMB server 0 -- Windows 8 and Windows Server
2012 Windows 8 and Windows Server 2012 introduce the new Set-SMBServerConfiguration Windows PowerShell
cmdlet. The cmdlet enables you to enable or disable the SMBv1, SMBv2, and SMBv3 protocols on the
Notes When you enable or disable SMBv2 in Windows 8 or in Windows Server 2012, SMBv3 is also enabled
or disabled. This behavior occurs because these protocols share the same stack.
You do not have to restart the computer after you run the Set-SMBServerConfiguration cmdlet.
- To obtain the current state of the SMB server protocol configuration, run the following cmdlet:
Get-SmbServerConfiguration | Select EnableSMB1Protocol, EnableSMB2Protocol
Windows 7, Windows Server 2008 R2, Windows Vista, and Windows Server 2008 To enable or disable
SMB protocols on an SMB Server that is running Windows 7, Windows Server 2008 R2, Windows Vista,
or Windows Server 2008, use Windows PowerShell or Registry Editor. Windows PowerShell 2.0 or a
later version of PowerShell
- To disable SMBv1 on the SMB server, run the following cmdlet: Set-SmbServerConfiguration -EnableSMB1Protocol
... ... ...
- To disable SMBv1 on the SMB server, run the following cmdlet: Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters"
SMB1 -Type DWORD -Value 0 -Force
... ... ...
Note You must restart the computer after you make these changes. Registry Editor Important
This article contains information about how to modify the registry. Make sure that you back up the
registry before you modify it. Make sure that you know how to restore the registry if a problem occurs.
For more information about how to back up, restore, and modify the registry, click the following
article number to view the article in the Microsoft Knowledge Base:
322756 How to back
up and restore the registry in Windows To enable or disable SMBv1 on the SMB server, configure the
following registry key: Registry subkey:
Registry entry: SMB1
REG_DWORD: 0 = Disabled
REG_DWORD: 1 = Enabled
Default: 1 = Enabled
For customers using Windows Defender, Microsoft released an update on May 13 which detects this
Defensive firewall configuration is important as Windows is full of holes. Download the update
"... This security update is rated Critical for all supported releases of Microsoft Windows. ..."
This is the vulnerability that Wanna Cry malware uses
March 14, 2017 Published: March 14, 2017
This security update is rated Critical for all supported releases of Microsoft Windows.
For more information, see the Affected Software and Vulnerability Severity Ratings section.
The security update addresses the vulnerabilities by correcting how SMBv1 handles specially
For more information about the vulnerabilities, see the Vulnerability Information section.
For more information about this update, see
Microsoft Knowledge Base Article
How to run your own PowerShell scripts / cmdlets Posted December 3, 2010 by
Batch file programming ,
By default, Microsoft has prevented the running of custom PowerShell scripts, a.k.a. cmdlets,
by setting the PowerShell "ExecutionPolicy" to "Restricted". This can be changed easily.
You can change the ExecutionPolicy for PowerShell scripts/cmdlets by running the PowerShell command
To elaborate your options for this command, simply run the following in PowerShell:
Set-ExecutionPolicy -ExecutionPolicy -?
Personally, I prefer to set the ExecutionPolicy to "RemoteSigned". This allows me to run my own
scripts, but prevents unsigned scripts from others from running:
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned
Test this as follows: Create a new PowerShell script on your Desktop. Right-click the Desktop,
New > Text Document. Name it test.ps1
Right-click test.ps1 and select Edit. It should open up with PowerShell ISE (Integrated Scripting
Environment). Type the following in the top pane:
Echo "Hello World!"
Save it with Ctrl + S, and close it.
Now open up powershell, change to your Desktop and try running the script:
Then change your ExecutionPolicy to "RemoteSigned" and try again:
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned
Notice that the script/cmdlet is referenced using ".\". You can also use the full path, but cannot
run it by simply typing its name (very Unix like, eh?).
Also note the use of "$env:userprofile" to represent the path to your user profile. In the classic
Windows Command Processor, this was represented with simply "%userprofile%".
Lastly, please note that this will not work as indicated if you are not in the local Administrators
group. It is, in fact, a best practice to avoid daily use of an account which is in the local Administrators
group, so this may be the case for you. To work around it, simply launch powershell as an Administrator
to set the execution policy. See
In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and
control Windows computers was leaked by an entity known only as the "Shadow Brokers." Not even a
whole month later, the hypothetical threat that criminals would use the tools against the general
public has become real, and tens of thousands of computers worldwide are now crippled by an unknown
party demanding ransom.
The malware worm taking over the computers goes by the names "WannaCry" or "Wanna Decryptor."
It spreads from machine to machine silently and remains invisible to users until it unveils itself
as so-called ransomware, telling users that all their files have been encrypted with a key known
only to the attacker and that they will be locked out until they pay $300 to an anonymous party using
the cryptocurrency Bitcoin.
At this point, one's computer would be rendered useless for anything other than paying said ransom.
The price rises to $600 after a few days; after seven days, if no ransom is paid, the hacker (or
hackers) will make the data permanently inaccessible (WannaCry victims will have a handy countdown
clock to see exactly how much time they have left).
Ransomware is not new; for victims, such an attack is normally a colossal headache. But today's
vicious outbreak has spread ransomware on a massive scale, hitting not just home computers but reportedly
health care, communications infrastructure, logistics, and government entities.
Cyber attacks on a global scale took place on Friday, May 12, 2017. The notable hits include computers
in 16 UK hospitals, Telefonica Telecom in Spain, Gas Natural, Iberdrola. Several thousand computer were
infected in 99 countries.
WannaCry ransomware attack - Wikipedia
WannaCry is believed to use the
was developed by the U.S.
National Security Agency
to attack computers running
Microsoft Windows operating
systems. Once it invades a network, it is self-replicated and transmitted to other computers.
Initial infection vector is either via
LAN, an email attachment, or drive-by
A kill switch has been found
in the code, which since May 13 helps to prevent new infections. This swich was accidentally activated
by an anti-virus researcher from GB. However, different versions of the attack may be released and all
vulnerable systems still have an urgent need to be patched.
"... Hollywood Overwhelmed With Hack Attacks; FBI Advises 'Pay Ransom'... ..."
The ransomware has been identifed as WannaCry
* * *
Update 4 : According to experts tracking and analyzing the worm and its spread, this could
be one of the worst-ever recorded attacks of its kind .
The security researcher who tweets and blogs as MalwareTech
told The Intercept "I've never seen anything like this with ransomware," and "the last worm
of this degree I can remember is Conficker." Conficker was a notorious Windows worm first spotted
in 2008; it went on to infect over nine million computers in nearly 200 countries.
As The Intercept details,
Today's WannaCry attack appears to use an NSA exploit codenamed ETERNALBLUE, a software weapon
that would have allowed the spy agency's hackers to break into any of millions of Windows computers
by exploiting a flaw in how certain version of Windows implemented a network protocol commonly
used to share files and to print. Even though Microsoft fixed the ETERNALBLUE vulnerability in
a March software update, the safety provided there relied on computer users keeping their systems
current with the most recent updates. Clearly, as has always been the case, many people (including
in governments) are not installing updates. Before, there would have been some solace in knowing
that only enemies of the NSA would have to fear having ETERNALBLUE used against them–but from
the moment the agency lost control of its own exploit last summer, there's been no such assurance.
Today shows exactly what's at stake when government hackers can't keep their virtual weapons
As security researcher Matthew Hickey, who tracked the leaked NSA tools last month, put it,
"I am actually surprised that a weaponized malware of this nature didn't spread sooner."
Update 3: Microsoft has issued a statement, confirming the status the vulnerability:
Today our engineers added detection and protection against new malicious software known as
In March, we provided a security update which provides additional protections against this
Those who are running our free antivirus software and have Windows updates enabled, are protected.
We are working with customers to provide additional assistance.
Update 2: Security firm
Kaspersky Lab has recorded more than 45,000 attacks in 74 countries in the past 10 hours
Seventy-four countries around the globe have been affected, with the number of victims still
growing, according to Kaspersky Lab. According to Avast, over 57,000 attacks have been detected
worldwide, the company said, adding that it "quickly escalated into a massive spreading."
57,000 detections of
#ransomware by Avast
today. More details in blog post: https://t.co/PWxbs8LZkk
- Jakub Kroustek (@JakubKroustek)
According to Avast, the ransomware has also targeted Russia, Ukraine and Taiwan. The virus
is apparently the upgraded version of the ransomware that first appeared in February. Believed
to be affecting only Windows operated computers, it changes the affected file extension names
to ".WNCRY." It then drops ransom notes to a user in a text file, demanding $300 worth of bitcoins
to be paid to unlock the infected files within a certain period of time.
While the victim's wallpaper is being changed, affected users also see a countdown timer to
remind them of the limited time they have to pay the ransom. If they fail to pay, their data will
be deleted, cybercriminals warn. According to the New York Times, citing security experts, the
ransomware exploits a "vulnerability that was discovered and developed by the National Security
Agency (NSA)." The hacking tool was leaked by a group calling itself the Shadow Brokers, the report
said, adding, that it has been distributing the stolen NSA hacking tools online since last year.
Predictably, Edward Snowden - who has been warning about just such an eventuality - chimed
Twitter, saying " Whoa: @NSAGov decision to build attack tools targeting US software now threatens
the lives of hospital patients."
* * *
Update 1 : In a shocking revelation,
The FT reports that hackers responsible for the wave of cyber attacks that struck organisations
across the globe used tools stolen from the US National Security Agency.
A hacking tool known as "eternal blue", developed by US spies has been weaponised by the hackers
to super-charge an existing form of ransomware known as WannaCry, three senior cyber security
analysts said. Their reading of events was confirmed by western security officials who are still
scrambling to contain the spread of the attack. The NSA's eternal blue exploit allows the malware
to spread through file-sharing protocols set up across organisations, many of which span the globe.
As Sam Coates summed up...
NHS hack: So NSA had secret backdoor into Windows. Details leaked few weeks ago. Now backdoor
being exploited by random criminals. Nightmare
- Sam Coates Times (@SamCoatesTimes)
* * *
We earlier reported in the disturbing fact that
hospitals across the United Kingdom had gone dark due to a massive cyber-attack...
Hospitals across the UK have been hit by what appears to be a major, nationwide cyber-attack,
resulting in the loss of phonelines and computers, with many hospitals going "dark" and some diverting
all but emergency patients elsewhere. At some hospitals patients are being told not to come to A&E
with all non-urgent operations cancelled, the
BBC reports .
The UK National Health Service said: "We're aware that a number of trusts that have reported potential
issues to the CareCERT team. We believe it to be ransomware ." It added that trusts and hospitals
in London, Blackburn, Nottingham, Cumbria and Hertfordshire have been affected and are reporting
IT failures, in some cases meaning there is no way of operating phones or computers.
At Lister Hospital in Stevenage, the telephone and computer system has been fully disabled in
an attempt to fend off the attack .
NHS England says it is aware of the issue and is looking into it.
UK Prime Minister Theresa May confirms today's massive cyber hit on NHS is part of wider international
attack and there is no evidence patient data has been compromised.
Hospitals say backlog will go on for some weeks after today's cyber attack
- Sky News Tonight (@SkyNewsTonight)
May 12, 2017
The situation has got significantly worse as
The BBC reports the ransomware
attack has gone global.
Screenshots of a well known program that locks computers and demands a payment in Bitcoin have
been shared online by parties claiming to be affected.
May 12, 2017 2:19 PM
May 12, 2017 2:22 PM
The FBI has the solution and comes to the rescue .
Hollywood Overwhelmed With Hack Attacks; FBI Advises 'Pay Ransom'...
May 12, 2017 4:52 PM
It's just a damn good thing the US spent all that time and money developing all that stuff.
Now that it's out, just pay the ransom to the Cyber-Barbary Pirates so that the government
can return to its main 1984 mass surveillance and control mission.
My son is an IT professional and has been inundated with new clients calling to rid their complex
systems of this plague.For his clients he has divised protection from it, but most of the calls
he gets are from large hospitals, corporations, etc. that have their own IT staff.
May 12, 2017 3:21 PM
He can fix
it and prevent/firewall it so it doesn't happen but some of the systems are so complex with so
many open ends, his bill is sometimes as much as the hackers are asking for. He told me that in
some cases he is tempted to tell them to just pay it, however, he said all of the payoffs have
to be made with bitcoin on the "dark-web" and since you are dealing with known criminals he has
heard that more than half the time they do not fix it.
He was in New Orleans about a month ago, Thursday through Sunday clearing up a large companies
servers and systems, worked 70 hours and billed them 24k plus expenses
First thing I suggest to do if this happens to you, is to shut down your computer, take out the
HD, and boot it into a Linux system, so at least you can make a copy in a asafe environment, before
things get worse.
The article was published at 12:16 EDT so the work probably was unleashed at least 24 hours before
The ransomware uses a vulnerability first revealed to the public as part of a leaked stash of
NSA-related documents in order to infect Windows PCs and encrypt their contents, before demanding
payments of hundreds of dollars for the key to decrypt files.
How does it spread?
Most ransomware is spread hidden within Word documents, PDFs and other files normally sent via
email, or through a secondary infection on computers already affected by viruses that offer a back
door for further attacks.
What is WanaCrypt0r 2.0?
There is a new version of WCry/WannaCry ransomware: "WanaCrypt0r 2.0".
Note: @Please_Read_Me@.txt @BleepinComputer
The malware that has affected Telefónica in Spain and the NHS in Britain is the same software:
a piece of ransomware first spotted in the wild
researchers MalwareHunterTeam , at 9:45am on 12 May.
Less than four hours later, the ransomware had infected NHS computers, albeit
originally only in Lancashire , and spread laterally throughout the NHS's internal network. It
is also being called Wanna Decryptor 2.0, WCry 2, WannaCry 2 and Wanna Decryptor 2.
How much are they asking for?
WanaCrypt0r 2.0 is asking for $300 worth of the cryptocurrency Bitcoin to unlock the contents
of the computers.
Myles Longfield (@myleslongfield)
Who are they?
Shocking that our @NHS is under attack
and being held to ransom.
The creators of this piece of ransomware are still unknown, but WanaCrypt0r 2.0 is their second
attempt at cyber-extortion. An earlier version, named WeCry, was
back in February this year : it asked users for 0.1 bitcoin (currently worth $177, but with a
fluctuating value) to unlock files and programs.
How is the NSA tied in to this attack?
Once one user has unwittingly installed this particular flavour of ransomware on their own PC,
it tries to spread to other computers in the same network. In order to do so, WanaCrypt0r uses a
known vulnerability in the Windows operating system, jumping between PC and PC. This weakness was
first revealed to the world as part of
a huge leak of NSA hacking tools and known weaknesses by an anonymous group calling itself "Shadow
Brokers" in April.
Was there any defence?
Yes. Shortly before the Shadow Brokers released their files, Microsoft issued a patch for affected
versions of Windows, ensuring that the vulnerability couldn't be used to spread malware between fully
updated versions of its operating system. But for many reasons, from lack of resources to a desire
to fully test new updates before pushing them out more widely, organisations are often slow to install
such security updates on a wide scale.
Who are the Shadow Brokers? Were they behind this attack?
In keeping with almost everything else in the world of cyberwarfare, attribution is tricky. But
it seems unlikely that the Shadow Brokers were directly involved in the ransomware strike: instead,
some opportunist developer seems to have spotted the utility of the information in the leaked files,
and updated their own software accordingly. As for the Shadow Brokers themselves, no-one really knows,
but fingers point towards Russian actors as likely culprits.
Will paying the ransom really unlock the files?
Sometimes paying the ransom will work, but sometimes it won't. For the
Cryptolocker ransomware that hit a few years ago, some users reported that they really did get
their data back after paying the ransom, which was typically around £300. But there's no guarantee
paying will work, because cybercriminals aren't exactly the most trustworthy group of people.
There are also a collection of viruses that go out of their way to look like ransomware such as
Cryptolocker, but which won't hand back the data if victims pay. Plus, there's the ethical issue:
paying the ransom funds more crime.
What else can I do?
Once ransomware has encrypted your files there's not a lot you can do. If you have a backup of
the files you should be able to restore them after cleaning the computer, but if not your files could
be gone for good.
Some badly designed ransomware, however, has been itself hacked by security researchers, allowing
recovery of data. But such situations are rare, and tend not to apply in the case of widescale professional
hits like the WanaCrypt0r attack.
How long will this attack last?
Ransomware often has a short shelf life. As anti-virus vendors cotton on to new versions of the
malware, they are able to prevent infections originating and spreading, leading to developers attempting
"Big Bang" introductions like the one currently underway.
Will they get away with it?
Bitcoin, the payment medium through which the hackers are demanding payment, is difficult to trace,
but not impossible, and the sheer scale of the attack means that law enforcement in multiple countries
will be looking to see if they can follow the money back to the culprits.
Why is the NHS being targeted?
The NHS does not seem to have been specifically targeted, but the service is not helped by its
reliance on old, unsupported software. Many NHS trusts still use Windows XP, a version of Microsoft's
operating system that has not received publicly available security updates for half a decade, and
even those which are running on newer operating systems are often sporadically maintained. For an
attack which relies on using a hole fixed less than three months ago, just a slight oversight can
Attacks on healthcare providers across the world are at an all-time high as they contain valuable
private information, including healthcare records.
Ransomware threat on the rise as 'almost 40% of businesses attacked'
If you like me have the problem, when you know that a file exists somewhere, but know neither the
location, nor the exact name of the file, that might be helpful for you and your team. If also allows
to compare directories for differences and two versions of the same file for differences, And since
number of files that I deal with increases exponentially this problem is getting worse and worse. In
this sense this tool help to remain sane and find some presentation, quote, config file, or whatever
file I need more quickly. It also can be useful for copying PowerPoint presentations to your Windows
"... Use "Everything" tool for much faster search on NTFS drives, also on network shares if possible ..."
"... Regular expressions supported in more types: Unicode UTF-8+UTF-16, Office XML ..."
"... Opens Quick View in separate Lister window, updates contents when going to other file ..."
Here is a list of the most important additions in version 9:
- View modes, can be switched manually via menu "Show", or automatically by rules
- Show icons on folder tabs depending on the displayed folder
- Vertical button bar (can be disabled via Configuration - Options - Layout)
- Rubber band selection mode when using left mouse button selection, disable via settings
- Show up to 3 external devices without drive letter (e.g. Android or Windows Phone) in Alt+F1/F2
drive dropdown list
- Background transfer manager (F5-F2): Show second progress bar with overall progress if available
- Themed text cursor, enable/disable in Configuration - Options - Colors
- Use system drive and folder icons (dynamically loaded) instead of internal
- Dimmed icons for hidden files/folders
- Show small green arrow as overlay icon when a folder is open, e.g. in tree or when opening
very large folder
- Click on tab header with "locked but directory changed allowed" returns to base directory
of that tab
- Better support for high resolution screens
- Set scaling of dialog boxes (OverrideDPI) via main settings - fonts
- Option to show sizes with 1k=1000bytes instead of 1k=1024bytes
- Option to show numbers in TBytes, with 1 or 2 decimal digits
- Unicode support for descript.ion files
- Inplace rename: Use up/down arrow to jump to previous/next file (configurable)
- F5 Copy/F6 Move: Show combobox with all open tabs and all subdirectories in the target panel
(Shift: Source panel)
- F5 copy: Skip empty dirs by appending |**\ to line "only files of this type"
- Create and verify additional checksum types: SHA224, SHA384, SHA3_224, SHA3_256, SHA3_384,
- Delete files directly (not to recycle bin): In case of errors, ask at the end of the
- Delete files directly: Also offer "Skip all" when a file is missing
- Re-use threads for delete, loading hints and ID-lists
- Disable overwrite confirmation in sync: wincmd.ini [Confirmation] SyncConfirmOverwrite=0
- Support TLS 1.1 and 1.2 with new openssl dlls
- Use Windows certificate stores "ROOT" and "CA" to verify purchased server certificates
- ZIP unpacker: Support new compression method XZ (method 95) with updated tcmdlzma.dll and
- Support invalid ZIP archives with no CRC in the local header and behind the zip file, e.g.
created by owncloud
- Support invalid ZIP archives with UTF-8-encoded names but missing UTF-8 flag (created by Dropbox)
- Use "Everything" tool for much faster search on NTFS drives, also on network shares if
- Search with content plugins for text on main search page
- Regular expressions supported in more types: Unicode UTF-8+UTF-16, Office XML
- New option "Older than" working just like "Not older than"
- Standalone search: Allow to search in search results (after feed to listbox) and selected
Compare by content:
- Show only differences, with additional lines above/below the differences, including
- Edit mode: triple click now selects entire line
- New buttons to insert other fields
- Improved range selection dialog
- If there are duplicate names, or names that already exist, offer to auto-rename to "name (2).ext",
"name (3).ext" etc.
- Ctrl+Shift+Q: Opens Quick View in separate Lister window, updates contents when going
to other file
- View files of type RTF, BMP, JPG, PNG, GIF, ICO, HTML with internal viewers also in read-protected
folders (via DuplicateHandle)
- Use larger buffer sizes to handle longer blocks of text without line breaks
- Double click/ENTER: Follow .url files pointing to directrories within Total Commander. Disable
- Manual update check via menu Help - Check for updates now, using DNS lookup
- Automatic update check (experimental): wincmd.ini [Configuration] AutoUpdateCheck= (1: all
updates, or 2: no beta versions)
- Ctrl+B in search result = Go to directory of file under cursor
- Read virtual folders like the Network Neighborhood asynchronously (faster initial response)
and in a background thread
- Directory history: Remember name under cursor and position in list when entering a subdir
via double click/Enter
- Content plugins: new content field chooser dialog instead of menu. Also show field preview
for file/dir under cursor
- Synchronize dirs: Compare with multi-part ZIP, supports compare by content and view
- Buttonbar, Startmenü: New Parameter %C1..%C9, %c1..%c9
- to focus specific panels, including tree: cm_FocusSrc, cm_FocusTrg, cm_FocusLeftTree etc.
- to select/unselect one or more files: cm_Select, cm_Unselect, cm_Reverse
- to open lister: cm_ListOnly, cm_ListMulti, cm_ListInternalMulti, cm_SeparateQuickView, cm_SeparateQuickInternalOnly
- to save tabs to a specified file: SAVETABS, SAVETABSL, SAVETABSR, SAVETABS2, SAVETABS2L, SAVETABS2R
- cm_wait, accepting wait time in milliseconds, e.g. cm_wait 1000. Can be combined, e.g. em_cmd1,cm_wait
A list of all corrections, also for previous versions, can be found
in the history file .
As usual, the update is free for all registered users.
Ghacks discovered four recent KB updates for Windows 7 and 8, all designed to send Microsoft
regular reports on your machine's activities.
- KB3068708 – "This update introduces
the Diagnostics and Telemetry tracking service to existing devices. By applying this service,
you can add benefits from the latest version of Windows to systems that have not yet upgraded.
The update also supports applications that are subscribed to Visual Studio Application Insights."
This update replaced KB3022345.
- KB3075249 – "This update adds
telemetry points to the User Account Control (UAC) feature to collect information on elevations
that come from low integrity levels."
- KB3080149 – "This package updates
the Diagnostics and Telemetry tracking service to existing devices. This service provides benefits
from the latest version of Windows to systems that have not yet upgraded. The update also supports
applications that are subscribed to Visual Studio Application Insights."
The latter two updates are flagged as Optional, but KB3068708 holds Recommended status, which
means it would be downloaded and installed if you have Windows Updates set to automatic. It's only
functional in PCs that participate in Microsoft's
Customer Experience Improvement
Program, which already sends Microsoft information on how you use your computer.
Opting out of the CEIP isn't a single straightforward flip to switch. You have to disable it in
all the software you've agreed to use it with. From Microsoft's CEIP website:
"Most programs make CEIP options available from the Help menu, although for some products,
you might need to check settings, options, or preferences menus. Some pre-release products that
are under development might require participation in CEIP to help ensure the final release of
the product improves frequently used features and solves common problems that exist in the pre-release
If you use Office's default settings, it signs you up for Microsoft's CEIP.
How-to Geek has a tutorial explaining how to disable it, though if sending information to Microsoft
before didn't bother you, this new update probably won't either.
Disabling the tracking tools in the Recommended KB3068708 update isn't simple, either. It connects
to vortex-win.data.microsoft.com and settings-win.data.microsoft.com, which are hard-coded to bypass
the Windows HOSTS file. In other words, it's tricky to block unless you have a firewall that can
block HTTPS connections as well as be configured manually,
ExtremeTech explains. There are options in GPEdit.msc that allow you to disable application telemetry
and CEIP participation, but it's unknown if they behave correctly after the new patches are installed.
... ... ...
181 Posted by EditorDavid on Sunday December 04, 2016 @07:09PM from the peeking-through-Windows
dept. jader3rd shares an article from
PC World arguing that Windows 10's data collection "trades your privacy for Microsoft's security."
usage data lets Microsoft beef up threat protection , says Rob Lefferts, Microsoft's director
of program management for Windows Enterprise and Security. The information collected is used to improve
various components in Windows Defender... For example, Windows Defender Application Guard for Microsoft
Edge will put the Edge browser into a lightweight virtual machine to make it harder to break out
of the browser and attack the operating system. With telemetry, Microsoft can see when infections
get past Application Guard defenses and improve the security controls to reduce recurrences.
Microsoft also pulls signals from other areas of the Windows ecosystem, such as Active Directory,
with information from the Windows 10 device to look for patterns that can indicate a problem like
ransomware infections and other attacks. To detect those patterns, Microsoft needs access to technical
data, such as what processes are consuming system resources, hardware diagnostics, and file-level
information like which applications had which files open, Lefferts says. Taken together, the hardware
information, application details, and device driver data can be used to identify parts of the operating
system are exposed and should be isolated into virtual containers.
The article points out that unlike home users, enterprise users of Windows 10 can select a lower
level of data-sharing, but argues that enterprises "need to think twice before turning off Windows
telemetry to increase corporate privacy" because Windows Update won't work without information about
whether previous updates succeeded or failed.
Posted by EditorDavid on Sunday December 04, 2016 @03:39PM from the winning-against-Windows dept.
In June a California woman
successfully sued Microsoft for $10,000 over forced Windows 10 upgrades, and she's now written
a 58-page ebook about her battle (which she's
selling for $9.99 ). But an anonymous Slashdot reader shares another inspiring story about a
Texas IT worker and Linux geek who got Microsoft to pay him $650 for all the time that he lost.
"Worley built a Windows 7 machine for his grandfather, who has Alzheimer's Disease, [customized]
to look like Windows XP, an operating system his grandfather still remembered well..." writes Digital
Trends. "But thanks to Microsoft's persistent Windows 10 upgrade program, Worley's grandfather unknowingly
initiated the Win 10 upgrade by clicking the 'X' to close an upgrade window." After Worley filed
a legal "Notice of Dispute,"
Microsoft quickly agreed to his demand for $650 , which he donated to a non-profit focusing on
But according to the article, that's just the beginning, since Worley now "hopes people impacted
by the forced Windows 10 upgrade will write a complaint to Microsoft demanding a settlement for their
wasted time and money in repairing the device," and on his web page suggests that if people don't
need the money, they should
give it to charities fighting Alzheimer's . "If Microsoft isn't going to wake up and realize
that lobbing intentionally-tricky updates at people who don't need and can't use them actively damages
not only the lives of the Alzheimer's sufferer, but those of their whole family, then let's
cure the disease on Microsoft's dime so their tactics
and those of companies that will follow their reckless example aren't as damaging."
Worley suggests each
Notice of Dispute should demand at least $50 per hour from Microsoft, adding "If recent history
holds steady they might just write you a check!"
129 Posted by msmash on Thursday December 08, 2016 @01:50PM from the security-woes dept.
Microsoft's Windows PowerShell configuration management framework continues to be abused by cyber
attackers, according to researchers at Symantec, who have seen a surge in associated threats. From
a report on ComputerWeekly: More than 95% of PowerShell scripts analysed by Symantec researchers
have been found to be malicious , with 111 threat families using PowerShell. Malicious PowerShell
scripts are on the rise, as attackers are using the framework's flexibility to download their payloads,
traverse through a compromised network and carry out reconnaissance, according to Candid Wueest,
threat researcher at Symantec.
256 Posted by msmash on Wednesday December 14, 2016 @12:25PM from the windows-updates dept.
Microsoft has quietly fixed a software update it released last week, which effectively prevented
Windows 10 users from connecting to the Internet or joining a local network. From a report on ArsTechnica:
It's unclear exactly which automatic update caused the problem or exactly when it was released
-- current (unconfirmed) signs point to KB3201845 released on December 9 -- but whatever it was appeared
break DHCP (Dynamic Host Configuration Protocol), preventing Windows 10 from automatically acquiring
an IP address from the network . There's also little detail on how many people were affected
or why, but multiple cases have been confirmed across Europe by many ISPs. A Microsoft spokesperson
has meanwhile confirmed that "some customers" had been experiencing "difficulties" getting online,
but that's about it for public statements at present. However, a moderator on the company's forums
has said the fix was included in a patch released on Tuesday called KB3206632.
248 Posted by msmash on Friday December 23, 2016 @10:20AM from the aggressive-updates dept.
It's no secret that Microsoft has been aggressively pushing Windows 10 to users. Over the past year
and a half, we have seen users complain about Windows 10 automatically getting downloaded to their
computer, and in some cases, getting installed on its own as well. The automatic download irked many
users who were on limited or slow data plans, or didn't want to spend gigabytes of data on Windows
10. A company executive has admitted for the first time that they may have went overboard with Windows
10 updates. From a report on Softpedia: Chris Capossela, Chief Marketing Officer at Microsoft,
said in the latest edition of the Windows Weekly that this was the moment when the company indeed
went too far, pointing out that the two weeks between the moment when users started complaining about
the unexpected behavior and the one when
a patch was released were "very painful." "We know we want people to be running Windows 10 from
a security perspective, but finding the right balance where you're not stepping over the line of
being too aggressive is something we tried and for a lot of the year I think we got it right, but
there was one particular moment in particular where, you know, the red X in the dialog box which
typically means you cancel didn't mean cancel," he said. "And within a couple of hours of that hitting
the world, with the listening systems we have we knew that we had gone too far and then, of course,
it takes some time to roll out the update that changes that behavior. And those two weeks were pretty
painful and clearly a lowlight for us. We learned a lot from it obviously."
That's pretty disingenuous approach that means that Windows 10 is a malware.
Shame on Microsoft leadership. This dirty trick with assuming that closing dialof
means saying yes to upgrade is actually a typical malware authors approach. Like
one commenter said "Total asshattery. "We decided to screw you over and we meant
"... Redmond recently created a new Windows 10 nagware reminder that presented a dialog asking you to install the OS. But if users clicked the red "X" to close the dialog - standard behaviour for dispelling a dialog without agreeing to do anything - Microsoft took that as permission for the upgrade. ..."
"... The Close button on the title bar should have the same effect as the Cancel or Close button within the dialog box. Never give it the same effect as OK. ..."
Microsoft is hurt and disappointed that people would think it was trying
to "trick" them with a confusing Windows 10 upgrade dialog that scheduled an
upgrade without users explicitly agreeing to do so.
Redmond recently created a new Windows 10 nagware reminder that presented
a dialog asking you to install the OS. But if users clicked the red "X" to close
the dialog - standard behaviour for dispelling a dialog without agreeing to
do anything - Microsoft took that as permission for the upgrade.
Redmond (via its flacks) has e-mailed The Register – and, we presume,
World+Dog – to say that the UI had worked like that for ages: "the UI of our
'your upgrade is scheduled' notification is nothing new (including the
ability to just 'X-out' of the notification with no further action needed to
schedule your upgrade) – it's been part of the notification UI for months" (their
emphasis, not ours).
Base article, Microsoft notes that "Based on customer feedback, in the most
recent version of the Get Windows 10 (GWX) app, we confirm the time of your
scheduled upgrade and provide you an additional opportunity for cancelling or
rescheduling the upgrade."
+Comment: You'll have noticed that Microsoft didn't say it would re-write
the app so that closing the app is taken as a "no", as happens for just about
every other dialog Windows offers.
Or is Redmond saying users who didn't like the UI sleight-of-hand are at
fault for delving into its Knowledge Base every time they find a dialog confusing?
We'd expect commenters to have an opinion on this …
My opinion on this?
Re: My opinion on this?
Ralph, you post doesn't do the link justice.
You should clarify that the link is to a remarkably helpful tool that
will stop the nagware, prevent inadvertent deployment of Windows 10 by desktop
users, recover lost disk space and hopefully prevent mobile users busting
their data limits downloading a large Windows 10 installer.
It has a helpful command line interface for use in enterprise environments
which is vital for smooth and effective deployment.
It will also clear up gigabytes of disk space lost when GWX installs,
some people have claimed it's freed up over 10GB!
PS. I have no connection with the author.
PPS. User beware - take the usual precautions before deploying any application...test
Re: My opinion on this?
OK, so I've run the software and restarted, and the nagware is gone from
my system tray but the Windows 10 update is still in the Control Panel Windows
Update and still a default selection. Was I just expecting too much?
Re: My opinion on this?
> Was I just expecting too much?
Never10 doesn't/can't stop the Windows Update from downloading the Control
Panel Windows Update. It just stops the update from being used - via Microsoft's
official group policy settings.
Re: My opinion on this?
Hmm, this is nothing more than a tool to automate the creation/destruction
of 2 registry keys.
Surrounded (as typical for GRC) with a great deal of fanfare, like its
some major achievement.
He moans about the file size being 56k, well, here you go, in 244 bytes.
Windows Registry Editor Version 5.00
Because all the program does is create or delete those 2 keys.
That's it.. And this is new information how exactly?
Re: My opinion on this?
Awwww Microsofts feelings are hurt.... I DOUBT IT!!!
It doesn't take a genius or even someone with a degrees in social behavior
or even Engineering to point out how right out horrible an idea this is
to FORCE people to download Windows 10, this is NOTHING to do with if its
a good program or not, it has all to do with people and their right to choose
as well as the damage this has done by ignorantly having the program install
without even the knowledge of the owner of the computer even being aware
of it if they happen to not be around the computer at the time it installs.
The damage it has done to some computers, the loss of personal information
and money its caused not to mention how it interrupted people at work for
a long period of time and more not even mentioning the stress shows how
this is by no means something "good" Microsoft was doing for their customers,
it was them forcing their will on people as they saw fit, something that
is as close to digital rape as one can get in my opinion and to add to the
insult they act like they know better then we do, for months they asked
people if they want to upgrade to windows 10, harassing them with this like
its an ad and people were fully aware of the choice to upgrade or not and
so at this point the people who didn't were all saying NO!!! So how is this
justified??? HOW!!! You have no way to opt out unless you turn off the updates
MAYBE and/or go to some other outside application like i did to stop it
from being forced on my system!!
So Microsoft is "hurt" BULL, its a simple case of them not caring and
forcing others but in this case its caused damage and in my opinion, they
are liable, class action sounds good about now!
Also, i hear a lot of good things about Apple!
Re: My opinion on this?
Awwww Microsofts feelings are hurt.... I DOUBT IT!!!
Sure they are, just like the advertisers' feeling are hurt that we use
adblockers, or the malware writers' feelings are hurt because we won't respond
to their attempts, or Microsoft Techs' feelings are hurt because we won't
allow them to get rid of all the viruses on our computers.
Oh wait.. Hurt=Bottom Line... Tough.. hurt all you want, you bastards.
> Thus failing Microsofts own 'Windows Certification' then?
He's right, you know.
The Close button on the title bar should have the same effect as
the Cancel or Close button within the dialog box. Never give it the same
effect as OK.
Microsoft Marketing / Terry Myerson :
Nothing like Microsoft's own documentation to bring a Company down and
cause it to grovel out of a situation. (One rule for them, another rule
for the rest of us)
You'll be changing that Dialog Box pronto then, to avoid a Class Action
Lawsuit? Thought so.
Great find (The Windows Certification Documentation)...Thank you.
For all the folk with limited eyesight, dexterity problems, or other
disabilities that have put up with the MS shit for months now. Shame on
you Microsoft, we have laws against this type of inequality.
"... Never10 does NOT prevent the installation of Windows updates, including
the infamous Get Windows 10 (GWX) update KB3035583. Never10 simply employs Microsoft's
documented and sanctioned configuration settings to instruct it NOT to change the
installed version of Windows. ..."
"... Never 10 is an easy to use utility which gives users control over whether
their Windows 7 or 8.1 will upgrade itself to Windows 10. ..."
"... Since this utility simply updates and/or configures the system to prevent
or allow, OS upgrading, it may be deleted after it has configured the system appropriately.
"... When Never10 enables automatic OS upgrading, ..."
"... To verify the current state of a system's OS Upgrade status, ..."
"... If the hidden $WINDOWS.~BT subdirectory exists, ..."
"... The GWX Control Panel ..."
"... contained built-in provisions for disabling OS upgrades ..."
Never10 does NOT prevent the installation of Windows updates, including
the infamous Get Windows 10 (GWX) update KB3035583. Never10 simply
employs Microsoft's documented and sanctioned configuration settings to
instruct it NOT to change the installed version of Windows.
Easily Control Automatic and Unwanted
Windows 7 & 8.1 Upgrading to Windows 10
Never 10 is an easy to use utility which gives users control over
whether their Windows 7 or 8.1 will upgrade itself to Windows 10.
The name "Never 10" is a bit of an overstatement, since this utility
may also be used to easily re-enable Windows operating system automatic
upgrading. But the primary reason for using this is to disable Windows'
pestering insistence upon upgrading Windows 7 or 8.1 to Windows 10.
Many users of Windows 7 and 8.1 are happy with their current version
of Windows, and have no wish to upgrade to Windows 10. There are many reasons
for this, but among them is the fact that Windows 10 has become controversial
due to Microsoft's evolution of their Windows operating system platform
into a service which, among other things, aggressively monitors and reports
on its users activities. This alone makes many users uncomfortable enough
to cause them to choose to wait. In line with this, a few months into 2016,
Windows 10 started displaying unsolicited advertisements on its users' desktops.
Others dislike the changes Microsoft made by merging their failed "tiled"
smartphone user-interface into the Windows UI. And, finally, some object
to being force-fed whatever Microsoft wants and simply wish to choose for
In July of 2015, responding to the significant user backlash, Microsoft
added features to its Windows Update facility which allow it to be configured,
on a machine-by-machine basis, to not forcibly upgrade qualifying
Windows 7 and 8.1 operating systems to Windows 10. However, Microsoft did
not make this configuration simple. It requires the use of the group policy
editor (which is not present in some qualifying systems) and/or the system
registry. In other words, they created some deep internal configuration
options but chose not to provide a simple user-interface to give their users
the choice. "Never10" provides that choice.
The elegance of this "Never 10" utility, is that it does not
install ANY software of its own . It simply and quickly
performs the required system editing for its user.
Since this utility simply updates and/or configures the system
to prevent or allow,
- If the system being configured has a version of Windows Update which
is older than the required July 2015 release-which would mean that the
"upgrade disable" options are not yet present-this utility will notify
its user (see the sample display screens above) and offer to download
and install the required update to Windows Update so that Windows can
then be configured not to upgrade itself to Windows 10.
- If Microsoft's GWX (Get Windows 10) had already secretly and silently
downloaded the Windows 10 files into a hidden directory (this can be
squatting on more than 6.5 gigabytes of your hard drive space), Never10
will show the exact count and amount of files and allow its user to
remove them with one click.
OS upgrading, it may be deleted after it has configured the system appropriately.
Using this utility, inexperienced users will be able to easily use Never10
themselves, while advanced users will likely appreciate that fact that no
additional software is installed and will be able to refer friends and family,
whom they support, to this easy-to-use utility.
Never10 v1.3 adds quiet command-line options for enterprise users. See
the Command line options page for usage details.
Version 1.3 of Never10 adds much-requested command-line switches to perform
and further automate all Never10 operations. Never10 now offers the following
- delete ‑ deletes any and all pre-downloaded Windows 10 files.
If no Windows 10 files are present, the command's presence is registered
for user-interface suppression, but the command has no other effect.
- disable ‑ disables the GWX subsystem to prevent all user
prompting and pre-downloading of Windows 10. If both 'disable' and 'enable'
are specified (though that makes no sense) this disable command takes
precedence and all future Windows Update OS upgrading behavior will
- enable ‑ re-enables the GWX subsystem to allow Windows Update-driven
OS upgrading. This restores the system to its default condition with
GWX (Get Windows 10) OS upgrading enabled.
- showui ‑ for the purpose of testing and verifying the operation
of these command-line switches, this 'showui' option causes the standard
Never10 user interface to be displayed after all command-line operations
have been completed. The default behavior, if any of the other commands
are present, is for no user-interface presentation and completely silent
- update ‑ If a Windows 7 or 8.1 system has an out-of-date
version of Windows Update, this command instructs Never10 to obtain
and silently install a more recent version of Windows Update. If the
system already has a newer version no action is taken.
Typical command line: never10.exe update delete disable
Note that the presence of the command verbs triggers the program's actions.
There is no need for additional "escape" prefixes such as '-' or '/' though
they may be added if desired.
What it does
The first thing Never10 does upon starting is verify that it's running
on a non-Enterprise edition of either Windows 7, 8, or 8.1. Those are the
only versions of Windows that qualify for automatic upgrading through the
Windows Update facility.
If the edition and version of Windows qualifies, it then checks the file
version of the Windows Update AutoUpdate Client wuauclt.exe located
in the Windows system directory. For Windows 7, the wuauclt.exe version
is compared against [7.6.7601.18971]. For Windows 8.x, the wuauclt.exe version
is compared against [7.9.9600.17930]. In either case, those are the versions
of the respective July 2015 updates to Windows Update which added the ability
to disable the GWX (Get Windows 10) group policy and registry settings.
If the currently installed version of Windows update has a lower version,
Never10 notifies its user that Windows Update must be updated to be able
to disable automatic OS upgrading. When the user understands and instructs
Never10 to update Windows Update, it chooses among one of four files for
Windows 7 or 8 and 32 or 64 bits, downloads the proper file from Microsoft's
Windows Update server, and runs the standalone installer to update Windows
Update. This never seems to require a reboot.
Never10 manipulates the values and security permission settings of the following
two registry keys:
When Never10 disables automatic OS upgrading, the following actions
Under this key, the 32-bit DWORD value "DisableGwx" is set to 1 or completely
These will be referred to as the "Gwx" key and the "DisableGwx" value.
This key and value control the display of the "Get Windows 10" offer
icon in the system tray. When DisableGwx is set to 1, the upgrade offer
icon is suppressed.
Under this key, the 32-bit DWORD value "DisableOSUpgrade" is set to
1 or completely deleted.
These will be referred to as the "WindowsUpdate" key and the "DisableOSUpgrade"
value. This key and value control the downloading and installation of
any upgrades to Windows. When DisableOSUpgrade is set to 1, any previously
downloaded Windows 10 files are deleted and Windows will never attempt
to upgrade the current operating system.
When Never10 enables automatic OS upgrading, the following
actions are taken:
- Under the Gwx key, which will be created if it doesn't yet exist,
the 32-bit DWORD value "DisableGwx" is created and set to 1.
- Under the WindowsUpdate key, the 32-bit DWORD value "DisableOSUpgrade"
is created and set to 1.
- Under the Gwx key, the 32-bit DWORD value "DisableGwx" is deleted.
- Under the WindowsUpdate key, the 32-bit DWORD value "DisableOSUpgrade"
To verify the current state of a system's OS Upgrade status,
Never10 verifies that both keys have their respective disabling values set
to 1. If either value is missing or not set to 1, Never10 will report that
OS updating is disabled.
If the hidden $WINDOWS.~BT subdirectory exists, Never10 recursively
explores the entire Windows 10 pre-download file set counting items and
summing the number of bytes consumed. The user interface will show the total
size of storage being consumed and provide a one-button file deletion option.
. . . and why
The GWX Control Panel (an early popular solution at 2.4 megabytes)
was a useful first step. But it was wrong in too many ways. Its design and
operation seemed ill suited to the simple task of preventing upgrades to
Windows 10. It was confusing and offered an array of actions, options and
status reports, when all anyone really wanted was simply for Windows to
not upgrade itself and to leave us alone. Instead, the GWX Control Panel
makes itself the center of attention. It needs to be "installed", is resident
and persistent afterward, and it pops up all the time to tell us what a
great job it's doing... which is exactly the kind of nonsense most people
are fed up with in this era where "your attention" is what commercial interests
all want to obtain more of. But more than anything, none of that was necessary
. . .
Microsoft's Knowledgebase article 3080351 titled "How to manage Windows
10 notification and upgrade options" revealed that an available July 2015
update to Windows Update contained built-in provisions for disabling
OS upgrades . This made it immediately clear that was the right
way to solve this problem. So back on January 13th, 2016, I created a "bitly"
shortcut to that Microsoft knowledgebase page (
) which explained how to do this, and began promoting that "correct,"
minimal and sufficient way to disable Windows OS upgrading on my weekly
Security Now! podcast.
The trouble was, Microsoft did not make this easy. In fact, it was down
right user-hostile. It required using the Windows Group Policy editor, which
is not even present on lower-end Windows editions which were eligible for
OS upgrading. Or it required manually creating keys and values in the Windows
registry, which is fraught with danger if the wrong button is pressed.
For several months I resisted the temptation to steal time from other
projects to fix this. But the GWX Control Panel was so annoying that I finally
removed it from the one Win7 machine it was "protecting." And the final
straw occurred when two non-computer-savvy friends were "upgraded" from
Windows 7 against their wishes and became a bit hysterical over what had
happened to the computer they had finally learned to use.
So, Never10 was born.
In testing the effects of using Microsoft's own documented "switch settings,"
I was very impressed to discover that setting them to "disabled" would even
cause the GWX subsystem to delete the 6 gigabytes of Windows 10 upgrade
files it might have already pre-downloaded. This means that although Never10
does not explicitly remove that massive, sometimes-downloaded blob, it will
cause the same agent that downloaded it to delete it, which is perfect.
There have been unsubstantiated and imprecise rumors of Windows upgrading
even if users were using something to inhibit or prohibit that from happening.
Some claimed that Microsoft was re-enabling something that was disabled.
But we've never had any details. While it's certainly possible, my guess
is that people were manually avoiding and "hiding" the evil
3035583 update titled: "Update installs Get Windows 10 app in Windows
8.1 and Windows 7 SP1". The trouble is that "hiding" Windows updates is
very soft protection. The Windows Update hiding system does not work reliably.
Things that Microsoft wants you to have tend to reappear unbidden and they
are very easy to miss.
This is why, unlike the GWX Control Panel, Never10 makes no attempt to
prevent the GWX technologies from entering the user's system, nor of removing
them if they are present. That's an uphill battle which requires vigilance
and constant monitoring, and it's unnecessary. The GWX components occupy
less than 32 megabytes in the /Windows/System32/GWX directory. You can go
visit them if you're curious. So long as the proper registry settings are
in place to hold them at bay and keep them disabled, they will cause no
trouble and they occupy almost no storage space.
So, yes. Never10 is relying upon Microsoft to obey their own provided
settings, which they created a special update to Windows Update to provide.
And they buried those settings where no "regular user" would ever find them.
Corporations the world over are relying upon those settings to prevent unwanted
upgrading of their existing systems. There is just no chance that Microsoft
would ever choose to deliberately bypass the express desire of their users
by ignoring their own registry settings. It's not impossible, but it'll
What about Group Policy? The "How to manage Windows 10 notification
and upgrade options" knowledgebase 3080351
page mentions that Windows OS upgrading can also be applied through
Windows group policy settings. I have verified that enabling the setting
to disable Windows OS upgrading through the group policy editor simply sets
the DisableOSUpgrade value of the WindowsUpdate key. So group policy is
merely another way of achieving the same thing that Never10 does, though
through the enforcement of group policy.
Never10 Version History
- v1.0 ‑ Initial release. Was not change-protecting the registry
keys and the executable was signed with GRC's nearly three year old
SHA1 code-signing certificate. Version number does not appear on the
- v1.1 ‑ Added read-only protection to the registry keys. Added
a version number to the app's user-interface. We received some authoritative
reports of some systems balking at our SHA1 Authenticode signature,
so we obtained a new SHA256 code signing certificate from DigiCert.
- v1.2 ‑ (2016/03/30) Removed the read-only registry key protection
added in version 1.1.
Never10 appeared not to work for one person. I quickly prepared a version
without the read-only enforcement and asked him to use it instead. He
reported that it then worked. I may have overreacted, and probably did,
his system may have been weird or in some odd state since many others
have carefully tested Never10's operation and have never reported any
such behavior. But since it is certainly conceivable that Windows might
take offense to having the permissions removed from those keys, and
since, for example, the Group Policy editor doesn't do that, I felt
that "better safe than sorry" would be the best policy. And, frankly,
the write-protection was almost certainly unnecessary anyway.
- v1.3 ‑ (2016/04/08) Added simple one-click enumeration and
deletion of any previously downloaded Windows 10 files. The option will
be presented to the user when it is available. Added multiple command-line
verbs which suppress the presentation of Never10's GUI user-interface
to support enterprise-wide deployment of Windows 10 disabling.
- v1.3.1 ‑ (2016/04/17) Fixes a defect in the v1.3 command-line
parser: The command-line argument scanner was not ignoring (as it should)
the contents of the program's path. So v1.3 might register path text
A final note: I'm a bit annoyed that "Never10" is as large as it is at
85 kbyte. The digital signature increases the application's size by 4k,
but the high-resolution and high-color icons Microsoft now requires takes
up 56k! So without all that annoying overhead, the app would be a respectable
25k. <g> And, yes, of course I wrote it in assembly language.
The question we are most asked is how to switch over to using Never10
from the GWX Control Panel. The best answer is to simply uninstall the GWX
Control Panel from the system and then run Never10 once to set the OS upgrade
system to DISABLED. Then you can leave the 81k app around, or delete it
and grab it later if you ever change your mind.
"... This Knowledge Base article explains that the only way to cancel the upgrade is to click on the "change upgrade schedule" link. ..."
"... Somehow, the article fails to explain why closing the dialogue (clicking the invitingly red "x" at the top right) doesn't do what the user expects, but rather, it schedules the upgrade. ..."
Microsoft is on everyone's hate-list again, because closing the Windows 10 upgrade dialogue
without explicitly cancelling an installation leaves the upgrade on the schedule.
This Knowledge Base
article explains that the only way to cancel the upgrade is to click on the "change upgrade
"If you click on OK or on the red 'X', you're all set for the upgrade and there is nothing
further to do", Redmond explains.
Somehow, the article fails to explain why closing the dialogue (clicking the invitingly red
"x" at the top right) doesn't do what the user expects, but rather, it schedules the upgrade.
That little bit of sneakiness will get it more downloads of Windows 10, but probably at the cost
of yet more criticism. ®
May 18, 2016 |
Microsoft is finally making it easier to reinstall
from scratch with a new Service Pack (SP) that the company refuses to call a service pack.
Windows 7 may not be available to most of us anymore, but there are many reasons to reinstall
the operating system on existing Windows 7 PCs, and Microsoft never released a Service Pack after
Windows 7 Service Pack 1's release in early 2011. Because of that, updating a Windows 7 PC in
recent times required countless "download update-install-reboot-repeat" cycles to fully patch the
system, installing five full years of updates piece by piece.
It was painful.
That problem is now history, however. Microsoft recently announced the availability of the
Windows 7 SP1 convenience roll-up. That sounds more like something you'd buy from a confectioner
than put on your PC, but it's essentially SP2 for Windows 7. The rollup includes all the "security
and non-security fixes" since the release of Windows Service Pack 1.
The impact on you at home:Thankfully, the endless update cycle for Windows 7
is over now...as long as you know about the roll-up, that is. Microsoft won't offer the roll-up via
Windows Update-I guess that would be too convenient. Instead, you have to
the roll-up directly from Microsoft's Update Catalog (Internet Explorer only please). In other
words, if you don't know about the convenience roll-up you're still in for a world of tedious updates.
Monthly rollups for everyone
Adding more roll-up fun for the future, Microsoft plans to create monthly roll-ups of non-security
fixes for Windows 7 and Windows 8.1 from now on. The new monthly roll-ups will be available
via Windows Update.
But Microsoft didn't stop tinkering with the update process there. The company has also decided
to stop making Windows updates available through the Microsoft Download Center-an online repository
that offers direct downloads of single updates.
Instead, anyone looking to avoid Windows Update will have to head to the Microsoft Update Catalog
(MUC)-the same site where the new Windows 7 roll-up is available. Right now the MUC only works with
Internet Explorer since it requires ActiveX. Microsoft plans to support other browsers with non-ActiveX
functionality later this summer.
Of cause this is criminal behaviour on the part of Microsoft. It is called deception. Even if upgrade
started you can reverse if by not agreeing on license for windows 10. In this case Windows 10 installer
will restore windows 7 back.
On Monday, hordes of angry Windows users pelted Microsoft with complaints about being
lured into upgrading their PCs over the weekend. For months, Microsoft has been urging users
running Windows 7 and Windows 8.1 to upgrade to Windows 10 before the free offer expires on July
29. But the series of dialog boxes and other messages that Microsoft has sent users have become increasingly
deceptive, burying the opt-out links amid text that appears to commit users to the upgrade.
Normally, closing the dialog box by clicking the red box in the upper righthand corner automatically
opted out. Over the weekend, clicking that red box started opting users in to the upgrade.
That not only flies in the face of years of user-interface design, it contradicts Microsoft's
own advice for dealing with suspicious dialog boxes. "Never click 'Agree' or 'OK' to close a
window that you suspect might be spyware," states Microsoft's
page on viruses and malware.
"Instead, click the red 'x' in the corner of the window or press Alt + F4 on your keyboard to close
The company was unable to explain how closing a dialog box translated into a consumer's desire
to upgrade to Windows 10. Microsoft representatives pointed out, however, that if you do mistakenly
trigger the upgrade, you should still have an opportunity to opt out before it begins.
Microsoft described the new procedure on an
updated support page,
which notes that users will be given "an additional opportunity for cancelling or rescheduling the
How it should work
According to Microsoft's support page, Windows 7 and Windows 8.1 users are still going to see
those annoying popup windows that urge you to upgrade to Windows 10, where the only opt-out option
is buried: "Click here to change upgrade schedule or cancel scheduled upgrade."
Microsoft really has pushed Windows 10 to the point where it's getting annoying - first
they automatically installed a service that ran all the time
to show the Get Windows 10 icon, and then they started
automatically downloading Windows 10 onto people's computers even when they didn't want it. Now
because of an "accident" they automatically triggered the installer on some people's computers.
Windows 10 upgrade installing automatically on some Windows 7, 8 systems
For the first year of its availability, Windows 10 is available for free to most Windows
7 and 8 users, and Microsoft has been trying to coax those users to make the switch by delivering
the operating system through Windows Update. Until now, the OS has been delivered as an optional
update; while Windows Update gives it prominent positioning, it shouldn't be installed automatically.
This system has already generated some complaints, as Windows Update will download the
sizeable operating system installer even if you don't intend to upgrade any time soon, but, over
the last couple of days, the situation seems to have become a little more aggressive. We've received
a number of reports that people's systems are not merely downloading the installer but actually
starting it up.
And from ZDNet:
Windows 10 upgrade nags become more aggressive, offer no opt-out
Reports are circulating that some users are being presented with dialog boxes that only
give them the option to start the upgrade process or reschedule it for a later date. Others are
finding that the Windows Update screen is only offering them the option to begin the upgrade process,
with other system updates being hidden from view.
We get it, Windows 10 is a free upgrade, and the security enhancements alone make it worthwhile
for most people. When it was first released,
everybody to hold off for a few months, which was good advice considering some of the problems
people had. But by this point it's getting a lot more stable, and their big service release update
is right around the corner. It's
probably worth doing the upgrade for the average person.
But there are a lot of people that are using software that just might not be compatible. Small
businesses might be running important applications and can't deal with the downtime of upgrading.
It's not right to automatically push down the entire operating system upgrade when nobody has asked
Seriously, do they need to push it quite this hard? When you make a good product, people will
want it, especially when it's free. Over 100 million people have upgraded already, after all. There's
no reason for them to try and shove it onto everybody's computer immediately.
On a completely unrelated has nothing to do with it note, some unconfirmed reports are saying
that the insider builds of Windows 10 now have "suggested apps" in the Start Menu. Which sound a
lot like ads for apps to us.
That's way too pushy... Since its release it looks more and more that Windows 10 is Microsoft's
Trojan horse to push windows users to "service model". Microsoft's attempts to crank up the pressure
to make the switch can backfire. The thing you need to understand with win10 will never run well on
older hardware and small laptops. First o all for many user it does not make any sense. Hardwarewise
you should have at least 4GB of memory, and a at lease dual core CPU with a decent clock speed as well
as more or less modern graphics chip. And even in this case Win 10 is not impressive.
"...The best question is not about how to get Windows 10 on your computer. But what will happen
to your computing experience after those "free upgrade". The problems with older software must be always
expected on all system upgrades - there is not anything special. ..."
"...But important thing is that Microsoft is going to Software as Service business model, they even
do not hide it. Apparently this will affect all new Microsoft software regardless of whether you like
it or not. ..."
"... I'm surprised I hadn't already seen people screaming about MS aggressively trying to trick
people into Windows 10 upgrades. Windows Update started adding Windows 10 as a pre-selected "optional
update" on my Windows 7 boxes more than a month ago. I always deselected it, so I don't know whether
I would have been given the option to abort the upgrade. I have since uninstalled the KB3035583 "Recommended"
update that gave us the irritating Win 10 tray icon and followed the rest of the howtogeek suggestions
on killing the process. That has, so far, stopped the nagging. I have successfully upgraded one of my
Win 7 machines to 10 with no problems, but the lack of Windows Media Center is a deal breaker for me
and I am happy enough with Windows 7 and 8 and underwhelmed by the new features in 10. ..."
"... Windows 10 will open us all to more surveillance, possibly break older applications forcing
us to buy upgrades which we cannot afford, take hours of time to install and configure, and based on
Microsoft's history, will come with thousands of bugs which will cut into our productivity in the coming
years. Microsoft hasn't given anyone a reason to go through all that other than that is what Microsoft
wants! They can't GIVE their product away any more! ..."
"... Ever since its release, I've always thought of Windows 10 as Microsoft's Trojan horse. Can't
help but think they have some kind of motive to get us to install it, whether it's spyware, backdoors,
decryption, NSA keys, etc. Add to that the fact that they make it inconvenient to opt out of automatic
updates. Maybe it's just me, but I'm always leary when a company like Microsoft gives away something
for free. ..."
"... I will remain with Windows 7 until such time as it is no longer supported by Microsoft.
After that, I will re-evaluate what I intend to do. If it weren't for my gaming and the expense of Mac
machines, I'd dump Microsoft. ..."
1. Windows 10 will automatically begin installing itself
From "early next year", Microsoft will change the status of the free Windows 10 upgrade so it is
classified as a Recommended Update.
Given that most home machines are set up to install Recommended Updates automatically, the change
to Windows 10's update status will lead to most Windows 7 and 8.1 machines beginning the upgrade.
However, Microsoft says that before Windows 10 is installed users will need to manually confirm
the installation, giving them a chance to pull out.
Business users should be able to prevent the upgrade from automatically starting using tools such
as Windows Server Update Services.
For those on metered connections, Terry Myerson, Microsoft's executive VP of the Windows and Devices
Group, said people "have the option of turning off automatic updates" before going on to say that
such a move is unwise because of "the constant risk of internet threats".
Those who don't like the new OS will have 31 days to roll back to their previous version of
Windows. To go back, select "Start Button->Settings->Update and Security->Recovery and Uninstall
Krotow, Nov 3, 2015
The best question is not about how to get Windows 10 on your computer. But what will happen
to your computing experience after those "free upgrade". The problems with older software must
be always expected on all system upgrades - there is not anything special.
But important thing is that Microsoft is going to Software as Service business model, they
even do not hide it. Apparently this will affect all new Microsoft software regardless of whether
you like it or not.
There been rumours about possibility to get partially disabled system in near future, because
Microsoft new business model will deny to get this or that for free.
For Windows 10 this is more than possible, because parts of it may be remotely disabled from
its creator. Of course, wise heads will found the ways to overcome this, but most of users will
pay a monthly/year fee or will stay with half-broken system.
rwjustus, Nov 3, 2015
My history only goes back to October 12th. I guess they are deleting older history.
Cumulative Update for Windows 10 for x64-based Systems (KB3105210)
Failed to Install on 11/1/2015
Failed to Install on 10/30/2015
Cumulative Update for Windows 10 for x64-based Systems (KB3097617)
Failed to Install on 10/29/2015
Failed to Install on 10/24/2015
Failed to Install on 10/23/2015
Failed to Install on 10/23/2015
Failed to Install on 10/21/2015
Failed to Install on 10/20/2015
Failed to Install on 10/19/2015
Failed to Install on 10/18/2015
Failed to Install on 10/17/2015
Failed to Install on 10/16/2015
Failed to Install on 10/16/2015
Failed to Install on 10/16/2015
Failed to Install on 10/15/2015
Failed to Install on 10/15/2015
Failed to Install on 10/14/2015
Cumulative Update for Windows 10 for x64-based Systems (KB3093266)
Failed to Install on 10/14/2015
Failed to Install on 10/13/2015
Failed to Install on 10/12/2015
UriF, Nov 4, 2015
If you have problems with Windows Update please try following steps (works with Win 8 & Win 8.1)
1. Open command prompt window as administrator
2. Run command sfc /scannow
3. Run commands
Dism /Online /Cleanup-Image /CheckHealth
Dism /Online /Cleanup-Image /ScanHealth
Dism /Online /Cleanup-Image /RestoreHealth
4. Run sfc /scannow again (to verify that are no more errors)
5. Run Windows Update troubleshooter
6. Restart computer
UriF, Nov 4, 2015
By the way if you want to risk and install Win 10 anyway please do not use Windows update because
you download the old version of installation package
Microsoft published media creation tool which be updated from time to time and fixed bugs. By
the way owner of site dellwindowsreinstallation guide recommend to postpone installation until
Microsoft would publish a Win 10 TH2 (expected this month). Of course I doubt that this latest
version of Win 10 could be downloaded using Windows Update
markdengler, Nov 2, 2015
I'm surprised I hadn't already seen people screaming about MS aggressively trying to trick
people into Windows 10 upgrades. Windows Update started adding Windows 10 as a pre-selected "optional
update" on my Windows 7 boxes more than a month ago. I always deselected it, so I don't know whether
I would have been given the option to abort the upgrade. I have since uninstalled the KB3035583
"Recommended" update that gave us the irritating Win 10 tray icon and followed the rest of the
howtogeek suggestions on killing the process. That has, so far, stopped the nagging. I have successfully
upgraded one of my Win 7 machines to 10 with no problems, but the lack of Windows Media Center
is a deal breaker for me and I am happy enough with Windows 7 and 8 and underwhelmed by the new
features in 10.
Gisabun, Nov 2, 2015
You don't want W10 installed? Turn it off.
Or other options if you take 2 minutes to google it...
Michael Rivero, Nov 2, 2015
Windows 10 will open us all to more surveillance, possibly break older applications forcing
us to buy upgrades which we cannot afford, take hours of time to install and configure, and based
on Microsoft's history, will come with thousands of bugs which will cut into our productivity
in the coming years. Microsoft hasn't given anyone a reason to go through all that other than
that is what Microsoft wants! They can't GIVE their product away any more!
nwalker11, Nov 2, 2015
Ever since its release, I've always thought of Windows 10 as Microsoft's Trojan horse. Can't
help but think they have some kind of motive to get us to install it, whether it's spyware, backdoors,
decryption, NSA keys, etc. Add to that the fact that they make it inconvenient to opt out of automatic
updates. Maybe it's just me, but I'm always leary when a company like Microsoft gives away something
Gisabun, Nov 2, 2015
@DAS01 ...There are multiple ways to disable W10 upgrading. See
eaglewolf, Nov 2, 2015
I'm sorry, Microsoft, but you DO NOT have *any* right to demand/force that I install anything
.. on MY computer. That is my determination and mine alone.
You are so desperate in your attempts to show the world that you're somehow still 'important'
.. and you're failing miserably. You're driving your most knowledgeable people away. When all
is said and done, all you'll be left with is a base of end-user/consumers who can be duped into
following you and clicking at every command .. just like they do on Facebook.
Forcing it on users by changing it to a 'recommended update' is a sham ... and deception. Yes,
they still have to agree, but lacking the knowledge of even how to research s/w, they'll just
accept. After all, the defaults are to install everything and if Microsoft says it's good, gee,
it must be fine .. right?
From a ZD Net article on this topic, apparently Microsoft will *start* to release what's included
in the updates that it also forces onto your system without being able to stop it - unless you're
at the top level of product and then it doesn't stop it .. it just postpones it.
So starting next month, they will *start* providing more documentation about the updates. BUT
they "...will not be providing a full code change list, but will strive to provide the right amount
of information for different audiences." This is no way to run a business - sysadmins will be
at a constant disadvantage.
zman58, Nov 3, 2015
You need to carefully read the EULA that you agreed to. They have it covered completely and can
do whatever they want with the software on your system.
You should be thinking about Linux for sure.
eaglewolf, Nov 3, 2015
I didn't, nor will I, install Win10. The security/privacy issues plus the totally uncontrolled
way Microsoft wants to deal with the end users (update chaos) should be illegal. They're playing
a shell game but the problem is none of the shells have anything under them. You always lose.
And I'll be heading to Linux in the near future - already decided that!
Jason Shepard, Nov 1, 2015
I will remain with Windows 7 until such time as it is no longer supported by Microsoft.
After that, I will re-evaluate what I intend to do. If it weren't for my gaming and the expense
of Mac machines, I'd dump Microsoft.
Jan 26, 2009 |
As part of
my recent migration to a new PC, I needed to find the product keys for various programs I was
planning to reinstall. Easier said than done. (When, when will I organize this disaster
area of a home office?)
Fortunately, I found a sweet utility that saved me hours of rummaging through
Magical Jelly Bean's Keyfinder quickly and efficiently finds the product keys for installed programs,
then lets you print them for safekeeping.
It's compatible with all versions of Windows and can dig up the keys for your operating system,
Office apps, and various other programs. On my machine it found keys not just for
Windows XP and
Office 2003, but
also for Command and Conquer: Generals (best RTS game ever, if you want my opinion).
Keyfinder is fast, free, and incredibly handy. It doesn't even require installation. I recommend
it not just for those migrating to new PCs, but for anyone who wants to keep a hardcopy of important
It does what it claims to do... and much more that it doesn't warn you about.
Microsoft with Windows 10 is doing a great job of destroying user trust. Look like Windows OS itself
became a malware...
"..."For those who have chosen to receive automatic updates through Windows Update, we help
customers prepare their devices for Windows 10 by downloading the files necessary for future installation,"
a company spokeswoman said in an email. "This results in a better upgrade experience and ensures the
customer's device has the latest software. This is an industry practice that reduces time for installation
and ensures device readiness." "
"...The upgrade, which can range in size from more than 3GB to nearly 6GB, is placed in the
hidden "$Windows.~BT" folder, a long-used destination for Windows upgrades. It will sit there, presumably
until the user expresses some kind of desire to install Windows 10. "
"..."I had to travel recently, so I took a laptop with [a] clean Windows 8.1 Pro install," wrote
one such user, identified only as
"X.25" on Slashdot.
"At my destination, I purchased a SIM (they only had 1GB data packages) and put it into the 3G/W-Fi
router I carry. I powered the laptop, connected to [the] Internet via said router, checked [a] few things,
then went away for [a] few hours. When I got back to [the] apartment, my data package (and Internet
connectivity) was killed because [the] Microsoft idiots decided to start downloading Windows 10 even
though I have explicitly closed/rejected all the 'offers.'" "
Microsoft confirms it has been silently downloading massive upgrade
to Windows machines via automatic updates, chewing up bandwidth and storage space
Microsoft today confirmed it has been pre-loading the Windows 10 installation bits onto devices
whose owners have not "reserved" a copy or expressed interest in the new OS.
The move has upset some users of Windows 7 and Windows 8.1, who have complained that the unsolicited
downloads have caused them to exceed their Internet providers' data caps or seized storage space
without their consent.
In a statement, Microsoft acknowledged
the practice, which was
first reported by The Inquirer on Thursday.
"For those who have chosen to receive automatic updates through Windows Update, we help
customers prepare their devices for Windows 10 by downloading the files necessary for future installation,"
a company spokeswoman said in an email. "This results in a better upgrade experience and ensures
the customer's device has the latest software. This is an industry practice that reduces time
for installation and ensures device readiness."
If Windows 7 or Windows 8.1 device owners have Windows Update set to the default -- and Microsoft-recommended
-- option that lets the operating system download and install security and other bug fixes automatically
in the background, Microsoft will push the
Windows 10 upgrade
files to the drive.
The upgrade, which can range in size from more than 3GB to nearly 6GB, is placed in the hidden
"$Windows.~BT" folder, a long-used destination for Windows upgrades. It will sit there, presumably
until the user expresses some kind of desire to install Windows 10.
Microsoft has been pre-loading the Windows 10 upgrade on systems since late July, but it was
thought that the practice had been limited to PCs whose owners had accepted Microsoft's free offer
and "reserved" a copy through an app the Redmond, Wash. company
automatically installed this spring and early summer on virtual all consumer PCs running Windows
7 Home and 8.1 Home, and on many machines powered by Windows 7 Professional and Windows 8.1 Pro.
After the Windows 10 upgrade was downloaded to the device, the user was notified through the app
that it was ready to install.
This new scheme, however, is vastly different in that the bits are downloaded to the device even
though the user has not asked for the upgrade.
Not surprisingly, among the first to notice the I-did-not-ask-for-this upgrade were people who
have data caps mandated by their Internet service providers (ISPs), particularly those who relied
on a cellular connection to the Internet.
Several commenters in a long thread on Slashdot claimed that they had exceeded their caps because
Microsoft downloaded the massive upgrade to their hardware without their approval.
"I had to travel recently, so I took a laptop with [a] clean Windows 8.1 Pro install," wrote one
such user, identified only as
Slashdot. "At my destination, I purchased a SIM (they only had 1GB data packages) and put it
into the 3G/W-Fi router I carry. I powered the laptop, connected to [the] Internet via said router,
checked [a] few things, then went away for [a] few hours. When I got back to [the] apartment, my
data package (and Internet connectivity) was killed because [the] Microsoft idiots decided to start
downloading Windows 10 even though I have explicitly closed/rejected all the 'offers.'"
Others didn't appreciate the unwelcome guest that dropped into their limited storage space. Anyone
with a 128GB SSD (solid-state drive), for example, would be concerned if 5% of their storage capacity
was occupied without their okay.
Some also wondered whether Microsoft would take the next logical step by either dunning users
with notifications urging them to apply the already-installed upgrade, or make the much more unlikely
move of automatically triggering the upgrade.
The former would, frankly, not be that different from what Microsoft has already done with those
who accepted the free upgrade and reserved a copy. It's possible that many on the receiving end of
such notifications would approve the upgrade, and even appreciate the fact that they did not have
to wait for a long download to complete before upgrading. The latter, however, would be unprecedented,
and would almost certainly fuel a firestorm of protest.
Microsoft did not immediately reply to follow-up questions about its intensions.
What is also interesting about the upgrade-prep is Microsoft's defense, that it's an "industry
Although that may be true in limited instances --
Google's Chrome browser, for example,
regularly pre-loads updates, which are then automatically installed the next time the application
is launched -- as far as Computerworld knows, it's never been done with either an operating
system or software that demands installation files of this size. The most common practice for operating
systems, by far, is to begin downloading an upgrade only after the user has been notified, and then
approved the procedure.
Wes Miller, an analyst with Directions on Microsoft, agreed. "I've seen some tiny apps do it for
updates. But not for an OS upgrade," Miller said in an email answer to a question asking whether
he recalled any similar examples.
This story, "Microsoft pushes Windows 10 upgrade to PCs without user consent" was originally published
Don't rule out upgrading to Windows 10 from 7 when that ships this year. It should look much more
like Windows as you've known it, including a streamlined version of the traditional Start menu. It will
be a free upgrade from Win 7 as well as Win 8.
Q. My Windows 7 desktop died; is it wise to buy a new model with Win 7 if I can find one? I'd
rather not have to relearn software after switching to Windows 8.
Is it possible to find Windows 7 on new computers if you're flexible in your hardware choices.
HP's site, for example, lists
eight desktop configurations available with Windows 7 vs.
35 with Windows 8; among laptops,
68 versions come with Win 8 against
31 with its predecessor. Those numbers obscure how the top computer vendor in the USA offers
at least one model in most of its product lines - Envy, Pavilion,
At Dell, ranked second in
firm IDC's latest data, a similar pattern prevails with laptops. Although you have far more choices
with Windows 8 than 7 - 101 choices on the menu compared with 29 - choosing the older software still
gives you choices among Dell's major product lines.
With Dell desktops, opting for Windows 7 will exclude that manufacturer's all-in-one designs.
At Lenovo, fourth in IDC's ranking after Apple, specifying Windows 7 on a laptop also requires
compromises. Not only does its site list only 19 laptops with Win 7 vs. 100 with Win 8, you have
to forgo more advanced models such as its Yoga and Flex series.
This selection does not represent a huge shift from
what I found in late 2012, not long after Windows 8's debut.
Microsoft's support of Windows 7 has changed since then, but it's not as big of a deal as it might
seem. Although that
mainstream support" Jan. 13, all that means in practice is that Microsoft's updates to Windows
7 will consist only of security fixes, not new features. Those security patches will keep coming
until Jan. 14, 2020, the scheduled end of "extended support" for Win 7.
That leaves potential Windows 7 shoppers few reasons to worry,
Directions on Microsoft analyst
"They can buy a Windows 7 Professional PC today and receive security fixes for almost four and
a half years," he said. "I also don't expect vendors to drop support for Windows 7 anytime soon -
it's extremely popular with consumers and business."
Microsoft's Internet Explorer will get left behind - the Redmond, Wash., firm is
retiring that browser in favor of a new app called
Microsoft Edge that will ship with the
upcoming Windows 10.
Google Chrome or
Firefox can easily take IE's place. Since both still support Windows XP, you can expect Windows
7 to remain welcome at both browsers for years to come.
Don't rule out upgrading to Windows 10 from 7 when that ships this year. It should look much more
like Windows as you've known it, including a streamlined version of the traditional Start menu. It
will be a free upgrade from Win 7 as well as Win 8.
Readers of this blog probably think I have an obsession with editing my system path. That belief
is absolutely correct. I even added a tag on this blog for the articles about path manipulation.
I am a command line junkie who is constantly trying out new tools so I have to add them to my path.
I've written about doing this from powershell here and here, as well as doing it with setx. While
these methods are good, I wanted something better. I got better with pathed.exe.
pathed.exe is a program that lets you edit both your user and the system path. It only manipulates
the path, not other environmental variables. The reason for this extreme specialization is that pathed
is specifically designed for appending to and removing from the path. It treats the path as a semicolon
delimited array, which is of course what it is. For example, I just ran it now on my machine as I
was writing this article (note: live coding is less embarrassing when you do it on a blog).
In my last post, I talked about mounting disk images in Windows 8. Both Windows 8 and 2012 include
native support for mounting ISO images as drives. However, in prior versions of Windows you needed
a third party tool to do this. Since I have a preference for open source, my tool of choice before
Windows 8 was WinCdEmu. Today, I decided
to see if it was possible to determine the drive letter of an ISO mounted by WinCdEMu with PowerShell.
A quick search of the internet revealed that WinCdEmu contained a 32 bit command line tool called
batchmnt.exe, and a 64 bit counterpart called batchmnt64.exe. These tools were
meant for command line automation. While I knew there would be no .NET libraries in WinCdEmu, I did
have hope there would be a COM object I could use with
Unfortunately, all the COM objects were for Windows Explorer integration and popped up GUIs, so they
were inappropriate for automation.
Next I needed to figure out how to use batchmnt. For this I used batchmnt64 /?.
C:\Users\Justin>"C:\Program Files (x86)\WinCDEmu\batchmnt64.exe" /?
BATCHMNT.EXE - WinCDEmu batch mounter.
batchmnt <image file> [<drive letter>] [/wait] - mount image file
batchmnt /unmount <image file> - unmount image file
<drive letter>: - unmount image file
batchmnt /check <image file> - return drive letter as ERORLEVEL
/unmountall - unmount all images
batchmnt /list - list mounted
Mounting and unmounting are trivial. The /list switch produces some output that I could
parse into a PSObject if I so desired. However, what I really found interesting was batchmnt
/check. The process returned the drive letter as ERORLEVEL. That means the ExitCode of the batchmnt
process. If you ever programmed in a C like language, you know your main function can return an integer.
Traditionally 0 means success and a number means failure. However, in this case 0 means the image
is not mounted, and a non zero number is the ASCII code of the drive letter. To get that code in
PowerShell is simple:
"C:\Program Files (x86)\WinCDEmu\batchmnt64.exe"
cmdlet normally returns immediately without output. The -PassThru switch makes it return information
about the process it created, and -Wait make the cmdlet wait for the process to exit, so that information
includes the exit code. Finally to turn that ASCII code to the drive letter we cast with [char].
July 17, 2013 |
BitTorrent Sync lets you sync files and folders across Windows, Linux, Android and Mac devices.
Your files and folders are encrypted, and they are never stored in the cloud or on a server.
1. Go to the
BitTorrent Sync page.
2. Click the Download button.
3. A menu will appear with download options.
4. Under the "Linux and NAS Devices" section, click the link for your Linux computer or device.
5. Download the file and install it to run BitTorrent Sync on your Linux system.
[Jul 19, 2013] BitTorrent Sync
If the download did not begin automatically, please click here.
- Run BTSync.exe
- If necessary, allow the program to make changes and follow the install wizard
- After installation, BitTorrent Synс will start automatically
Check out the BitTorrent Sync
user guide for more information on setup and configuration.
April 16, 2013 |
Reports from a couple of different forums from this past weekend raised the possibility that
Microsoft might be moving toward allowing users to skip booting into the Metro-Style Start menu and
their PCs in desktop mode. (Winbeta.org
noted the thread about this on April 14.)
perhaps 'puters aint your thing
have been using Windows 8 since the beta in February 2012. I don't have a laptop nor a touch
screen. Works just fine. pretty simple? But heck maybe I'm just a super genius since so many seem
to have so much difficulty. Perhaps a Mensa test should be required.
Condecension is not a good way to get your point across
I really dislike how many people assume they are smarter, or just simply superior to their
fellow computer users because they like the newest idea to come from a software company.
Did it ever occur to you that some people just don't like the new layout? I've also used Windows
8 since the developer preview, and I know it pretty much inside and out, but it only resides on
one of my computers at home so I am conversant on the system. The rest of my computers remain
windows 7, or linux of some flavor, (just for reference, that totals about 7 boxes among family,
and media servers.)
Windows 8 as it stands is just not something I prefer on a personal level, either as touch or
non-touch. A hybrid style ends up being maligned due to it's inability to capitalize on any of
it's strengths. Tablets and touch centric devises have different needs
than do desktops.
Tablets and touch devices are going to cut into desktop sales as many people bought desktops just
to consume media. It was overkill. The desktop was too much muscle for what many people really
needed or wanted. The desktop is not going away, but it's market is
going to shrink for a while until tablets have replaced all the redundant PC's out there.
I personally think that the PC market will shrink to at least a third of what it is now in the
consumer space, and that in certain areas a tablet will work great for many business uses as well.
I don't think this is the end of Microsoft any time soon, far too many systems used in education
and business were written specifically for MS platforms. The expenses of switching are always
prohibitive. But I do think that Microsoft's role as the dominant force in computing as a whole
Separate but Obsolete
So, you see the world as silo's, with PC's and Tablets divided in inseparable containers.
Microsoft doesn't see it this way, obviously. When Google merges Chrome with Android, you'll
see they agree with Microsoft (which sucks for both of the Chrome fans). When Apple merges IOS
with Mac OS, you'll see it there (and all those obsolete Intel Mac owners will feel the pain).
And, yes, those both of those days are coming.
Microsoft could go on making people happy......and we'd still be starting apps in the Program
Manager and using a complex menu system in Office. Well, actually, Microsoft wouldn't exist if
they did that. Windows 8 isn't perfect, but it's doing the right things to keep the company relevant
in 5 years and in 20, and it takes guts to do that when it ticks off people here and now.
Look -- the OS will merge. The first version is never easy. I don't agree with Ad Hominem arguments,
but this is a case where a lot of people just don't get it......yet.
"Microsoft could go on making people happy......and we'd still be starting apps in the Program
Manager and using a complex menu system in Office. "
Making people happy is part of the business. They should exist to serve their customers - what
good is creating a beautiful looking UI if nobody buys it?
I seriously don't want to live in a world where businesses ignore their customers.
"and we'd still be starting apps in the Program Manager"
You actually could until Windows XP Service Pack 2. Microsoft actually included a configuration
switch to allow you to do so for quite some time.
And it should be noted that neither Windows 9x nor Microsoft Office had discoverability issues
- in fact, the ribbon was designed to make it easier to discover new things, not harder. Windows
8 is actually the opposite of Office 2007 in this regard.
Start button programs show how easy it is to add options back to Win 8
I have Windows 8 on my laptop (since the early previews in 2011/2012 and now the release version).
After all that time I was not happy with the UI changes and how they affected the way I use my
computer to accomplish work. Then I read up on the different apps that add the Start Button and
boot to desktop options back to Win 8. I ended up with 'Start8' which was worth the $4.99 it cost
me. Turns out it was really easy to add the Start button back to the desktop, to boot directly
into the desktop, to get rid of the hot edges, and program keys to use IF & WHEN I want to use
the Metro/Modern UI (which is rare).
I don't notice any performance hit and so far (after 6 months or more using it) I haven't experienced
any problems. So if MS claims that it's not feasible to add switches to Win 8 that give the end
user the option to decide how THEY want to use their computer, then they're lying to you.
"nearly unusable Windows 8"
So, assuming you choose to ignore the Win8 Metro/Modern UI & apps and just use traditional
desktop apps, how is Win8 "unusable"?
Since on your desktop, you no doubt pin your most frequently used apps to the taskbar and/or
pin shortcuts to the desktop itself, you'll most likely rarely ever use the start screen.
So, again, how does this make Win8 "unusable"?
I'll grant you that on the desktop/laptop, especially non-touch-sensitive screens, the Win8
Metro/Modern apps aren't yet a slam-dunk home-run, but on touch-screen devices, Metro/Modern apps
are fabulously usable compared to desktop apps.
Nobody is saying you have to stop using your desktop apps when you use Win8 (especially on
your desktop/laptop) but if you're saying that MS should abandon/remove Metro, then you're eliminating
Windows' utility on tablets and that is something that is unreasonable and unrealistic.
While Steven J. Vaughan-Nichols articles are generally useless, some comments to them are really
Apr 17, 2013 | ZDNet
Sorry, this article is nothing but clickbait. This sort of prediction is way too premature,
and the author doesn't even pretend to be balanced. Nothing to see here, move along.
ZDNET should be renamed to ZDANTIPC
Most of the bloggers here bash the PC on a daily basis avoiding the reality that Tablets
and Smart-phones are not equal to the power of a PC. Hybrids like Surface Pro yes but not the
crap from the other guys. Reading these articles on a daily basis has me leaning towards other
news outlets because this site has a tainted and dirty feel...
It's as if Google and Apple has their hands up ZDnets ass working them over like a sweaty old
Man, I miss MS money too it was a great product. I miss Visual FoxPro also I loved that database
I doubt it.
Windows isn't going anywhere. The various versions of Windows still hold on to around 90% of
the market. Win 8 might not be lighting up the shelves but no new product is going phenomenally
The iPad Mini is cannibalizing sales of the full-sized iPad. Does that mean that the iPad is
going away? Of course not (or, at least, not in the near future).
Microsoft Group Program Manager Rob Mauceri has today revealed that Internet Explorer 10 will
be bringing its bells and whistles over to Windows 7 in mid-November. The catch is that the release
planned for next month is (still) a preview as the Redmond company wants to "collect developer and
customer feedback" before rolling out a final version.
better HTML5 support, the Enhanced Protected Mode, plus other tweaks and fixes. IE10 can be experienced
in full on Windows 8 which arrives on October 26.
I feel that is is more reliable and simpler to use then Microsoft Intellipoint. See
X-Mouse Button Control User Guide for details
You are able to provide application or window specific mappings, which
means an application or window can use the mouse buttons differently from another.
For each profile you can optionally define up to 5 'layers' of different button configurations which
you can switch between using hotkeys or mouse buttons.
You can also alter the behavior of the scroll and tilt wheel functions, fixing windows that don't
normally respond to these controls.
Profiles are automatically activated by moving the mouse over the defined window or alternatively,
when the specified application is active. This has many uses, for example:
The extensive list of functions available to map to your mouse buttons includes options such as:
- In games which do not natively support the extended mouse buttons, you can map keys to each
- Changing the behavior of the mouse over certain windows, such as making the mouse wheel change
volume when hovering over the system tray.
For more information about using and configuring X-Mouse Button Control, please check out the new
user guide (mirror).
- Send any keys using the simulated keystroke editor
- Launch any windows application
- Media control (play/pause/stop/volume/mute etc.)
- Capture screen (or active window) image to clipboard
- Click-Drag [Sticky buttons/keys]
- Vista (and Windows 7) support with some Vista/7 only features such as 'Flip 3D'
- And much more!
As Partition Magic alternative, EaseUS Partition Master Home Edition is a ALL-IN-ONE partition
solution and disk management freeware. It allows you to extend partition (especially for system drive),
manage disk space easily, settle low disk space problem on MBR and GUID partition table (GPT) disk
under Windows 2000/XP/Vista/Windows
8 32 bit and 64 bit system.