
Spot it, understand it, know it.
The scammers are sneaky.
Thanks for the heads-up, Vrede.
I received one of those myself, a while ago, and immediately reported it.
PayPal (verified) sent me a reply thanking me.
No reason. No doubt we were just chosen at random.Vrede wrote:Without revealing any secrets is there a reason you would be a DDoS target or do you think you just drew the short straw?
rstrong wrote:We just had what seems more like a lame Denial of Service attack than a hacking attempt on our mail server.
Everything slowed down on our server this morning. The mail server software was using a lot of resources. A look at the connection log showed thousands of connections in a short period of time.
According to the logs someone was repeatedly trying to log into our server as "emily" a few other names - with no email address or password. The mail server would lock an email account after so many login attempts, but they weren't trying a valid email acount.
Worse, they were opening email connections - your email client needs to open one before attempting to log in - and not doing anything. The connection would time out ten minutes later. But since they were doing this about once a second, the mail server had a LOT of connections open, was using up resources, which in turn was causing problems for other programs.
The attacks came from a single IP address in Luxembourg - but that's probably an infected machine controlled from elsewhere. I blocked the address and things have returned to normal. But it could happen again from another address. I may need to fiddle with the intrusion detection stuff on the firewall.
Should have just unplugged the wires connecting your machines to Luxembourg.rstrong wrote:We just had what seems more like a lame Denial of Service attack than a hacking attempt on our mail server.
Everything slowed down on our server this morning. The mail server software was using a lot of resources. A look at the connection log showed thousands of connections in a short period of time.
According to the logs someone was repeatedly trying to log into our server as "emily" a few other names - with no email address or password. The mail server would lock an email account after so many login attempts, but they weren't trying a valid email acount.
Worse, they were opening email connections - your email client needs to open one before attempting to log in - and not doing anything. The connection would time out ten minutes later. But since they were doing this about once a second, the mail server had a LOT of connections open, was using up resources, which in turn was causing problems for other programs.
The attacks came from a single IP address in Luxembourg - but that's probably an infected machine controlled from elsewhere. I blocked the address and things have returned to normal. But it could happen again from another address. I may need to fiddle with the intrusion detection stuff on the firewall.
Tubes, they're tubes!!!JTA wrote:Should have just unplugged the wires connecting your machines to Luxembourg.rstrong wrote:We just had what seems more like a lame Denial of Service attack than a hacking attempt on our mail server.
Everything slowed down on our server this morning. The mail server software was using a lot of resources. A look at the connection log showed thousands of connections in a short period of time.
According to the logs someone was repeatedly trying to log into our server as "emily" a few other names - with no email address or password. The mail server would lock an email account after so many login attempts, but they weren't trying a valid email acount.
Worse, they were opening email connections - your email client needs to open one before attempting to log in - and not doing anything. The connection would time out ten minutes later. But since they were doing this about once a second, the mail server had a LOT of connections open, was using up resources, which in turn was causing problems for other programs.
The attacks came from a single IP address in Luxembourg - but that's probably an infected machine controlled from elsewhere. I blocked the address and things have returned to normal. But it could happen again from another address. I may need to fiddle with the intrusion detection stuff on the firewall.
Only wires can connect to sockets:bannination wrote:Tubes, they're tubes!!!JTA wrote:Should have just unplugged the wires connecting your machines to Luxembourg.rstrong wrote:We just had what seems more like a lame Denial of Service attack than a hacking attempt on our mail server.
Everything slowed down on our server this morning. The mail server software was using a lot of resources. A look at the connection log showed thousands of connections in a short period of time.
According to the logs someone was repeatedly trying to log into our server as "emily" a few other names - with no email address or password. The mail server would lock an email account after so many login attempts, but they weren't trying a valid email acount.
Worse, they were opening email connections - your email client needs to open one before attempting to log in - and not doing anything. The connection would time out ten minutes later. But since they were doing this about once a second, the mail server had a LOT of connections open, was using up resources, which in turn was causing problems for other programs.
The attacks came from a single IP address in Luxembourg - but that's probably an infected machine controlled from elsewhere. I blocked the address and things have returned to normal. But it could happen again from another address. I may need to fiddle with the intrusion detection stuff on the firewall.
A meteorologist, actually. Everything I'm doing these days is in the cloud.JTA wrote:But if I'm wrong, and the internet is in fact connected via a series of tubes, then rstrong should have called a plumber.
People get really mad when they can't download the internet.rstrong wrote:tech support
Ugh.Overview
Security Threat – Ransomware Virus
Impact
Do no open personal email.
Do not open any links or attachments in email from outside of _________.
Status
IT is investigating and taking measures to protect our systems from vulnerability.
All desktop devices and servers will be shut down, patched and rebooted.
Reviewing threat to clinical equipment and course of action to protect that equipment.
There may be intermittent application interruptions while patches are applied.
Thanks NSA.Global cyberattack disrupts shipper FedEx, UK health system
A global cyberattack leveraging hacking tools widely believed by researchers to have been developed by the U.S. National Security Agency hit international shipper FedEx, disrupted Britain's health system and infected computers in dozens of other countries on Friday....
Then, there are "instructions to update your computer with a protective patch against this virus" immediately. It will be automatically be done system wide starting this evening.Overview
UPDATE: Security Threat – Ransomware Virus
Impact
Due to the current IT incident around the Security Threat - Ransomware, ALL COMPUTERS SHOULD BE LEFT ON AND LEFT AT WORK OVER THE WEEKEND.
Do not open personal email.
Do not open any links or attachments in email from outside of _________.
Status
You will see information about this world-wide event on local and national news and social media.
IT is investigating and taking measures to protect our systems from vulnerability.
All desktop devices and servers will be shut down, patched and rebooted.
Reviewing threat to clinical equipment and course of action to protect that equipment.
There may be intermittent application interruptions while patches are applied.
Adobe Flash Player continues to be problematic as well, and seems to openly vulnerable to virus attachments.rstrong wrote:Adobe continues to make Adobe Reader the preferred tool for ransomware attacks.
Yup. Flash is essentially dead, living on as a crawling abomination from the darkest pits of hell. It should be removed from any computer.homerfobe wrote:Adobe Flash Player continues to be problematic as well, and seems to openly vulnerable to virus attachments.rstrong wrote:Adobe continues to make Adobe Reader the preferred tool for ransomware attacks.
I keep Flash updated, but I regularly see notices that I have to update my flash player to view this video. By heeding the notice, you open yourself to a virus or some other form of useless horseshit.
I've yet to see a good description of how it works. Just that a Word document downloads a program - but no word on whether its a Windows-specific executable or a cross-platform scripting language. But there are viruses for Macs and Linux, so if this one doesn't the next one might.Vrede too wrote:rstrong or whoever, If I'm not running Windows OS can this ransomware hurt me? TV made it sound like that is the only vulnerability.
It spreads by using a Microsoft SMB protocol v1. You're safe as far as it just automatically being able to infect your computer.Vrede too wrote:rstrong or whoever, If I'm not running Windows OS can this ransomware hurt me? TV made it sound like that is the only vulnerability.
The need for urgent collective action to keep people safe online: Lessons from last week’s cyberattack
... Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today – nation-state action and organized criminal action.
The governments of the world should treat this attack as a wake-up call. They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world. We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits. This is one reason we called in February for a new “Digital Geneva Convention” to govern these issues, including a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them....
-- Microsoft’s president and chief legal officer Brad Smith