Cloak and Dagger: The Aftermath (WannaCry and NotPetya Part 3 of 3)

The Aftermath

The recent rise in ransomware attacks has highlighted the growing threat of ransomware and the need for improved cybersecurity measures. Ransomware is a type of malicious software that encrypts a user’s data and demands a ransom payment in order to regain access. The WannaCry and NotPetya attacks were particularly devastating, as they spread quickly and affected hundreds of thousands of computers around the world.

The WannaCry and NotPetya ransomware attacks have been linked to the ShadowBrokers. The ShadowBrokers released two of these tools, EternalBlue and EternalRomance, which exploit a vulnerability in the Windows Server Message Block (SMB) protocol. These tools were then used by the WannaCry and NotPetya ransomware to spread quickly across networks.

Recent cyber and ransomware attacks have highlighted the need for improved cybersecurity measures. Organizations and individuals should ensure that their systems are up-to-date with the latest security patches, and that they have effective malware protection in place. Additionally, organizations should be aware of the potential risks posed by the EternalBlue and EternalRomance exploits, and should consider implementing additional security measures such as disabling the insecure SMBv1 protocol(which is how one of the primary methods the WannaCry ransomware strain spread so quickly).

Finally, organizations should be aware of the potential risks posed by the recently discovered BlueKeep vulnerability. BlueKeep is a critical vulnerability in the Remote Desktop Protocol (RDP) that could allow attackers to gain remote access to a system without authentication. Microsoft has released a patch for the vulnerability, and organizations as well as individuals should ensure that their systems are up-to-date with the latest security patches.

One thing to help mitigate the risk of RDP exploitation, and brute force attempts/attacks is to change the default port. This will be covered in a future post. One should also have at least ONE antivirus, as well as an actively functional firewall. This will help mitigate the risk of a ransomware attack, as well as other types of malware.

The WannaCry and NotPetya ransomware attacks have highlighted the need for improved cybersecurity measures. Organizations should ensure that their systems are up-to-date with the latest security patches, and that they have effective malware protection in place. Additionally, organizations should be aware of the potential risks posed by the EternalBlue and EternalRomance exploits, and should consider implementing additional security measures such as disabling SMBv1. Finally, organizations should be aware of the potential risks posed by the recently discovered BlueKeep vulnerability. By taking these steps, organizations can help protect themselves from the growing threat of ransomware.

With all this said and done, what are your thoughts on the WannaCry and NotPetya attacks? Do you think that the NSA is responsible? Finally, is there anything in particular you (the audience) would like to see on this blog? Let me know in the comments below!

Signing off for now,

//TheModdersDen

Site Redesign in the Works

4 minute read

Why I am redesigning the site I am redesigning my blog, with a custom theme, due to the fact that it currently looks like a generic Jekyll blog. I want to m...

AI & Ethics: Navigating the Complex Landscape

9 minute read

What Are AI Ethics AI ethics is the branch of the ethics of technology that deals with the moral implications of developing and using artificial intelligenc...

The ACE that aced Ace Ventura

14 minute read

Humble beginnings The Alliance for Creativity and Entertainment (ACE) is a coalition of over 30 major global entertainment companies and film studios that a...

The Dark Net

6 minute read

What is the Dark Net? The dark net is a part of the internet that isn’t indexed by search engines and can’t be easily accessed using standard web browsers l...

A Technical Analysis of Onion Routing

5 minute read

What is ‘Onion Routing’ Onion routing is the process of encrypting internet traffic in layers, much like the layers of an onion, to protect user privacy and...

What is Stuxnet?

7 minute read

The Zero Day (0-Day) The year was 2010. The world was still reeling from the 2008 financial crisis, and the United States was in the midst of a presidential...

What is MFA?

8 minute read

A Basic Overview What is MFA? Multi-factor authentication (MFA) is a security measure that requires users to provide two or more pieces of evidence (or “fa...

Announcing Comment/Reaction Functionality!

3 minute read

Comment Functionality I am excited to announce that I have added comment functionality to this blog! This means that you can now comment on posts, and I wil...

AI and Writing

3 minute read

AI Generated Stories/Writing In recent years, Artificial Intelligence (AI) has been making its way into the world of writing. AI generated stories are becom...

AI and the Future of the Modern Workplace

4 minute read

AI and Jobs AI has had a major impact on the job market. AI is being used to automate many tasks, such as data entry and customer service. This has led to t...

AI and Programming

2 minute read

AI Generated Code AI generated code is a relatively new concept that has been gaining traction in the programming world. AI code is code that is generated b...

AI and Art: A Basic Overview

2 minute read

AI Generated Art AI and art have been intertwined for decades, but the recent emergence of AI-generated art has sparked a new wave of controversy. AI art, a...

What is Ransomware?

3 minute read

What Is Ransomware? Ransomware is a type of malicious software, or malware, that is designed to block access to a computer system or data until a ransom is ...

Hello, World!

less than 1 minute read

Testing 123! Does this thing work? This is a test post. This is only a test post. If this were a real post, it would have content. But it’s not, so it doesn...