サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
ドラクエ3
blog.comae.io
As you may have read, Parity issued a security advisory today to inform its users and developers about a bug that got “accidentally” triggered which resulted in freezing more than $280M worth of ETH, including $90M belonging to Parity’s Founder & Ethereum former core developer: Gavin Woods. How long has this bug been around for?As Dan Guido points out, this new vulnerable contract has been deploye
Dubbed Fakesomware by Comae (Also called ExPetr, PetrWrap, NotPetya, DiskCoder). TL;DR: The ransomware was a lure for the media, this variant of Petya is a disguised wiper. Update1: Few hours later, Kaspersky’s research led to a similar conclusion. Update2: Added more info on the wiper command & comparative screenshots of the two keys that visually confirms Kaspersky’s finding and why the MBR copy
Read More: Part 1 — Part 2 — Part 3 — Part 4 — @msuiche (Twitter) In ShortDO NOT REBOOT your infected machines and TRY wanakiwi ASAP*! *ASAP because prime numbers may be over written in memory after a while. Frequently Asked QuestionsHere. UsageYou just need to download the tool and run it on the infected machine. Default settings should work. Usage: wanakiwi.exe <PID> - PID (Process Id) is an opt
Code similarities are shared between a February 2017 sample of WannaCry and 2015 Contopee sample (previously attributed last year to Lazarus Group by Symantec) had been found. Initially, reported on Twitter by Google researcher Neel Mehta, I investigated further. Since then, this suspicion has been shared by Kaspersky too. UPDATE: Symantec also released few hours later an article saying they also
Read More: Part 1 — Part 2 — Part 3 — Part 4 @msuiche (Twitter) UPDATE: Latest development (15May): Attribution and links to Lazarus Group UPDATE2: — Decrypting files As a follow-up article on WannaCry, I will give a short brief about the new variants found in the wild, not for experimentation but on infected machines today. In short, one is a false positive some researchers uploaded to virustotal
Read More: Part 1 — Part 2 — Part 3 — Part 4 — @msuiche (Twitter) UPDATE: Latest development (15May): Links to Lazarus Group UPDATE2: — Decrypting files IMPORTANT NOTE: Microsoft released an emergency patch (KB4012598)for unsupported version of Windows (Windows XP, 2003, Vista, 2008). APPLY NOW! On Friday 12th May 2017, a ransom-ware called WannaCry infecting and spreading machines in 70+ countrie
このページを最初にブックマークしてみませんか?
『blog.comae.io』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く