[CRTech] Christian Radio Tech [MSG 79899]
[Thread Prev] [-- Thread Index --] [Thread Next] [Date Prev] [-- Date Index --] [Date Next]
RE: The "Wannacry" ransomware attack
To: CRTech <crtech@crtech.org>
Subject: RE: The "Wannacry" ransomware attack
From: Andy Lynch <andy@myitguys.us>
Date: Mon, 22 May 2017 12:46:36 +0000
Accept-language: en-US
Authentication-results: crtech.org; dkim=none (message not signed) header.d=none;crtech.org; dmarc=none action=none header.from=myitguys.us;
Content-language: en-US
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=appriver3651000855.onmicrosoft.com; s=selector1-myitguys-us; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=XLR/E23Wus5IP36ywscO4LK7ZIe+KyHPTUYg8KCaPFA=; b=RNY1CkYyrbOAvhRmXAgTpZ4DnN4yA8QQIUDn5aY3OomuufIYeaUYbxPDYUxov4KUqOaU67l4XPyZON/t3SFqUuX76jrevGRZRgbVrBhRjJjt6cV7qAtnu0Q9hAbGZA3vsr0eHALcMkqqMtUFS96Dd1f285gdK3mXpz6iJPMpKJM=
In-reply-to: <CAAkuVzNmXQ=h_2Fx7JzF3Vpjoe=GUNPOCp_bV6oso=gL-qDTCA@mail.gmail.com>
References: <CAOkhgWpEugYgB43sVPZcGpmmujQhpNTja3-roQ4NA3=FYR66RA@mail.gmail.com> <CAAkuVzNmXQ=h_2Fx7JzF3Vpjoe=GUNPOCp_bV6oso=gL-qDTCA@mail.gmail.com>
Spamdiagnosticmetadata: NSPM
Spamdiagnosticoutput: 1:99
Thread-index: AQHSza8GF8G+ZCPx/U6E2i5dsb2jOqH9wCSAgAKXLSA=
Thread-topic: [CRTech] The "Wannacry" ransomware attack

Hey Stu-

 

Any chance you have a link for that article?  That’s the opposite of our procedure (intended to stop the spread).

 

Andy

 

 

 

From: Stu Engelke Lists [mailto:audiotoantenna@gmail.com]
Sent: Saturday, May 20, 2017 5:12 PM
To: CRTech <crtech@crtech.org>; The BROADCAST eList <broadcast@radiolists.net>
Subject: Re: [CRTech] The "Wannacry" ransomware attack

 

This is an external email. Please consider the risks before clicking links or opening attachments.

 

I read that if you get the Wanncry malware on your pc DON'T turn it off. Disconnect from the network as fast as you can.

They found that they can search memory (RAM) for the encryption key and decriypt. The utility looks for prime numbers in memory. If you turn it off that goes away.

 

FWIW.

Stu




On Mon, May 15, 2017 at 3:10 PM, Willie Barnett <wbradiolists@gmail.com> wrote:

When I discovered that MS has released a patch for XP systems, I immediately & successfully applied it to my home system! :) WHEW!!

Here is a link to the Microsoft page that makes a number of versions of their patch available...
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/





--

Stu Engelke

 

Follow-Ups: Re: The "Wannacry" ransomware attack
(Mark Croom <markc@newmail.kinshipradio.org>, 22 May 2017 15:46:04 -0000)
Re: The "Wannacry" ransomware attack
(Stu Engelke Lists <audiotoantenna@gmail.com>, 23 May 2017 10:07:57 -0000)
References: The "Wannacry" ransomware attack
(Willie Barnett <wbradiolists@gmail.com>, 15 May 2017 19:11:04 -0000)
Re: The "Wannacry" ransomware attack
(Stu Engelke Lists <audiotoantenna@gmail.com>, 20 May 2017 21:12:22 -0000)
Prev by date: Re: The "Wannacry" ransomware attack
(Stu Engelke Lists, 20 May 2017 21:12:22 -0000)
Next by date: Re: The "Wannacry" ransomware attack
(Mark Croom, 22 May 2017 15:46:04 -0000)
Prev by thread: Re: The "Wannacry" ransomware attack
(Stu Engelke Lists, 20 May 2017 21:12:22 -0000)
Next by thread: Re: The "Wannacry" ransomware attack
(Mark Croom, 22 May 2017 15:46:04 -0000)
CRTech.org