Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"Microsoft rolled out a patch for the vulnerability last March, but hackers took advantage of the fact that vulnerable targets — particularly hospitals — had yet to update their systems."

What Microsoft's software should be updated now to protect against this particular attack? Windows? Windows at the end user machines? The servers?

Could someone share a "What should I do now to protect myself" guide, please?

Thanks!



From everything I read last year... as long as someone has write access to a shared network resource, your network is vulnerable.

I read about ways to detect it early with FSRM, but never tried it:

https://chrisreinking.com/stop-cryptolocker-from-hitting-win...

Experts, chime in? What is out there in 2017 (paid or not paid) as a way to protect network drives from ransomware?


The same way you protect those network drives from an employee accidentally or intentionally deleting everything.

Limited permissions work, backups work, journaling data storage systems with an ability to rollback all changes work.

In most environments nowadays I guess there's no valid reason to have a literal "network drive" - if your users don't need to wrangle terabyte-sized data blobs, most environments can afford the overhead to have the company document/file sharing to happen in some system that stores full history of changes, and where normal users can not remove that history even if they're malicious or infected with malware. Probably even Dropbox or its competitors would be sufficient for that, no need to go to the more enterprisy vendors.


Proper backup system?


Well yes that's obvious, I meant more along the lines of:

Are there any ways to detect and stop it from happening in 2017? Third party software? New group policies from MS?


Not really, ultimately if someone has write to your network drive, it's not any different than malware having it. The best solution is a good backup and protecting your hosts from being infected as much as possible.

I believe some people were trying to do rate limiting and traversal detection, which should be possible, but also is common in many tools, like running grep or find on a network share, so it's far from a perfect solution. It could also probably be avoided by clever malware if it were to be widely deployed.


For this, run Windows update and install all updates. Additionally, it's smart to disable SMBv1 on all machines.


I disabled SMBv1 on the server. Good enough to protect our network share? Or is there some reason/benefit to disabling SMBv1 on client machines too?

(I ran the simple powershell command on server: https://support.microsoft.com/en-us/help/2696547/how-to-enab...)


The main one is to have _all_ machines patched through windows update. That is what will protect you.

SMBv1 is an outdated protocol, in which there have been some severe vulnerabilities disclosed in the last few weeks, hence why I recommended to get rid of it at the same time.

That being said, the vulnerability being exploited here is in SMBv2, hence why patching all machines is crucial.


I notice that Microsoft is claiming the exploit is in SMBv1 in their patch description [1].

[1] https://support.microsoft.com/en-us/help/4012598/title


There are two exploits. One targets SMBv1 and the other SMBv2. Then there's the backdoor.


If you are working with SCCM and 20,000+ clients (computers), you will know that all machines will never be patched. It just does not happen. On any given large network there will always be a certain number of unpatched clients. There are a myriad of reasons for patching to fail, from advertisement errors to installation issues, to machines simply being offline (and later coming back online).


You are right that this is often the reality of things. Some systems also will just never be patched because the software running on them stops working if you do and the vendor cannot or will not provide an update that addresses this.

However, in such cases it becomes crucial to have e.g. proper network segmentation in place to help mitigate the risk.

Unfortunately, at this time, there are seldom perfect solutions when it comes to security and a patching scenario can only do so much. In this case, patches are available, but the day a ransomware starts using proper 0-day we'll see a different scenario play out.

It therefore remains important to also keep focus on the reduction of attack surface, and the reduction of software complexity, besides resolving individual technical vulnerabilities.


Thanks for the info. I patched all client machines last night.

Here is the offline installer:

https://support.microsoft.com/en-us/help/3125574/convenience...

Prerequisites: must have installed SP1, along with the April 2015 convenience rollup. Links are provided in the prerequisites section.

Here's a direct link to the catalog download for the May 2017 security rollup (this supercedes all previous monthly rollups):

http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB...

For more information on the monthly rollups and how they supersede each other, see:

https://blogs.technet.microsoft.com/windowsitpro/2016/08/15/...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: