If they catch the WannaCry culprits

  • Thread starter phyzguy
  • Start date
In summary: The problem with autoupdate is that it would be possible for malicious actors to exploit vulnerabilities before the patch is released.Yes, that is a problem. But I think we will eventually get to a point where patches are released on a timed basis and machines are allowed to automatically install them.But even with autoupdate, there is always the risk that a machine will be infected before the update is installed.Yes, that is a risk. But I think we will eventually get to a point where patches are released on a timed basis and machines are allowed to automatically install them.But even with autoupdate, there is always the risk that a machine will be infected before the update is installed.
  • #1
phyzguy
Science Advisor
5,220
2,264
Are any of you familiar with Asimov's short story "A Perfect Fit"? I was thinking that if they catch the perpetrators of the WannaCry ransomware attack, Asimov already saw this coming and has their punishment all ready.
 
Computer science news on Phys.org
  • #2
I'm guessing the heat is on and they will find these guys.
 
  • #3
It is also most interesting that those most affected are those who run pirated copies of Windows in China and Russia. According to the news, those who have been getting regular updates are immune. Will there be pressure now for software vendors to support pirate copies? Suppose refusing to do so causes deaths? Suppose pirated SW could accidentally launch nuke missiles in NK? It makes a real dilemma.

Zero day exploits, are not limited to Microsoft. Unix, hard drives, routers, NIC cards, and mother boards all have zero day exploits.

The government has a committee that is said to evaluate these zero day exploits to decide whether to conceal/exploit them or to reveal them to the SW vendor for patching. They are said to weigh the offensive value versus defensive risks. How in the world can one make a factual assessment of the max damage an exploit could cause? The mere idea of making such an assessment is preposterous.

I worked many years in SW relating to the security of the power grid and nuclear power. We don't use Microsoft and our critical stuff is air gapped, but we are forced to use the same merchant software and hardware as anybody else in the world. It infuriates me that we might have vulnerabilities in our systems that our government knows about but refuses to reveal so that we could fix them. It infuriates me even more when that same government comes with a pitch for public-private partnerships to improve security. The offensive cyber capabilities of our own government are a major source of risk to the defensive vulnerabilities of our civilian critical infrastructure.
 
  • Like
Likes jedishrfu
  • #5
The exploitation of zero days is the outcome of countries jockeying for position in the world causing one country to not trust any other. Many countries have cyber war operations and all are seeking the best exploits.

It's so sad that we are balkanizing the openness of the internet in so many ways for so many reasons.

My guess is that eventually we will have a total lockdown on computer updates unless AI technology can somehow identify malware and eliminate it from being downloaded and installed.
 
  • Like
Likes Jamison Lahman
  • #6
jedishrfu said:
My guess is that eventually we will have a total lockdown on computer updates unless AI technology can somehow identify malware and eliminate it from being downloaded and installed.

For consumer use, that wouldn't be so bad. A laptop with all software in ROM, non-alterable, non-updatable. Discard it when it becomes obsolete. Devices like the Chromebook are halfway there.

If you study The New Hacker's Dictionary, you'll see that we have been going back and forth on that concept for more than 60 years (I forget the term, it was "the cycle of ..." something). Push intelligence out to the perimeter (smart devices) or centralize the smarts and make the devices dumb. In the future, I predict that we will flip-flop and change our ideas on that issue again and again.
 
  • #7
Yeah I've seen that trend of back and forth. We started with terminals. They got smarter when pcs came out then went back to terminals for X-windows and then back to pcs and now we see a resurgence of Remote Desktop usage and the air gap.
 
  • #8
jedishrfu said:
The exploitation of zero days is the outcome of countries jockeying for position in the world causing one country to not trust any other. Many countries have cyber war operations and all are seeking the best exploits.

It's so sad that we are balkanizing the openness of the internet in so many ways for so many reasons.
Agreed. When you consider a zero-day exploit as a weapon, it's no wonder why countries invest heavily to stockpile them, though unlike conventional weapons, zero-days are only effective until exposed and patched.
 
  • Like
Likes jedishrfu
  • #9
stoomart said:
Agreed. When you consider a zero-day exploit as a weapon, it's no wonder why countries invest heavily to stockpile them, though unlike conventional weapons, zero-days are only effective until exposed and patched.

People have already shown methods to automatically reverse engineer exploits FROM patches. This creates an interesting problem about how to distribute patches.
 
  • #10
Its not too bad of a problem if autoupdate is implemented. Machines would get the patch installed sooner than later making reverse engineering less feasible.

Of course that brings up the worry of the updating protocol getting hacked.
 
Last edited:
  • #11
jedishrfu said:
The exploitation of zero days is the outcome of countries jockeying for position in the world causing one country to not trust any other. Many countries have cyber war operations and all are seeking the best exploits.

It's so sad that we are balkanizing the openness of the internet in so many ways for so many reasons.

My guess is that eventually we will have a total lockdown on computer updates unless AI technology can somehow identify malware and eliminate it from being downloaded and installed.
I was right there with you and then you completely lost me haha. Why not just mandate rolling updates for any computer connected to the internet and make it illegal for government institutions to sit on zero-day exploits?
 
  • Like
Likes Routaran
  • #12
Jamison Lahman said:
make it illegal for government institutions to sit on zero-day exploits?
I would love to go further and say make it illegal for anyone to sit on zero days.
 
  • #13
Routaran said:
I would love to go further and say make it illegal for anyone to sit on zero days.
Interesting. I had never thought of that. It is certainly a possibility if you consider them a weapon of sorts. However, I think people should be allowed to sit on zero days for two reasons: one, the more rights the better imo and 2, programmers would no longer have an incentive to find exploits. Some people make a living finding security flaws in codes and they should be able to haggle with the companies to reach an appropriate price so they can patch the exploit.
 
  • #14
Perhaps an open auction for exploits would work where anyone could bid for them.
 
  • #15
jedishrfu said:
Perhaps an open auction for exploits would work where anyone could bid for them.
WHAT!? And get jailed as an "accessory" for selling to the wrong bidder?:olduhh:
 
  • #16
The bidder would get arrested too, right? Problem solved.

The idea is to take out of the Dark Web where this already happens and it allows companies to bid on it to keep it from prying eyes. The seller discovered it and waits until the best respectable bidder comes along but its out in the open where bad guys might fear to tread.

Folks could buy it up and then resell it giving the company an incentive to buy it for good or to change things so that its ineffective.
 
  • #17
I believe it was tracked to North Korea, although I wouldn't be surprised if they hadn't a clue and just blamed them because everyone would believe it.
 
  • #18
The dark web is a strange. Professional hackers can sell their exploits to anyone and mever know who buys it.

State actors like North Korea could easily have found stuff there.
 
  • #19
I don't see how a state actor such as NK has anything to gain from ransomware attacks.
It's just normal robbery as far as I can see, and although my own PC defense dealt with it, an attempted hack appeared to originate from Poland.
 
  • #20
The advantage to NK is added money to their coffers. The international community has shut down a lot of their revenue streams. The money is needed to keep the gifting economy going. This is the way the leaders of NK have maintained their grip on power all these years.

 
  • Like
Likes Jamison Lahman

FAQ: If they catch the WannaCry culprits

1. Who is responsible for the WannaCry cyberattack?

The WannaCry cyberattack was carried out by a group of hackers known as the Lazarus Group, believed to have ties to North Korea.

2. What was the motive behind the WannaCry attack?

The motive behind the WannaCry attack was financial gain. The hackers demanded ransom payments in bitcoin in exchange for unlocking the encrypted files on the infected computers.

3. How did the WannaCry attack spread so quickly?

The WannaCry attack spread through a vulnerability in Microsoft Windows operating systems that had not been patched. The hackers used a tool developed by the National Security Agency to exploit this vulnerability and spread the malware.

4. How were the WannaCry culprits caught?

The WannaCry culprits were not caught, but researchers were able to trace the bitcoin payments made to the hackers, revealing their identities and potential ties to the Lazarus Group and North Korea.

5. What measures can be taken to prevent similar cyberattacks in the future?

To prevent similar cyberattacks in the future, it is important for individuals and organizations to regularly update their operating systems and software, use strong and unique passwords, and backup important data. Governments and tech companies also need to work together to improve cybersecurity measures and address vulnerabilities.

Similar threads

Replies
15
Views
799
Replies
12
Views
2K
Replies
6
Views
1K
Replies
14
Views
4K
Replies
3
Views
3K
Back
Top