You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
-Signs, Portents, and the Weather-
British IT expert, 22, who lives with his parents reveals how he stopped the global cyber attack that wreaked havoc on the NHS as he warns he is already fighting hackers trying to unleash a NEW threat
2017-05-14
[DailyMail]
  • UK blogger, 22, 'accidentally' found method to block spread of cyber attack

  • He found way to register virus as a website which caused a 'kill switch'

  • But the cyber expert warned a group of hackers are trying to sabotage the fix
Update from Ynet at 11:30 a.m. EDT:
Friday's cyber attack hit 200,000 victims in at least 150 countries and that number could grow when people return to work on Monday, the head of the European Union
...the successor to the Holy Roman Empire, only without the Hapsburgs and the nifty uniforms and the dancing...
's police agency said on Sunday.

Cyber security experts say the spread of the virus dubbed WannaCry - "ransomware" which locked up computers in car factories, hospitals, shops and schools in several countries - has slowed, but that any respite might be brief.

Europol Director Rob Wainwright told ITV's Peston on Sunday programme the attack was unique in that the ransomware was used in combination with "a worm functionality" so the infection spread automatically.
Posted by:trailing wife

#4  'Yet', Neville.

Somebody will find a hole in the 'Epic' healthcare management software system currently being used to follow the ACA guidelines for a lot of major US health systems (Surprise! The software company owner is a BIG-TIME lefty donor).

It's not 'if', but 'when'.
Posted by: Mullah Richard OTR   2017-05-14 19:43  

#3  Another reason why you do not want the government managing healthcare. Have not seen any US hospitals affected.
Posted by: Neville Glerenter2417   2017-05-14 19:28  

#2  bit tricky to look for anyone with a hosts file that points to that DNS address.
Posted by: Bright Pebbles   2017-05-14 10:57  

#1  Factually incorrect: he tracks exploits for his employer, and in examining the the 'trackback' on this run he found that the malware would 'phone home' to a non existent website, get a 404, and continue. So he paid the $11, registered the site (which he routinely does in tracking exploits), and the exploit shut down.
Evidently the nonsite was included as a kill switch, or was supposed to have control code available on it.
Posted by: ed in texas   2017-05-14 09:49  

00:00