WannaCry is back! (Psych. It's just phisher folk doing what they do)

Spamming scum fire out phishing frighteners


An unusually large wave of phishing emails was spewed out this morning, with recipients warned that all their devices had been infected by WannaCry.

Action Fraud UK has said it has already received over 200 reports of the phishy email this morning, while beleaguered IT support contractors – seemingly mostly based in the UK – were asking users to delete, refrain from clicking links and carry on with their lives. Still others were, um, urging clients to install extra security software...

Presumably the tsunami of spam was in celebration of the Summer Solstice. Or more likely because the authors are horrible human beings.

The email warns of a super virus, able to run on any platform (Windows, iOS, Linux, and so on), which cannot be detected by antivirus and renders firewalls, erm, "marrowless" in some versions of the email we've seen.

Furthermore, users' data will be deleted by the miracle cross-platform software between 17:00 and 22:00 on 22 June 2018 unless 0.1 BTC (around $650, according to the scammers) is coughed up.

It is, of course, utter nonsense and plays on the fears of users following last year's WannaCry fiasco.

WannaCry worked by spreading over networks by exploiting a flaw in the ancient SMB 1 networking protocol and encrypting files. Users (including institutions such as the UK's National Health Service) had to pay a ransom to get their files back or face a loss of data.

By the end of July last year, the ransom wallet stood at 52.19666422 BTC (around $145,000 back then) before the scammers began withdrawals.

Phishing attacks soon followed, with users worried by some very realistic emails pretending to be from BT.

The authors of today's less sophisticated scam attempt have been somewhat less successful, with the balance of their wallet standing at precisely zero at time of writing.

Recipients of the email should treat it with the contempt it deserves and delete it. It goes without saying that following any links it contains or opening any attachments is an absolute no-no.

It would also be a good idea to ensure security patches are up to date and backups are being checked, because it is unlikely to be long before another worm is menacing networks for real.

Thanks to reader Nathan Lock for tipping us off. ®


Other stories you might like

  • Yet again, Cream Finance skimmed by crooks: $130m in crypto assets stolen

    Third time's the unlucky charm for loan outfit

    Decentralized finance biz Cream Finance became further decentralized on Wednesday with the theft of $130m worth of crypto assets from its Ethereum lending protocol.

    Cream (cream.finance and not creamfinance.com) reported the loss via Twitter, the third such incident for the loan platform this year.

    "Our Ethereum C.R.E.A.M. v1 lending markets were exploited and liquidity was removed on October 27, 1354 UTC," the Taiwan-based biz said. "The attacker removed a total of ~$130m USD worth of tokens from these markets, using this address. No other markets were impacted."

    Continue reading
  • OpenID-based security features added to GitHub Actions as usage doubles

    Single-use tokens and reusable workflows explained at Universe event

    GitHub Universe GitHub Actions have new security based on OpenID, along with the ability to create reusable workflows, while usage has nearly doubled year on year, according to presentations at the Universe event.

    The Actions service was previewed three years ago at Universe 2018, and made generally available a year later. It was a huge feature, building automation into the GitHub platform for the first time (though rival GitLab already offered DevOps automation).

    It require compute resources, called runners, which can be GitHub-hosted or self-hosted. Actions are commands that execute on runners. Jobs are a sequence of steps that can be Actions or shell commands. Workflows are a set of jobs which can run in parallel or sequentially, with dependencies. For example, that deployment cannot take place unless build and test is successful. Actions make it relatively easy to set up continuous integration or continuous delivery, particularly since they are cloud-hosted and even a free plan offers 2,000 automation minutes per month, and more than that for public repositories.

    Continue reading
  • REvil gang member identified living luxury lifestyle in Russia, says German media

    Die Zeit: He's got a Beemer, a Bitcoin watch and a swimming pool

    German news outlets claim to have identified a member of the infamous REvil ransomware gang – who reportedly lives the life of Riley off his ill-gotten gains.

    The gang member, nicknamed Nikolay K by Die Zeit newspaper and the Bayerische Rundfunk radio station, reportedly owns a €70,000 watch with a Bitcoin address engraved on its face and rents yachts for €1,300 a day whenever he goes on holiday.

    "He seems to prefer T-shirts from Gucci, luxurious BMW sportscars and large sunglasses," reported Die Zeit, which partly identified him through social media videos posted by his wife.

    Continue reading

Biting the hand that feeds IT © 1998–2021