The hospitals affected were unable to access the records for blood stocks, so had to make an emergency appeal for O -ive donors to donated asap. This was serious.
@totallyoriginal69346 ай бұрын
it's concerning that people find it in any volume interesting, fun, or important to hijack hospitals with ransomware.
@ZzzZzz-yd2je6 ай бұрын
They want money ?
@wfwfwffw6 ай бұрын
@@ZzzZzz-yd2je yes but that is a very concerning way to do it, i mean imagine probably killing a few people just for some money, what a scummy and sad way to do it.
@Slavolko6 ай бұрын
@@ZzzZzz-yd2je Exactly. Same reason governments send their people to die in wars: more resources.
@carloscueto75616 ай бұрын
@@wfwfwffw I mean, whoever does this in the first place isn't exactly ethical to begin with. It's not that surprising.
@instinctmlbb7576 ай бұрын
Yeah these new gens are wild, I don’t think they will get respect in their own community for doing this shit.
@rjjeffreys6 ай бұрын
Congrats on the 500K subscribers. It is well deserved and earned.
@Wahinies6 ай бұрын
Hear hear
@Aloha_XERO6 ай бұрын
Yeah I can confirm that this attack wasn’t just in the UK, but this attack happened also to hospitals in Sweden
@fernandohg2256 ай бұрын
Hospitals need to have physical information along side the digital, they cant rely on systems/networks. Theres need to have a backup for these types of cases.
@NetrunnerAT6 ай бұрын
This isnt possible now a days. I Work in the Radiotherapie. It is Impossible to Store a hole patien Data on paper. The importend parts are stored in paper, But its a small part of the Medical importend History.
@davidc50276 ай бұрын
Looking forward to seeing your testing with all major AV/EDR vendors. Crowdstrike is the leader these days, so looking forward to seeing the results from that solution.
@IPendragonI6 ай бұрын
I'd argue SentinelOne is close. However, I think he mostly focuses on private AVs specifically Kaspersky cause he's paid by them
@davidc50276 ай бұрын
@@IPendragonI in 2023/2024, the top 3 are Crowdstrike, MS, and SentinelOne. I would venture to say any of the leaders are going to close, so definitely agree.
@marcusaurelius34876 ай бұрын
*cough* *cough* SElinux *cough* *cough*
@Rogue0DK6 ай бұрын
Great video as always. I have to say though that after the latest MalwareBytes update I have been bombarded with popups from it. A video to disable those would be nice, as I had to dig around quite a bit to kill them. I dont like needless pop up messages .
@gir489returns26 ай бұрын
I haven't done pen testing in almost 20 years, because I pivoted to becoming a programmer instead. But why don't you just hook and check if each application is trying to poll all files on the disk, and then see if they are trying to read in specific files like TXT, PDF, etc. Surely it can't be too hard to heuristically determine cryptolockers.
@svettnabb6 ай бұрын
Many if not most EPP vendors do, but often they disable/bypass the endpoint protection before encrypting.
@32bitintiger9996 ай бұрын
I would guess the developers of the ransomware would try this and implement their own, different system.
@sandmanmoderngamer83226 ай бұрын
For ransomware protection, integrity monitoring-based rules can be highly effective. For example, a robust integrity monitoring service can revert changes made to critical systems. By setting a rule that triggers when more than 100 files are modified at once and is classified as sensitive, the system can automatically revert those 100 files and lock down the endpoint for investigation. Simple rules like this can significantly enhance.
@chrisosborne47316 ай бұрын
I'm well outside my knowledge so take this as you will, but malware and security are at an arms race with each other. You can design security for heuristic checking of that behavior, but malware authors will then build their malware to either circumvent the security or they will attack the security directly before executing their payload. At 2:58, this malware disables services before encrypting the files. I imagine this is done to weaken the system and make the malware more successful. So you're not wrong. I wouldn't be surprised if some antimalware tools already do this. But there is no "permanent" solution either. Malware authors will just work on a workaround, and then you have to defend against that. Endless cycle.
@sandmanmoderngamer83226 ай бұрын
Hello, Please be aware that, in most cases, software cannot disable the service of EDR solutions due to tamper protection and from reading the service that more of policy and data logs plus services. But it will not be able to target the edr.
@Kokomilenkoski12026 ай бұрын
Second. This sample also attacked Serbia
@nobody-m6f6 ай бұрын
which company in Serbia?
@Kokomilenkoski12026 ай бұрын
@@nobody-m6f EPS (Elektroprivreda Srbije) experienced the Qilin attack
@Kokomilenkoski12026 ай бұрын
@@nobody-m6f Elektroprivreda Srbije got attacked by the said sample
@nobody-m6f6 ай бұрын
@@Kokomilenkoski1202 ty for resposne
@MashLimit6 ай бұрын
It may not have impacted 'ER' as you put it, but: "In total, 1,134 elective surgeries have been postponed as a result of Qilin's attack on Synnovis, which began June 4, and 2,194 outpatient appointments have also been pushed back. The NHS's previous update from June 14, six days prior to its most recent one, stated that around 1,500 surgeries and appointments had been delayed. That was a combined figure, it should be noted, one that has more than doubled in less than a week." The real story here is why the hospital Disaster Recovery plans failed to operate. The reason for these systems failing so badly is that the two key NHS Trusts involved, used each other for their backup - but all used the same single service provider. Most of us would have recognised this potential problem early on. The good news is that many other NHS Trusts and their laborartory services were about to go down the same route - but are now recalualting the risks. Some good may come from this attack.
@sandmanmoderngamer83226 ай бұрын
In my opinion, the security issue lies in the lack of adequate data integrity monitoring and systems based on data classification.
@wolfbrave48666 ай бұрын
So if the data is in a DVD Disk there is zero chance to encrypt the data xD
@anonuser2606 ай бұрын
If you rewrite this virus a little bit then you can do it easily but let's be real, no one uses DVD Disk anymore
@filipstamate15646 ай бұрын
@@anonuser260 Yeah? How will you rewrite it to modify the files on a read only disc?
@Wildcard656 ай бұрын
@@filipstamate1564By hijacking the kernel and overriding the read and write procedures. Write encrypted data to the CD on the first write and encrypt the data during the read process if not already encrypted. Buy lets be real, who thinks a CD-R is more cost effective than CD-RW for data that has to change.
@EgonSorensen6 ай бұрын
@@filipstamate1564 scramble the output when a file is opened/read
@RaytechHack6 ай бұрын
Yes
@ritajain24536 ай бұрын
Thanks for the valuable information.
@factswithlouis6 ай бұрын
thanks for another film❤
@psx2576 ай бұрын
Brilliant video. Looking forward to the new Cyber content.
@niazmehedi6 ай бұрын
Can you do a review for the ransomware that took down Change Healthcare in the US?
@adriantarver22296 ай бұрын
For the rest of you that don't have any remediation against the London threats, CrowdSec CTI is offering a completely free list of 5k+ ipv4s to block threats like this one.
@ۥۥ0ۥۥ6 ай бұрын
*From a ransomware attack to canceled cancer surgeries. This is beyond messed up...* Edit: Didn't effect emergency services?
@NetrunnerAT6 ай бұрын
Depends on ... are diagonstic systems also infected. Example Work CT scan and Radiodiagnostic record system? If yes "stroke unit" are realy in Trouble. Siemens make a good Job in secure there applience. To prevent infection.
@TheLegitAlpha6 ай бұрын
Malware targeting Linux it’s not something you see every day, But it is definitely something worth investigating. I would suspect the build to target linux users comes from the fact that healthcare is a common user for Linux installations, so the threat is there.
@Rajorsi6 ай бұрын
Is it actually called as killin or chillin instead?
@stevebabiak69976 ай бұрын
I think so, in Chinese that Q is pronounced similarly to how “ch” would be pronounced in English
@bijoychandraroy6 ай бұрын
this is unforgivable
@LeonEdwinsHeart6 ай бұрын
Very interesting, and thank you for explaining
@aussiegruber866 ай бұрын
Can you do some videos on encryption and testing different options? And actually testing it if possible?
@LAZER500SW6 ай бұрын
What about Black Basta? have you made a video yet?
@adairjanney71096 ай бұрын
What should I watch out for more in terms of ransomware I have all of my users well educated on not running stuff and phising, but what can I do otherwise is there anything ransomware is what worries me the most
@EmzyWoo-km6gxАй бұрын
How can I get the builder I want to test it too
@andrewortiz80446 ай бұрын
Could you test the new version of malwarebytes?
@johnbear1006 ай бұрын
Thanks for another interesting insight into the world of low life Scammers and Hackers
@MarcinGorski9176 ай бұрын
Give IOCs not just onky link to AV vendor.
@btarg16 ай бұрын
I'm embarrassed that someone working in my country's healthcare system will run an exe on an NHS computer. Why are there no rules that prevent them from doing that physically on their systems?
@settler86166 ай бұрын
Even the health care workers are well trained. There's always a chance a Chinese spy infiltrate to run "Qilin"
@Brodzik-kz8nt6 ай бұрын
Evaluating different security vendors, if they can handle different ransomware strains, that's good research paper material.
@monkaSisLife6 ай бұрын
Software used for Critical Infrastructure should be open source you will not change my mind.
@castoh6 ай бұрын
Would you kindly do a linux illustration on the same.
@Alex359836 ай бұрын
Please do an extensive and deep dive reverse engineering video about this Malware. Get as much technical as possible ! Thanks for the video !
@pHIEU-m2f6 ай бұрын
Does Nomoreransomware have tool to decrypt it ?
@michaelol6 ай бұрын
Does this type of thing bypass Bitdefenders Ransomware Remediation?
@bird2718286 ай бұрын
What is the source code for this ransomware? Knowing this helps to prevent it from running.
@12345BoomerSooner6 ай бұрын
The CDK outage in the US has been big.
@HarpreetSingh10256 ай бұрын
Anyway to decrypt the effected files ?
@RaytechHack6 ай бұрын
Yes
@lolononojay90106 ай бұрын
But how do they actually get them to run their ransomware?
@DeBergeracs-s1n6 ай бұрын
? Would allowing private citizens to have and encrypt their own systems would that solve this problem?
@Chaooo6 ай бұрын
I'm not sure what being a private citizen has to do with anything, but if you encrypt your data prior to the ransomware affecting the machine, then you will at least be safe from the threat of the ransomware group selling the data. It does not, however, protect you from the denial-of-service attack that inevitably occurs, and will not prevent destruction of data. So, you can solve 1 problem, but the other 2 problems still remain. The problem with performing encryption - especially in real-time, and/or if there are numerous changes that happen constantly (like in a database), and/or if you are working with very large filesizes (at least in the gigabyte range and above) - is that it is extremely expensive in terms of processing power, it's slow to encrypt a large amount of files, and decryption takes even longer. Imagine working with a shared Excel sheet that multiple users are interacting with. It's not impossible to encrypt something like that in real-time (BitLocker is a popular service by Microsoft, for example), but the amount of problems it can/would cause makes it infeasible.
@NikNukem6 ай бұрын
Missing the Analysis
@finnderp99776 ай бұрын
To disable services this would need to be run with admin priviledges? It would be most basic thing to do drop admin priviledges from daily driver accounts but same time apparently impossible.
@antonk.6536 ай бұрын
It is just so much more convenient to have admin accounts - and some always sneak in somewhere by someone. So one senior doctor may have acquired admin priviledges by being friends with the IT staff, and therefore just runs all computers in the doctor's offices on his floor with admin priviledges, because it's so much more convenient. One other ignorant employee just needs to click on the wrong phishing e-mail and it's done. So yeah, virtually impossible to have no admin priviledges anywhere.
@ctrlaltdude6 ай бұрын
@@antonk.653 If you still have users (and IT admins) with admin rights on their normal accounts and no seperate accounts for admin rights, you are still living in the middel ages. It's really not done anymore.
@antonk.6536 ай бұрын
@@ctrlaltdude If you knew how much middle ages you still encounter on a regular basis!
@tech.curiosity6 ай бұрын
Will such a thread work if the drive is encrypted like in upcoming windows 11 version ? Attacking hospitals is a serious problem for attackers cz if somebody dies because of that, they will be screwed. Thanks for the video.
@noiprocsZ6 ай бұрын
it will encrypt over already encrypted ones
@crestheproducer4 ай бұрын
@proteckdiamond resolveu o problema do ransomware pel primeira vez em l.G
@OneElkCrew6 ай бұрын
RaaS works like a business, malware is cross-platform. Truly we live in a future.
@peterwassmuth40146 ай бұрын
Awesome Thank you for Sharing 💯✴
@ali1994726 ай бұрын
Great video ❤
@Turco9496 ай бұрын
Whoever is behind this, is not a normal hacker, a very sick individual to target hospitals. I don't believe the hacker community would be supporting or enjoying anything like this.
@djthashock6 ай бұрын
What is Better?? Malwarebytes or Windows Defender
@A42yearoldARAB6 ай бұрын
Can you talk about Kaspersky being banned? This is not good one of the best products out there.
@IPendragonI6 ай бұрын
He's paid by them, so he can't. I've been asking for months for him to talk about it
@ArthurRamirezJ6 ай бұрын
Can you try this against ELK?
@bitanchowdhury40286 ай бұрын
My friend What do you mean by ELK ?
@CloudyBogdan6 ай бұрын
Password: DONKEY xD I bet Gordon Ramsay is a secret criminal haha
@Graham64106 ай бұрын
Wouldn't be surprised if the virus could be sitting on more hard drives in a hospital just waiting to be activated.
@guilherme50946 ай бұрын
Thanks.
@matrixmunitions6 ай бұрын
MSPs are awful, they need to have standards.
@74Gee6 ай бұрын
Analyzing?
@024686 ай бұрын
Can you talk about the one that just hit all the CDK POS that car dealers are using?
@Darkk69696 ай бұрын
System and network isolation is the key of protecting critical systems. Normal users should never have direct access to those systems.
@triangle31136 ай бұрын
Is there an antivirus that does NOT include a VPN in it but still the full package?
@enpassantcheckmate6 ай бұрын
bitdefender
@GBR97946 ай бұрын
@@enpassantcheckmate nope, mine installed vpn on its own lmao
@TeenPerspektiva6 ай бұрын
Pretty random request lol. You dont need to use the av vpn
@enpassantcheckmate6 ай бұрын
@@GBR9794 I think you need the antivirus plus one and not total security package
@jakeblue6636 ай бұрын
It is probably carelessness or even working foul play that allowed access
@exitar16 ай бұрын
News flash Kaspersky banned in the United States 😮
@IamLookingforWoody_________7866 ай бұрын
Hi
@JorgeLopez-qj8pu6 ай бұрын
Bye 👋
@miltonthecat22406 ай бұрын
I enjoy this channel, but most of it goes over my head. This is probably too simplistic, but if paying the ransom were made illegal, wouldn't most of it stop? Isn't paying the ransom just financing the victimization of others? It seems immoral to pay the ransom. A couple of probably dumb questions about malwarebytes. How do I know that malwarebytes, or any similar program, isn't itself malware? It looks like malware bytes is targeted at people who know more about software and computers than I do; is that the case?
@ohlordvoldy6 ай бұрын
You are the GOAT 🫡
@marcusaurelius34876 ай бұрын
*cough* *cough* SElinux *cough* *cough*
@wannabedal-adx4586 ай бұрын
But I thought Apple's and Macbook's were immune to malware??!?!?! 🤣😋
@neloangelo__136 ай бұрын
ARM is just a CPU architecture, it's not Apple exclusive. You'll see more and more Windows laptops running ARM CPU these days. No one ever claimed Mac is immune to malware, they have a very small market share, so the criminals logically just focus on the bigger slice of the pie - workstations and servers of organisations running Windows.
@wannabedal-adx4586 ай бұрын
@@neloangelo__13 Yeah I know about the ARM architecture. My sarcastic comment was not directed at ARM chips but at Leo's comment that even Apple's we susceptible to malware and hacking. And there are ABSOLUTELY Apple fanboys out there that have said Apple's were immune to hacking for decades! That is what I was making fun of! Thanks.
@Your-Senpai6 ай бұрын
Wait what, malwarebytes has a dark mode? I no longer have to FRY my eyes every time I scan a selected folder, yay
@ТоварищКамрадовСоциалистКоммун6 ай бұрын
There is a long story about speculations how linux is not immune, just like any other OS. 1. yes, linux is not immune 2. linux may have some vulnerabilities, just like any other OS. The difference: in linux it's less likely to find any in stable distros, and more likely to find in some rolling/unstable. 3. The viruses are not typical for linux. viruses are typical for windows ) 4. Malware can be tailored for any OS, and it's more about a social engineering. It's just like lure someone into a trap
@WesleySmith-q9c6 ай бұрын
I got first, that's what's up! I love the videos man keep it up! PS I know ow you like MWB and have done videos on it. Could you do one on malwarebytes threatdown.
@fbiagentmiyakohoshino82236 ай бұрын
now those brits gotta wait another 60 months for their treatment
@v7lima6 ай бұрын
Could you analyze the free Steam games "Egg", "Banana", "Cats" and "Banana & Cucumber", to check whether they run anything malicious or mine crypto in the background? These games are extremely popular at the moment and I'm sure a video about them would bring even more visibility to your channel. Love your videos!
@IamLookingforWoody_________7866 ай бұрын
Hacker are now getting devlish or evil for money😢😢😢.
@fndrsm6 ай бұрын
hmm indonesia is always be soft target. lol
@ethaniel866 ай бұрын
China hacker?
@davidhoward47156 ай бұрын
Russia hacker?
@RaytechHack6 ай бұрын
Yes
@meerkat58186 ай бұрын
R*ssians as usual
@Ausf.D.A.K.6 ай бұрын
I only trust Kaspersky to ro protect me online.
@rekire___6 ай бұрын
The taste of their food and the face of their women made British man the best sailor in the world
@iamwitchergeraltofrivia96706 ай бұрын
Fucking windows
@davidhoward47156 ай бұрын
You didn't bother to watch the video, did you?
@louf71786 ай бұрын
Please use some sort of transitions in your videos. Ramming sentences together makes it difficult to listen to.
@TeenPerspektiva6 ай бұрын
What are you talking about lol. What do you want him to do? I think he is very clear and easy to understand. And i have never seen someone complain with something like that before
@louf71786 ай бұрын
@@TeenPerspektiva Like it says, jamming edits together without a break between sentences. What to do? Use a break. And now you've seen someone complain about it.
@TeenPerspektiva6 ай бұрын
@@louf7178 well i havent been able to notice the problem you are trying to point out. I dont see this jamming of edits you are talking about. Seems decently paced to me..
@louf71786 ай бұрын
@@TeenPerspektiva 2:12 - 3:16 It got info-dense, and I was expecting the rest to be similar. It did get better after that. For people that are not fluently familiar with the content, it gets to be too much.
@TeenPerspektiva6 ай бұрын
@@louf7178 i see. Thats fair enough
@hotsauce24466 ай бұрын
So you're british? You dont sound it. Ugh.....
@axelbruv5 ай бұрын
Did you stub your toe at the end of that sentence?