Why Was the WannaCry Attack Such a Big Deal?

  Рет қаралды 925,301

SciShow

SciShow

Күн бұрын

On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
Hosted by: Hank Green
----------
Support SciShow by becoming a patron on Patreon: / scishow
----------
Dooblydoo thanks go to the following Patreon supporters-we couldn't make SciShow without them! Shout out to Kevin, Bealer, Mark Terrio-Cameron, KatieMarie Magnone, Patrick Merrithew, Charles Southerland, Fatima Iqbal, Sultan Alkhulaifi, Tim Curwick, Scott Satovsky Jr, Philippe von Bergen, Bella Nash, Bryce Daifuku, Chris Peters, Patrick D. Ashmore, Piya Shedden, Charles George
----------
Looking for SciShow elsewhere on the internet?
Facebook: / scishow
Twitter: / scishow
Tumblr: / scishow
Instagram: / thescishow
----------
Sources:
www.cnet.com/n...
www.npr.org/sec...
www.cnet.com/n...
www.symantec.c...
technet.micros...
www.wired.com/...
arstechnica.co...
money.cnn.com/2...
www.elliptic.c...
www.ft.com/con...
www.bbc.com/new...
www.theverge.c...
www.wired.com/...

Пікірлер: 1 500
@AnotherGenericGamingChannel
@AnotherGenericGamingChannel 7 жыл бұрын
The guy who stopped it wasn't anonymous for long. He tweeted about how tabloids doxed his friends and blackmailed them to get his address, phone number etc. He said it was the worst experience of his life
@CrispyChicken44
@CrispyChicken44 7 жыл бұрын
Jebus Gaming Journalism at it's finest.
@idkidk8884
@idkidk8884 6 жыл бұрын
Do you know his twitter?
@alexisleftist778
@alexisleftist778 6 жыл бұрын
Tabloid owners and journalists should be shot lol
@jerm8319
@jerm8319 4 жыл бұрын
Justin Craig I know this is hella late but doxing someone means to release someone’s personal information without their consent
@Cherry_Meatloaf
@Cherry_Meatloaf 3 жыл бұрын
@@idkidk8884 his name is Marcus Hutchins
@porteal8986
@porteal8986 7 жыл бұрын
adding that kill switch is like mad scientist putting a big self destruct button on a giant evil robot
@jerrycan1756
@jerrycan1756 7 жыл бұрын
It was supposed to make it harder to analyze, the idea being that in a quarantined machine, registering the domain within the quarantine would kill the sample. Unfortunately for the hacker, the guy analyzing it did not have his sample quarantined.
@furinick
@furinick 6 жыл бұрын
And the button is in its foot
@bentton7311
@bentton7311 6 жыл бұрын
phineas and ferb anyone?
@transfemcatgirl
@transfemcatgirl 6 жыл бұрын
god dammit I was going to make a comment on that phineas and ferb reference but you people beat me to it :U
@baulvicork5199
@baulvicork5199 3 жыл бұрын
Doofinshmertiz
@Imbedersup
@Imbedersup 7 жыл бұрын
"Cyber-security whack-a-mole." Made my night.
@n124lp
@n124lp 7 жыл бұрын
There are many ways in which cybersecurity is a game of Whack-a-Mole.
@watsoncole8908
@watsoncole8908 7 жыл бұрын
823 likes WOW!
@playinetgames
@playinetgames 6 жыл бұрын
You'd be surprised how often that sort of thing pops up in computer science as a whole.
@sampletext8036
@sampletext8036 6 жыл бұрын
Shadow *BROKERS* Definitely not English speaking.. so maybe Russian.
@Kribyking
@Kribyking 6 жыл бұрын
kill-a-viris
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
Can we discuss for a moment that our hero was doxed by british tabloids? Real shitty way to treat someone who prevented extreme infrastructure damages.
@naskoBG26
@naskoBG26 7 жыл бұрын
Anyone that cared about the anonymous guy's identity could've looked up who's the owner of the domain... Yeah it's shitty they didn't respect his wish. But it's not like it was that hard to find his identity either, since it was basically public.
@Bird_Dog00
@Bird_Dog00 7 жыл бұрын
That surprises you? News media - and tabloids in particular - would sell their own mother for a few readers more. Though the public isn't blameless. For years - or even decades, "serious" news outletts have strugled to make a buck with waining subscriptions. The level of journalism has droped as readers flock to "free" ad-based formats that use click-bait sensationalism to generate traffic. The reasons for this development are many and complex, so I won't go further into detail (hell, I think I could make a plausible argument for how the modern economy - and the industry in particular - is in part to be blamed for this).
@nursejennyk40
@nursejennyk40 7 жыл бұрын
Bird_Dog it can be dumbed down to Subscription news- accurate but directly costs users Ad based- grumpy little chucks who will do anything for views
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
They didn't "Just look him up", they blackmailed several people he was familiar with to get all the information they could on him.
@perfildeLalo
@perfildeLalo 7 жыл бұрын
Whether you can find it easily or not doesn't mean it's alright to write an article and publish it for all to see.
@baconpopcorn2565
@baconpopcorn2565 7 жыл бұрын
Microsoft should have said in the update "NSA did a goof, now there's a gaping hole in your security and this update fixes it."
@addust
@addust 5 жыл бұрын
Agreed.
@HyperTextMarkupLanguage-HTML
@HyperTextMarkupLanguage-HTML 3 жыл бұрын
Or just made it force you to update.
@Kajayacht
@Kajayacht 5 жыл бұрын
I remember when WannaCry hit, I was doing contracted dev work for Telefonica, and they were a real pain to deal with. Got the week off work, 10/10 would recommend.
@pcption
@pcption 3 жыл бұрын
love this.
@cosmicjenny4508
@cosmicjenny4508 7 жыл бұрын
"What operating system does it use?" "It's... erm... Vista!" "WE'RE GOING TO DIE!"
@soultransmuter8166
@soultransmuter8166 4 жыл бұрын
It crowd?
@dolphinyoin9219
@dolphinyoin9219 4 жыл бұрын
Yessir
@ShamelessJack
@ShamelessJack 7 жыл бұрын
Seems obvious to me that NSA should pay for this, and then some. Teach them to snoop around.
@childeater7327
@childeater7327 7 жыл бұрын
Shameless Jack snooping kind of is the nsas job
@Kr4zYm0f0
@Kr4zYm0f0 6 жыл бұрын
USA should pay for it.
@phunkyphresh3799
@phunkyphresh3799 6 жыл бұрын
Should the DoD pay for any damages from Chinese and other militaries that are able to copy or make use of US designs? Or should we stop building to air crafts? Every other country gets advantages of snooping on other countries. Unless you want to cripple our military, empower enemies who still use spies, etc. the NSA should be allowed to keep looking into technical weaknesses to exploit. Because if you're willing to shoot artillery shells at our enemies and potentially have guns fall into hands of our enemies, why not allow our military to use cyber weapons? Otherwise, just ban the use of m16's then because they'll fall into the hands of bad guys too much.
@ghost_ship_supreme
@ghost_ship_supreme 6 жыл бұрын
I think I we should have the hackers heads on a stick, they're the ones who remade it into a virus.
@bulletl187
@bulletl187 6 жыл бұрын
Why should they pay for it? If you see a gun on the street and you don’t take/use it, would it be your fault? No could you prevent it? Yes! Do you have to? No, you owe nobody something
@Blabla130
@Blabla130 7 жыл бұрын
Here's the thing though, when software companies consistently release patches or updates that make the software worse for end users, like adding more advertising, placing additional restrictions, changing UI, or generaly pushing unwanted "features" (I'm looking at you, Skype), I can't say I totally blame people for being reluctant to update.
@Charmlethehedgehog
@Charmlethehedgehog 7 жыл бұрын
"This is like SKYPE, every time they fix something, SOMETHING ELSE BREAKS!" -Kiandymundi (I totally understand skype's gone down hill :/)
@Spartan0430
@Spartan0430 7 жыл бұрын
i remember a skype update that was so bad that it was just using up 90% of my CPU for no reason.
@sirBrouwer
@sirBrouwer 7 жыл бұрын
Blabla130 then advice companies to use Unix software i use ubuntu and for all the years that I do i never had problems with any computer.
@DharmaJannyter
@DharmaJannyter 7 жыл бұрын
You can opt to install only security updates.
@mwbgaming28
@mwbgaming28 7 жыл бұрын
Blabla130 especially the old trick with Microsoft hiding a windows 10 pop-up ad generator in a windows 7 security update and they lied about it until someone showed a demonstration on KZbin and posted it to Microsoft's forums
@the11382
@the11382 7 жыл бұрын
"Having a kill switch is an amateur mistake": Viruses are usually things you have no control over, releasing a virus is a risk for your own computer as well.
@wlfshertz4362
@wlfshertz4362 7 жыл бұрын
Just want to say this....Love you scishow :)
@mimsie496
@mimsie496 7 жыл бұрын
Sara Huang army!
@bassamn4276
@bassamn4276 7 жыл бұрын
Lesson learned: always update your OS and if you're using XP this was a harsh lesson :) I bet Microsoft is going to make more money than the "Hackers" by selling a lot of Windows 10
@vybezD
@vybezD 7 жыл бұрын
Bassam N plot twist: Microsoft was behind it all along.
@dylantruong897
@dylantruong897 7 жыл бұрын
John too.
@spartan99947
@spartan99947 7 жыл бұрын
Microsoft released a patch on march so they are definitely not behind it
@lancester8634
@lancester8634 7 жыл бұрын
Or, was it Microsoft saying "Hey, Update or else!!!"
@RKthehedgehog
@RKthehedgehog 6 жыл бұрын
Boberdown Annon Also, "internet files that decrypt as long as you haven't reboot". Not only does that sounds suspicious but also completely useless because WannaCry encrypted files are 100% unrecoverable and you MUST reboot in order to activate Safe Mode to remove WannaCry.
@Llama-cx3np
@Llama-cx3np 6 жыл бұрын
Subaru? Do you work for Microsoft you seem to know alot about computers
@universenerdd
@universenerdd 4 жыл бұрын
@@RKthehedgehog no, the encryption keys are stored in memory, they fetch that from memory and rely on the fact that it is still there, you don't know what your talking about
@gamerhurley
@gamerhurley 3 жыл бұрын
@@universenerdd we have the same pfp what a chance
@thorerik
@thorerik 7 жыл бұрын
XP wasn't among the infected computers, the only confirmed infections of XP was researchers infecting it by hand. Windows 7 was the main infected OS. As for the "kill switch" it's most likely a sandbox detection thing, not a killswitch, but it was badly implemented.
@bitcores
@bitcores 7 жыл бұрын
The killswitch exists because in a lot of virtual machines unregistered domain names will return an IP address (and unused local network IP address) so it is used as a method of detecting if the malware has infected a VM system, which is usually not worth encrypting for ransom.
@TylerMatthewHarris
@TylerMatthewHarris 7 жыл бұрын
the vast majority of affected users were using Windows 7
@PistonAvatarGuy
@PistonAvatarGuy 7 жыл бұрын
Windows is nothing but spyware, the NSA is massively ineffective, and now they're actually creating security risks. This is what having a bloated military budget does for you.
@rjfaber1991
@rjfaber1991 7 жыл бұрын
Yes, unpatched Windows 7.
@ag4ve
@ag4ve 7 жыл бұрын
Correct - I've heard multiple people say (fb friends who do IR) that it's hard to get xp infected before it crashes.
@ag4ve
@ag4ve 7 жыл бұрын
I really think (a week after the attack) something this simple should've been caught pretty early in the writing process.
@bdorsey19
@bdorsey19 3 жыл бұрын
Glad I stopped using it lol
@pies765
@pies765 7 жыл бұрын
This has already probably been said, but the prevailing theory on why the kill switch domain was in the code was to make it harder for people to analyse the virus. A general practice in malware analysis is to put the virus in an environment where it cannot do much harm or get out. These environments also usually just respond to any requests the program makes with fake data, so it thinks it is getting out but it is not. The kill switch worked by the thought that if it gets anything back from the fake website, it must be due to it being studied. Obviously this did not work as planned, but that at least says what they wanted to do.
@jaykoerner
@jaykoerner 7 жыл бұрын
Ryaji-San thats the therory, the thing is the best practice for that is for the malware to generate a completely random url(a random string of characters has almost no chance of being used), the environment that the malware is trying to figure out if it is specifically is a virtual machine, the reason being is that it is much easier to study and view what it does, get memory snapshots ect... one of the common things vm's do is reply that a domain is registered when it isn't since its just forwarding agent to the real computer, other common practices for finding out if you are in a vm or protecting from study is if the cpu is less then or equal to 2 and stop running or just armoring the malware, using memory obfuscation, code obfuscation, messing with the memory table so that memory snapshots can not be analyzed, the list goes on....
@wolfegalvin1685
@wolfegalvin1685 7 жыл бұрын
or maybe they have a killswitch just so that it can be stopped incase things really got outa hand.
@pies765
@pies765 7 жыл бұрын
Wolfe Galvin I mean, I don't see how it could get out of hand, it's purpose is to spread as much as possible. So getting huge and fast is kind of the point.
@jaykoerner
@jaykoerner 7 жыл бұрын
Wolfe Galvin it can't be known if thats why, but if so they would normally use C&C servers to do such things, you are already breaking the law and blackmailing people, why would you care
@jaykoerner
@jaykoerner 7 жыл бұрын
Ryaji-San yep, thats basically the point of this stuff, and if they wanted to stop it or update the malware they would just send patches from the command and control server like most malware does
@RandallStephens397
@RandallStephens397 7 жыл бұрын
I love the portrayal of the ransom payment system here--it assumes the hacker actually intended to restore anyone's files after they paid.
@theVoluminousPoo
@theVoluminousPoo 7 жыл бұрын
Randall Stephens Hence the part where he mentioned there was no reliable way to get files back to those ransomed and many infected that paid did not see restoration.
@rjfaber1991
@rjfaber1991 7 жыл бұрын
True, but that's not such an odd assumption; past ransomware attacks typically have resulted in people's files getting decrypted upon payment. Why the hackers bothered is frankly beyond me, but it does make the fact they didn't bother with WannaCry at least slightly notable.
@LeezShadowbringer
@LeezShadowbringer 7 жыл бұрын
Robert Faber probably to give people a reason to actually pay up
@antalz
@antalz 7 жыл бұрын
Becaise they might consider making more ransomware. If you don't provide decryption your first hit will also be your last.
@oskarjankowski5709
@oskarjankowski5709 7 жыл бұрын
what I was gonna say
@hatty7090
@hatty7090 7 жыл бұрын
And I just clicked "later" on an update as this video was starting 😂
@SheosMan117
@SheosMan117 7 жыл бұрын
Wait, Shadow Brokers? You mean, Mass Effect's most infamous information trader is real?
@screamsofthedead
@screamsofthedead 7 жыл бұрын
They wish they were that cool.
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
Well, they serve a very important purpose. I think they're much cooler than fictional orginazations if they're doing the same things IRL.
@unclevivid9028
@unclevivid9028 7 жыл бұрын
SheosMan117 information trading is one of the oldest and most lucrative business to ever exist. And shadow broker is a cool af name but also kind of teenage edgy
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
DEEPKNOWERS DARKSEERS NIGHTSNOOPERS
@cpob2013
@cpob2013 7 жыл бұрын
well, it IS just a title passed down
@muneebmuzammal3987
@muneebmuzammal3987 3 жыл бұрын
Watched many videos on the WannaCry attack but this one is the best and concise video available on the whole youtube!
@sleepydrifter4667
@sleepydrifter4667 7 жыл бұрын
seems like wanna cry was a distraction, but could've been something a lot more... troublesome.
@almerakbar
@almerakbar 7 жыл бұрын
Sleepy Drifter A distraction from what though?
@PistonAvatarGuy
@PistonAvatarGuy 7 жыл бұрын
I doubt it, it should be a wake up call to everyone. People need to realize that the NSA isn't making them safer, it's putting them at risk.
@ThreadBomb
@ThreadBomb 7 жыл бұрын
EternalRocks looks to be harmless. www.bleepingcomputer.com/news/security/author-of-eternalrocks-smb-worm-calls-it-quits-after-intense-media-coverage
@Wielkimati
@Wielkimati 7 жыл бұрын
Heh, this incident only shows that something simillar may be happening right now. And we don't know it yet.
@pokefreak3
@pokefreak3 7 жыл бұрын
Shadow brokers? Didn't know we were in Mass Effect 2.
@beojack4592
@beojack4592 7 жыл бұрын
I'm 25th! I'm so happy I wannacry edit: by 25th I meant 25th comment btw but I appreciate the birthday well wishes. I'll try to remember them when I turn 25.
@willynebula6193
@willynebula6193 7 жыл бұрын
BeoJack 👏
@doryyonder1533
@doryyonder1533 7 жыл бұрын
BeoJack kk
@pristineinferno
@pristineinferno 7 жыл бұрын
BeoJack happy birthday 🎂
@conf1rmed819
@conf1rmed819 7 жыл бұрын
BeoJack I get that joke
@Matt_10203
@Matt_10203 7 жыл бұрын
[iX]smasher Well then, you must be smart.
@shrimpbisque
@shrimpbisque 6 жыл бұрын
Thank you, SciShow, for reminding me to update my backups. I'll have to get on that tomorrow.
@dashie6498
@dashie6498 3 жыл бұрын
did you update them yet?
@mukulsharma5738
@mukulsharma5738 3 жыл бұрын
did you do it ?? we would like to know !!
@Master_Ed
@Master_Ed 4 жыл бұрын
To be honest, the only reason I don't update is because sometimes new things are added and maybe new filters on the screen or something is added which I don't want and can't remove. So updating to protect myself from a virus is not worth it if my computer is going to be near unusable in the first place.
@raquelames6262
@raquelames6262 7 жыл бұрын
A small hospital near me had to pay the ransom (something like $40,000 USD) because they had no backups they had no choice but to pay
@mwbgaming28
@mwbgaming28 7 жыл бұрын
I wouldn't mind updating if Microsoft didn't hide windows 10 ad generators or spyware programs in the updates
@mwbgaming28
@mwbgaming28 7 жыл бұрын
my windows 7 PC has a windows 10 ad generator that snuck in with a security update my laptop with windows 10 is full of microsoft spyware because i wont pay $900 for the enterprise version why does the enterprise version of wndows 10 have no ads, no spyware and being able to set updates to manual installation but the home and pro version are both loaded with spyware and ads in addition to the auto restart to install updates (even if you are using the computer)
@Kaihlik
@Kaihlik 7 жыл бұрын
I was reading on Ars Technica that Xp wasn't an infection vector for the attack because in XP the attack on the SMB caused the system to crash before the files could be encrypted. This overwhelmingly affected windows 7. 10 was never vulnerable to the SMB issue afaik.
@jfdd43
@jfdd43 7 жыл бұрын
The kill switch system makes sense. They can set up a their local networks to lead to a 'intranet' page whenever that URL is entered from within it. They might have been scared of accidentally infecting themself
@saidag
@saidag 7 жыл бұрын
I always update and backup almost everything I have on my PC. Gotta keep my memes safe!
@csbluechip
@csbluechip 7 жыл бұрын
it is well known why the "kill switch" existed - for vm detection ...and the hackers made $0 from the attack because the bitcions are NOT anonymous
@Town159
@Town159 7 жыл бұрын
The hospital I work in didn't get infected as we use Windows 7 but we shut everything down as a precaution, that caused chaos as we're one of a few NHS trusts to be completely electronic. The hospital I worked in last year got infected as they use operating systems/programs from the late 80's/early 90's in some instances!
@sent4dc
@sent4dc 7 жыл бұрын
It was actually not entirely true. The number of Windows XP computers affected by WCry was very very low. It would simply BSOD on them. The bulk of affected computers were running Windows 7 x64 bit.
@cliffsidekiller
@cliffsidekiller 7 жыл бұрын
For anyone wondering, the suspected reason for the inclusion of a killswitch was an attempt to delay people trying to crack Wannacry's code. From what I have read, when the virus is loaded into a simulator, the gibberish URL would read as registered and then immediately pull out of that system so that the virus could not be "tested". However, since they hardcoded the URL, it was much simpler to just register that URL so that it would keep pulling out of any system it infects.
@Brodym2433
@Brodym2433 7 жыл бұрын
thx for another gr8 vid john green
@aaronsilvera177
@aaronsilvera177 6 жыл бұрын
You mean hank green?
@cottoncandytory5928
@cottoncandytory5928 6 жыл бұрын
aaron silvera thats the joke
@LeoMRogers
@LeoMRogers 7 жыл бұрын
The kill switch was probably a way for the malware to detect if it was being studied in a lab. This is quite common, malware writers often try to make it so that their malware will behave differently when it is being studied (ie, debugging software, virtual machines etc).
@ComputersRULE
@ComputersRULE 7 жыл бұрын
If the NSA used the exploit, then when it was leaked why didn't they use their resources and update all the machines vulnerable. It's a national agency, they do unconstitutional stuff all the time anyway.
@EvelynDayless
@EvelynDayless 7 жыл бұрын
NSA's job is to gather intelligence on foreign countries not make sure you're keeping your operating system up to date.
@ComputersRULE
@ComputersRULE 7 жыл бұрын
Because the government can't trust it's own citizens.
@EvelynDayless
@EvelynDayless 7 жыл бұрын
Without a warrant they generally don't look into your computer, even with a warrant that's the FBI's job usually. NSA is far more concerned about the computer traffic in Russia and the middle east and how to exploit North Korean nuclear test equipment/computers than they are about your porn collection.
@ComputersRULE
@ComputersRULE 7 жыл бұрын
Red Star Linux was a disaster, they probably have a foothold in that already.
@opsoc777
@opsoc777 7 жыл бұрын
I think you mean to say the citizens can't trust their own government. Munashiimaru, the nsa datamines anything they can get, without a warrant, cause they're never held accountable for it.
@icedragonair
@icedragonair 2 жыл бұрын
Mass overhauling an os for a large scale is actually incredibly difficult, because doing it all at once can often leave the whole system down and needing to replace large amounts of things all at once and it takes out the operations for way too long. If trying to do it in parts, the parts of the system are usually interconnected, so taking one part offline to change it basically wrecks anything adjacent that relies on it. We had this issue in a big store chain i worked at. Our inventory system was incredibly inefficient and relied solely on human knowledge. We carried a large array of things from just about everywhere, our inventory was different every single day. And i dont just mean season to season, we basically had no set inventory, think thrift store. So if you needed info on an item, you had to call someone who just knew roughly where it belonged to check the prices. People basically generally knew what types of things we carried and what the price was likely to be and how to estimate one if needed. You gained that knowledge simply by working there long enough to get a feel for how we did things. Obviously this was incredibly inefficient and reliant on competent workers. But to overhaul it would have meant changing absolutely everything. The way we sort, how we scan, all our equipment. It was possible to set it up as automatic for sure, but for an extremely busy store in a worldwide company the effort would have been enormous. Basically they decided that having an inefficient human powered system was still cheaper and less hassle than overhauling it. That's the thing, just because there is a better option, doesn't mean its actually more suited. If all you need is to work with word documents, using a supercomputer isnt actually more useful than an old beat lappy. Yeah, you could make dog leashes out of kevlar sting, but nylon is more than enough. In factories many processes could be done by robots, but they still hire just a ton of people to do rote repetitive tiny work, because, especially for smaller orders its STILL cheaper to just pay people to basically just be a biomechanical arm. Upgrading to win 10 when xp is already doing exactly what you need is a waste of time and resources. Unfortunately stuff like this pops up occasionally.
@LazerLord10
@LazerLord10 7 жыл бұрын
Lol, it seems like everyone forgets Win8. Still my favorite operating system. After a few slight mods, it runs way better than 7 or 10.
@alkaupadhyay7650
@alkaupadhyay7650 3 жыл бұрын
But why will you use windows on server?
@jesscorbin5981
@jesscorbin5981 3 жыл бұрын
What does Apple use for their servers?
@thesymbolism5623
@thesymbolism5623 3 жыл бұрын
WHAT ABOUT WIN 7?
@katykat5099
@katykat5099 7 жыл бұрын
I’m a computer gamer... Who just happened to not be on my computer for 80% of 2017. Including those days. Wow. Soooo lucky.
@Terminalss
@Terminalss 7 жыл бұрын
"Haha take that Windows" said apple looking for its lost 300 dollar earpods
@rakastettu2237
@rakastettu2237 3 жыл бұрын
I'm late to watching this video, but I just wanted to comment and say thank you for the explanation that was easy to understand. I don't know much about computers, but you explained this in a way that I could grasp.
@glorvalmacglorvas171
@glorvalmacglorvas171 7 жыл бұрын
Maybe this was a test?...
@BeesQuestionMarkk
@BeesQuestionMarkk 7 жыл бұрын
Glorval MacGlorvas Nah. Just a lucky hacker group in Russia that had no clue how to manage ransomware.
@albertzhang5699
@albertzhang5699 7 жыл бұрын
why purposely put in a kill switch though? Seems odd. Not that they forgot to remove a kill switch, they **put in** a kill switch
@glorvalmacglorvas171
@glorvalmacglorvas171 7 жыл бұрын
Exactly why I think it was a test, they wouldve included the kill switch to turn it off if it got out of hand.
@pauldeddens5349
@pauldeddens5349 7 жыл бұрын
wouldnt the test getting out of hand BE what they want?
@pies765
@pies765 7 жыл бұрын
The kill switch was a misguided attempt at slowing down analysis. The environments we use would respond to that request, so they used this to tip the program off to the fact that it was being studied.
@osotanuki3359
@osotanuki3359 7 жыл бұрын
I'm pretty sure I've only not heard of this because I don't use windows, one main reason is that it's just like "ok, time to update, I'm closing your stuff, bye, see ya in an hour or two!" And you can't stop it
@BazookaTooth707
@BazookaTooth707 7 жыл бұрын
We should be mad at the NSA
@QuinSkew
@QuinSkew 7 жыл бұрын
Who knew having my PC disconnected saved me from this ransomware
@Altherix
@Altherix 7 жыл бұрын
In MARCH, Microsoft released a patch. Vast majority of machines infected by WannaCry, were Windows 7 machines still supported by Microsoft. Why is it, people seem to think avoiding patches is a game? Every major computer outbreak in recent times it's the same story, a patch to fix the hole/bug/exploit was released months if not years before the major exploit of it. We've gotten to the point you can no longer blame the software, it's the space between the keyboard and the chair that's the problem. (The User) To the argument a patch breaking your software, I'd rather deal with a scheduled software break than an unscheduled software attack.
@jerrycan1756
@jerrycan1756 7 жыл бұрын
In all cybersecurity, the user is the weakest link that one has to work around. Remember that an entire political campaign for President of the United States was sunk by a virus that a 14-year-old could make because the user was technologically illiterate.
@DemonicDemon6
@DemonicDemon6 5 жыл бұрын
Wannacry was actually somewhat kind to people. They were like in 6 moths they will have an event where you can get your files back if your to poor to buy them back.
@vkillion
@vkillion 7 жыл бұрын
There are a few problems with this video. Windows 10 was never in danger. The exploit didn't exist on Windows 10. Also, a security patch (the first in 3 years) was released for Windows XP, despite being out of support. WannaCrypt affected Windows XP, 7, 8, and the related server versions, all of which have now received patches (assuming the update has been installed).
@vkillion
@vkillion 7 жыл бұрын
I see you listed the patch for XP later in the video, after saying there was no support for Windows XP earlier in the video. Oops.
@rapturas
@rapturas 7 жыл бұрын
I recently had an IT interview with the NHS, they assured me that it was impossible to hack their systems - I didn't get the job, but I came away laughing at them, not their patients who were the ones who really suffered.
@claytonharting9899
@claytonharting9899 7 жыл бұрын
Windows updates tend to break the OS. I'm never eager to update. EVER.
@Lotharies
@Lotharies 7 жыл бұрын
thank you for making this
@august-5085
@august-5085 7 жыл бұрын
shadow brokers? Mass Effect, anyone?
@mackysplace
@mackysplace 7 жыл бұрын
As Hank said, all the MRI machines and other such things needed specific software to run and upgrading would cost time and money and require re-calibrating which would've added long waiting times. And the Government didn't give enough funding to NHS IT departments which is so desperately needed.
@entropy616
@entropy616 7 жыл бұрын
Plot twist: SciShow launched the attack just to make this video.
@JarrodCoombes
@JarrodCoombes 7 жыл бұрын
Microsoft actually did release a patch for Windows XP to fix the SMB bug, which kind of surprised all of us in the IT field. But there was a bug in the WannaCry code that actually stopped it from being able to infect XP. Also the theory about the kill switch is that it was put there in order to help the Malware detect if it was in a sand box, which would mean a security researcher was testing it. Their mistake was to not just randomize the domain name it checks (ie random characters with a .com on the end).
@jacobcleveland1858
@jacobcleveland1858 7 жыл бұрын
they still havent released a patch for window 95 im pissed.
@Chidy398
@Chidy398 7 жыл бұрын
I think a lot if not most ppl don't realize most updates you get, java, windows, adobe, etc. are specifically to patch security holes.
@phantasm1234
@phantasm1234 7 жыл бұрын
Hey there, SciShow! I have a personal request for the topic of cerebral aneurysms! I experienced a rupture when I 19 and the suddenness and severity of them would make for a good informative video for the public! Thank you!
@alexdiviney1316
@alexdiviney1316 7 жыл бұрын
At my dad's hospital (he works in IT, and is married to an IG manager) they shut down all of the computers, so they couldn't be infected, but then they still couldn't access the data...
@kamrankazemi-far6420
@kamrankazemi-far6420 7 жыл бұрын
And this is a clear example of why businesses should update there systems.
@BurkeLCH
@BurkeLCH 7 жыл бұрын
Thanks for the upload
@tkzsfen
@tkzsfen 7 жыл бұрын
let me cleat something - in the industry nobody cares about the latest OS if it is practically the same and doesn't bring any benefit for the money paid. the lasers in our factory will forever run on XP, because there is no point in updating it. the software runs perfectly, so why bother?!
@darkmaster9607
@darkmaster9607 7 жыл бұрын
The "Kill switch" was only used as a way to determine whether it was sandboxed. A sand boxing application would have returned something to the program, so it didn't get suspicious. However, knowing that it was a garbage URL, wannacry would stop in it's tracks, because it would know it was sand boxed. It wasn't a kill switch, but a clever tactic to see if it was running on a live system or sand boxed.
@Shovlaxnet
@Shovlaxnet 6 жыл бұрын
3:19 You're welcome in advance.
@nandorbacso4625
@nandorbacso4625 Жыл бұрын
The kill switch was added to check if the malware was run on a simulated network (this is a technique often used in virtual environments by malware analysts to emulate network traffic without actually having to let the malware wander around the internet)
@Zoren364
@Zoren364 6 жыл бұрын
2:19 bruh
@jordanmartin6700
@jordanmartin6700 7 жыл бұрын
Thanks again Hank!
@theshermantanker7043
@theshermantanker7043 4 жыл бұрын
The kill switch was far from a amateur mistake. It was designed so that when the malware was being studied in a computer laboratory to find out how it worked the worm would instantly realise it was being studied and immediately terminate all of its processes
@kevinpenafiel8639
@kevinpenafiel8639 2 жыл бұрын
THANK YOU SO MUCH! im doing presentation on this soon and this explained everything so much better
@joshuapeacock1302
@joshuapeacock1302 7 жыл бұрын
did hank say 'only' about $100,000 that's more than some people make in 2 years
@kynigosthewolf4573
@kynigosthewolf4573 7 жыл бұрын
Joshua Peacock Relativity.
@melody_florum
@melody_florum 6 жыл бұрын
Well I’m never gonna skip another update again
@blazemordly9746
@blazemordly9746 7 жыл бұрын
Young Brit girl: "I'm on me mum's computer...v-room v-room." Her mum: "Get off me computer!" Young girl: "Awwww."
@ClockworkRBLX
@ClockworkRBLX 6 жыл бұрын
um
@machinegirI
@machinegirI 4 жыл бұрын
Um
@igorz3551
@igorz3551 4 жыл бұрын
Um
@AdrianLikesFlags
@AdrianLikesFlags 7 жыл бұрын
"As long as you didn't reboot your computer"??? BRUH, that's like the first thing I always do! XD
@_.M_
@_.M_ 7 жыл бұрын
This is NOT TRUE. The NHS was not up and running again within a day of the attack. Staff were sent home for days after because they could not work on the computers.
@IanHecht
@IanHecht 7 жыл бұрын
I thought the point of the killswitch domain was so that the virus could tell whether it was running in a sandboxed environment. If it was running on a security researcher's computer and checked to see if the domain was registered, it would come back positive inside the sandbox and the virus wouldn't install, but in the real world, the gibberish domain was intended to remain unregistered so the virus would spread.
@kcwidman
@kcwidman 7 жыл бұрын
That URL kill switch was a bait. This was just round one. Prepare for the second wave.
@Namela_
@Namela_ 6 жыл бұрын
Kai Widman 2018... still waiting
@poncho2431
@poncho2431 6 жыл бұрын
ill just be extra careful
@redstone8513
@redstone8513 6 жыл бұрын
I'm responding almost a year later, and nothing yet...
@juhppug3873
@juhppug3873 6 жыл бұрын
Kai Widman Been over a year.. So... Man im really curious to see what happends next.
@thomaslinssen1426
@thomaslinssen1426 5 жыл бұрын
You'd think the NSA would be held accountable for their blunder.
@porteal8986
@porteal8986 7 жыл бұрын
hospitals need to get their computers off of windows
@Dancingpinata-
@Dancingpinata- 7 жыл бұрын
porteal Windows is very user friendly and has a lot of software (including security related) supporting it. The larger problem is the OS version. Problem is, older, use-specific hardware such as ATMs, MRIs, gas station pumps even, are often built to be able to run the most recent OS at that time. When it was new, as long as these machines stayed up-to-date, they were secure. When they didn't have the ability (such as processing power) to upgrade, and the OS became outdated is when they became vulnerable. Unfortunately, this is unlikely to change. Products are often built to serve a current function, not a possible future one, to save costs. The best option is just to keep important information backed up.
@westonholmes9503
@westonholmes9503 2 жыл бұрын
i love this dude taught me chemistry on youtube.... great teacher
@FunnyFany
@FunnyFany 7 жыл бұрын
*[overeager conspiracy theorist voice]* So NSA did WannaCry. Got it.
@THORDOX
@THORDOX 7 жыл бұрын
And this is why many big companies are turning off SMBv1 in their network, I work in IT support and get calls about this constantly, unfortunatelly the type of support I give requires SMBv1 to be enabled, either that or do a very expensive upgrade.
@tangchunhat
@tangchunhat 7 жыл бұрын
Nope. Lesson from this story is "Install those Leenuux and never revert to shitty proprietary OS'es again".
@RizkhyDestatama
@RizkhyDestatama 7 жыл бұрын
Tang Nhat you don't know that there are many exploit for linux, just because it doesn't leak meaning it is safe. it's NSA exploit with slight modification. linux run on servers so if that code leaks, surely the black hats will modified that code too.
@tangchunhat
@tangchunhat 7 жыл бұрын
When you wrote "it's NSA exploit" did you mean "it's NSA prebuiltin backdoor"? Because thats what it looks like. Surely linux has exploits, but mostly in third party packages (such as samba).
@OlieB
@OlieB 7 жыл бұрын
the thing with wannacry is... for it get onto your network in the first place, someone had too open an email, download an attachment, run it, and allow it to make changes
@tonktruck8053
@tonktruck8053 4 жыл бұрын
My girlfriend ransomware. I wannacry
@AndrewTateOfficial-
@AndrewTateOfficial- 3 жыл бұрын
Registering the domain was not exactly a signal. When WannaCry attacks a computer, it refers to a certain domain address to see if it is up. If the domain is running, the virus is still inside the computer, it just doesn’t encrypt the file system
@enobe220
@enobe220 7 жыл бұрын
I used Linux.
@enobe220
@enobe220 7 жыл бұрын
I do not use wine x) but true fact I guess?
@EQuivalentTube2
@EQuivalentTube2 7 жыл бұрын
Why would you use wine for SMB? Wine is being used very limited if at all. Unix already has as good general software selection as windows, so you will need wine only in very marginal cases.
@ClockworkRBLX
@ClockworkRBLX 6 жыл бұрын
@equivalent most 'free' software developed for linux and other unix OSes are extremely amateurished though. Most professional software is only available for windows and/or mac
@hawkstriker8728
@hawkstriker8728 7 жыл бұрын
The reason the kill switch was implemented was to prevent testers from experimenting and containing WannaCry. Typically, when trying to see how a virus works, it is placed in an isolated computer environment that is set to automatically answer any request an infected computer would make to the internet. If you try to test WannaCry, it trys to get a response from that bogus url. If it gets a response, it knows it is in a test environment, shuts down, and tries to delete itself. When that person registered that domain and put a server on it that responded to WannaCry, the ransomware destroyed itself.
@DeadBaron
@DeadBaron 7 жыл бұрын
NSA triggered it due to what they were allowed to do while Obama knowingly stood by and let them loose. Thanks, Obama!
@Multi_Plays
@Multi_Plays 7 жыл бұрын
The Creep you're right, no presidents before him helped them ^^
@DeadBaron
@DeadBaron 7 жыл бұрын
You're right, it's only the fact everything the NSA did was blown wide open, Obama did nothing, and didn't pardon Snowden or any other leakers that came forward.
@jerrycan1756
@jerrycan1756 7 жыл бұрын
Hearing people describe Obama's presidency as "scandal-free" is always hilarious to me, as between his agencies running amok and the mishandling of crises like the 2008 crash, a lot of stuff is being ignored to make that claim.
@_wayward_494
@_wayward_494 6 жыл бұрын
Nick Johnson man, if only we cared. Pretty sure no one here mentioned obama being "scandal free"
@Sciencedoneright
@Sciencedoneright 3 жыл бұрын
Thank god I update it every month or so
@Card-a-mon
@Card-a-mon 7 жыл бұрын
Or, here's a thing, don't use a crappy OS
@aliancemd
@aliancemd 7 жыл бұрын
4:03 "It's not clear" - no, actually it's well known why. This is done to detect if you are running in a virtualized environment(maybe a research team analyzes the application), if it is, then you disable the functionality so it is not detected. Actually it was not only 1 domain, there were multiple.
@thinker8682
@thinker8682 7 жыл бұрын
That's why I love my MacBook.
@vxrbxie80
@vxrbxie80 7 жыл бұрын
Mohammed thats why i don't have a pc saving up for vaio white laptop. Just need 400 monei
@zzzzz28
@zzzzz28 6 жыл бұрын
Wizard Cat and you can buy *lazy to do math* of those 4$ phones
@furinick
@furinick 6 жыл бұрын
Because you like a childproof operating system
@elchungo5026
@elchungo5026 6 жыл бұрын
Mohammed it's not immune
@laurel6606
@laurel6606 6 жыл бұрын
Mohammed and I have my linux.
@DiamondIceNS
@DiamondIceNS 7 жыл бұрын
Supposedly the kill switch is there to defeat people from studying the virus in virtual machines. In a virtual machine, all domains will appear to exist, so if the program checks for a domain that *shouldn't* exist and it comes back positive, it can tell it's in a virtual machine and stop working so it can't be studied. It's a nifty idea but easily defeated once figured out.
@Euphytoseful
@Euphytoseful 7 жыл бұрын
"As long as you haven't rebooted your computer", that's very useful.
@SchmendrickHerb
@SchmendrickHerb 7 жыл бұрын
The fact that you have to explain it, and the fact next to no one has ever even heard of it, along with the fact that it was discovered and stopped, only proves that's it's not "a big deal."
@TheRealE.B.
@TheRealE.B. 7 жыл бұрын
I blame: 1. All of the companies full of technologically-literate white-collar employees who are trusted to make decisions worth thousands or millions of dollars every year, but aren't given administrator privileges on their computers and need to spend 2 hours arranging for an IT guy to do a 5-minute task. 2. All of the companies who would rather bear the cost of their employees being half as productive than bear the cost of new computers every once in awhile. I know what Hank said about the hospitals, but sometimes they're already using the software on the newest OS, but drag their feet on getting all employees up to speed.
@EscapeMCP
@EscapeMCP 7 жыл бұрын
Apparently the killswitch was to try to stop the virus running on security researchers 'sandboxed' virtual machines. This would mean that it would be hard to run the virus in a security controlled environment and see what the ransomware was up to. I say 'apparently' as I can't work out why the sandboxed machine would have the wierd domain name accessible. Maybe the idea was good, but the hackers messed up the implementation?
@BloonPlays
@BloonPlays 3 жыл бұрын
Eternal green: *chuckles* ... I’m in danger
@C0DEWARR10R
@C0DEWARR10R 7 жыл бұрын
For those trying to understand why the attackers built a kill switch - Its basically an anti-analysis mechanism where by the malware kills/deletes itself before a security researcher can get access to its code in a sandbox environment. The sandbox environment is designed to intercept communication between the malware and any internet address. This is done to figure out what exactly is the malware communicating with that internet address even if the address doesn't exist in the real world. Basically once a malware gets into a system there are two things that can happen: 1) Its a normal computer. It tries to reach a non existing address and if the malware doesn't get a response as expected, it assumes its safe to operate and wreaks havoc 2) Its a researchers sandbox. It tries to reach a non existing address but the sandbox responds to the malware's probe hoping to snoop in on the communication. The malware expecting no response from this address but receiving one makes it realize its on a security researcher's sandbox so it deletes itself before the researcher can gets his hands on it to reverse engineer and disable/release a patch for it.
WANNACRY: The World's Largest Ransomware Attack (Documentary)
29:52
The TWS Channel
Рет қаралды 591 М.
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
Computerphile
Рет қаралды 1,5 МЛН
Don't look down on anyone#devil  #lilith  #funny  #shorts
00:12
Devil Lilith
Рет қаралды 44 МЛН
버블티로 부자 구별하는법4
00:11
진영민yeongmin
Рет қаралды 8 МЛН
World‘s Strongest Man VS Apple
01:00
Browney
Рет қаралды 33 МЛН
5 Unexplainable Mysteries Explained by Science
14:14
SciShow
Рет қаралды 3,9 МЛН
Plastic Makers Have A Big Secret: They’re Experimenting On You
15:35
More Perfect Union
Рет қаралды 218 М.
How to Dispose of a Body
9:00
SciShow
Рет қаралды 167 М.
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 850 М.
We Don't Know What Causes the World's Worst Pain
11:56
SciShow
Рет қаралды 92 М.
How One Typo Destroyed Thousands Of Computers | Goggle.com
20:35
NationSquid
Рет қаралды 4,3 МЛН
Why does the US spend so much on its military?
28:24
Johnny Harris
Рет қаралды 1,4 МЛН
5 Weird Ways Identical Twins Aren't Actually Identical
8:17
SciShow
Рет қаралды 160 М.
Don't look down on anyone#devil  #lilith  #funny  #shorts
00:12
Devil Lilith
Рет қаралды 44 МЛН