[prev in list] [next in list] [prev in thread] [next in thread] 

List:       patchmanagement
Subject:    Re: [patchmanagement] Today's Ransomware fun, and Office patches
From:       Amit Jathar <amit.jathar () gmail ! com>
Date:       2017-06-27 19:05:37
Message-ID: CAHByCmLSW=Z-gKAUOcCOkv2Vf856nq038OGM0ZbYT2aM0cQabA () mail ! gmail ! com
[Download RAW message or body]

Here is the information about it.


Cyber attack 'Petya' starts spreading across the world.

It appears to be making its way to other countries – including Spain and
India – and may be functioning like the massive "Wannacry" attack,
according to cyber security experts.

Ukraine's infrastructure hit.

Servers of Russia's top oil producer Rosneft.

Danish shipping company Maersk.

British advertising company WPP have also reported to have been affected.
 I saw this on the BBC and thought you should see it:

Many firms hit by global cyber-attacks -
http://www.bbc.co.uk/news/technology-40416611





On Tuesday, June 27, 2017, Steve Mason <smason@kmss.ca> wrote:

> Not sure if any of you are following today's happenings in the Ukraine,
> not pretty.
> 
> I just read that the initial infection vector is suspected to be via an
> Office vulnerability, particularly CVE-2017-0199.
> 
> 
> 
> Going down the rabbit hole trying to confirm that we're patched, is giving
> me a headache.  CVE numbers, MS numbers and KB numbers, then there's
> following the trail of supersedence….
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> *Steve Mason *
> Network Administrator
> 403.536.5174
> smason@kmss.ca <javascript:_e(%7B%7D,'cvml','smason@kmss.ca');>
> 
> 
> 


-- 
Warm Regards,

Amit Jathar
Hand Phone :+919765018199

---
PatchManagement.org is hosted by Shavlik

The content on the email list is intended for assisting administrators.  If you would \
like to use any of this content in a blog or media publication, please contact the \
owners of the list for approval.

To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org


[Attachment #3 (text/html)]

Here is the information about it.  <div><br></div><div><div><br></div><div>Cyber \
attack &#39;Petya&#39; starts spreading across the world.  \
</div><div><br></div><div>It appears to be making its way to other countries – \
including Spain and India – and may be functioning like the massive \
&quot;Wannacry&quot; attack, according to cyber security \
experts.</div><div><br></div><div>Ukraine&#39;s infrastructure \
hit.</div><div><br></div><div>Servers of Russia&#39;s top oil producer \
Rosneft.</div><div><br></div><div>Danish shipping company \
Maersk.</div><div><br></div><div>British advertising company WPP have also reported \
to have been affected.</div><div>  I saw this on the BBC and thought you should see \
it:</div><div><br></div><div>Many firms hit by global cyber-attacks - <a \
href="http://www.bbc.co.uk/news/technology-40416611">http://www.bbc.co.uk/news/technol \
ogy-40416611</a></div><div><br></div><div><br></div><div><br></div><div><br></div><br>On \
Tuesday, June 27, 2017, Steve Mason &lt;<a \
href="mailto:smason@kmss.ca">smason@kmss.ca</a>&gt; wrote:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex">





<div lang="EN-US" link="blue" vlink="purple">
<div>
<p class="MsoNormal">Not sure if any of you are following today's happenings in the \
Ukraine, not pretty.<u></u><u></u></p> <p class="MsoNormal">I just read that the \
initial infection vector is suspected to be via an Office vulnerability, particularly \
CVE-2017-0199.<u></u><u></u></p> <p class="MsoNormal"><u></u>  <u></u></p>
<p class="MsoNormal">Going down the rabbit hole trying to confirm that we're patched, \
is giving me a headache.   CVE numbers, MS numbers and KB numbers, then there's \
following the trail of supersedence….<u></u><u></u></p> <p \
class="MsoNormal"><u></u>  <u></u></p> <p class="MsoNormal"><u></u>  <u></u></p>
<p class="MsoNormal"><u></u>  <u></u></p>
<p class="MsoNormal"><u></u>  <u></u></p>
<p class="MsoNormal"><u></u>  <u></u></p>
<p class="MsoNormal" style="text-autospace:none"><b><span \
style="font-family:&quot;Arial&quot;,&quot;sans-serif&quot;">Steve Mason \
</span></b><br> <span \
style="font-size:9.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;">Network \
Administrator<br> 403.536.5174<br>
<a href="javascript:_e(%7B%7D,&#39;cvml&#39;,&#39;smason@kmss.ca&#39;);" \
target="_blank">smason@kmss.ca</a><u></u><u></u></span></p> <p \
class="MsoNormal"><u></u>  <u></u></p> </div>
</div>

</blockquote></div><br><br>-- <br>Warm Regards,<br><br>Amit Jathar<br>Hand Phone \
:+919765018199<br><br><br>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic