1. Welcome to DNTrade. If you want to find out about the latest domain name industry news or talk, share, learn, buy, sell, trade or develop domain names - then you've come to the right place. It's a diverse and active community, with domain investors, web developers and online marketers - and it's free! Click here to join now.
    Dismiss Notice

WannaCry Fallout, Hosting companies going offline.

Discussion in 'Hosting' started by Christopher, May 19, 2017.

  1. Christopher

    Christopher Membership: Community

    Joined:
    Jun 13, 2014
    Messages:
    467
    Likes Received:
    178
    In the fallout from WannaCry Ransomware virus, some hosting companies, decided to pull their hardware offline, in order to prevent catestrophic failure of their systems, highlighting archaic hardware and software still being sold as new and perfromance systems.

    One host in the UK, Fasthost, has copped a lot of flack, making the decision to pull their 2003 machines offline, which were backing up customers data. Naturally they now have a lot of angry customers, who weren't warned of the down time, going for up to 6 days without access.
    https://www.theregister.co.uk/2017/05/17/fasthosts_wannacrypt_backups/
     
  2. findtim

    findtim Membership: VIP

    Joined:
    Dec 13, 2011
    Messages:
    7,334
    Likes Received:
    1,508
    auDA Member:
    Yes
    most hosts promote 99.9% uptime guarantees so i can see so expensive outcomes.
    i never state a guarantee, i tell them all about "zero day vulnerability" and 100% of them go SH*T.
    i find best to promise less at the start and i back it up with "we are all in the same boat"

    in the end someones making money out of it and already thinking of the next one !

    tim
     
    Christopher likes this.
  3. Christopher

    Christopher Membership: Community

    Joined:
    Jun 13, 2014
    Messages:
    467
    Likes Received:
    178
    Yep the thing about this company @findtim was they offered windows backup solutions, and were them selves using old vulnerable windows servers.
     
  4. chris

    chris Administrator

    Joined:
    Mar 7, 2010
    Messages:
    2,250
    Likes Received:
    820
    auDA Member:
    Yes
    Not just hosting companies, speed cameras too. 55 of them!

    https://www.itnews.com.au/news/wannacry-might-have-spread-to-all-of-victorias-speed-cameras-466448
     
  5. snoopy

    snoopy Membership: VIP

    Joined:
    Jul 14, 2010
    Messages:
    4,364
    Likes Received:
    1,631
    There you go, wanna cry isn't all bad.
     
  6. Christopher

    Christopher Membership: Community

    Joined:
    Jun 13, 2014
    Messages:
    467
    Likes Received:
    178
  7. Blue Wren

    Blue Wren Membership: VIP

    Joined:
    Jan 23, 2012
    Messages:
    909
    Likes Received:
    107
    Vaccine
    1. Go into your Windows folder, find Notepad.exe and create a copy of it.
    2. Rename the copy perfc
    3. Now the file has been created, right-click the file and select Properties, and check "Read-only."
    You're now prtected against Petya
     
  8. findtim

    findtim Membership: VIP

    Joined:
    Dec 13, 2011
    Messages:
    7,334
    Likes Received:
    1,508
    auDA Member:
    Yes
    reminds me of the netsky virus @ 2004, i was in cairns and i got it !! bloody computer would shut down in 28 seconds or something? , i rang a tec geek friend and he said " just start the computer and keep hitting F8 ?" or one of those keys, anyway that got me in and he told me how to fix it.

    moral: they create these things but also build in a simple fix..........you just have to find it. its kinda the "i was only joking" after punching someone in the face.

    the big question here is ........don't these people have a backup? and also don't you now how to just reboot the computer back to factory settings, yeh its a pain but i'd rather do that then pay a ransom.

    you do have to admit a ransom paid in bitcoin is a bloody good idea !

    tim
     
  9. findtim

    findtim Membership: VIP

    Joined:
    Dec 13, 2011
    Messages:
    7,334
    Likes Received:
    1,508
    auDA Member:
    Yes
    also anyone reading that is new and wants to know more , search " zero day virus" , you'll find some interesting reading imo.
    tim
     
  10. rensit

    rensit Membership: Community

    Joined:
    Nov 21, 2014
    Messages:
    22
    Likes Received:
    9
    There is no excuse to use Windows 2003 servers today. Support ended on July 14, 2015. Those servers are running unprotected for nearly 2 years. It is not a matter if but when they get hacked. That company does not seem to take security seriously.
    Security should be handled proactive and not reactive.
    Insist you hosting company is running up-to date server software.
     
    Christopher and eBranding.com.au like this.
  11. Christopher

    Christopher Membership: Community

    Joined:
    Jun 13, 2014
    Messages:
    467
    Likes Received:
    178
    Tim its encryption you wont be able to even see windows machine without a key to unencrypt. The windows default encryption leaves a copy of the keys in the SAM registry files, so each time you boot your boot loader can see windows and boot up. In this case it won't, see anything. So windows restore points wont work. You will need a backup in image file, and the image files need to be remote or external from your machine to not get encrypted as well. Something like Acronis true image. We have a great thread somewhere here on backup services.
     
  12. Christopher

    Christopher Membership: Community

    Joined:
    Jun 13, 2014
    Messages:
    467
    Likes Received:
    178
    That's so true, It should be alarm bells to any customer that is with them to get their backups and run to another company.