ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು, ಪ್ರಸ್ತುತ ಪುಟ.
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
ನೀವು @MalwareTechBlog ಅವರನ್ನು ತಡೆಹಿಡಿದಿರುವಿರಿ
ಈ ಟ್ವೀಟ್ಗಳನ್ನು ವೀಕ್ಷಿಸಲು ನೀವು ಖಚಿತವಾಗಿ ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ ವೀಕ್ಷಣೆಯು @MalwareTechBlog ಅವರ ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ
-
ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
Decided to split my twitter:
@MalwareTechLab For research stuff only.@MalwareTechBlog For a bit of everything. -
I'm trying to get together an article with a detailed timeline which should answer most of the questions I'm getting. BRB!
-
MalwareTech ಅವರು ಮರುಟ್ವೀಟಿಸಿದ್ದಾರೆ
Shout out to Microsoft who released an out of bounds patch for Windows XP (no longer supported).https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/ …
-
*finishes reading notifications* *refreshes page*pic.twitter.com/EHjMpMOU0e
-
MalwareTech ಅವರು ಮರುಟ್ವೀಟಿಸಿದ್ದಾರೆ
If you sign up your netblocks with ShadowServer they email you reports about botnet connections seen coming from your network
-
IP addresses from our sinkhole have been sent to FBI and ShadowServer so affected organisations should get a notification soon. patch ASAP.
-
MalwareTech ಅವರು ಮರುಟ್ವೀಟಿಸಿದ್ದಾರೆ
-
Check out this NYT post, they made a really cool time based map with my datahttps://www.nytimes.com/interactive/2017/05/12/world/europe/wannacry-ransomware-map.html …
-
It's very important everyone understands that all they need to do is change some code and start again. Patch your systems now!https://twitter.com/MalwareTechBlog/status/863189077843116032 …
-
So long as the domain isn't revoked, this particular strain will no longer cause harm, but patch your systems ASAP as they will try again.
-
So I can only add"accidentally stopped an international cyber attack" to my Résumé. ^^
-
I will confess that I was unaware registering the domain would stop the malware until after i registered it, so initially it was accidental.
-
MalwareTech ಅವರು ಮರುಟ್ವೀಟಿಸಿದ್ದಾರೆ
Infections for WannaCry/WanaDecrpt0r are down due to
@MalwareTechBlog registering initial C2 domain leading to kill-switch#AccidentalHero -
Good article by the guys as Talos http://blog.talosintelligence.com/2017/05/wannacry.html …
-
Shout out to the journalist who did so much digging that they found my sinkhole and contacted me via the whois email instead.
-
FYI the group claiming responsibility are a bunch of trolls, they've gotten even basic publicly available facts about the attack wrong.
-
I'm surprised the organic free range potato I call a server hasn't died yetpic.twitter.com/g4VW2bMpz2
-
"I'm surprised I've not had any emails today" *goes to check mail client* *client hasn't been started since last reboot*pic.twitter.com/6utn2CvUNb
-
MalwareTech ಅವರು ಮರುಟ್ವೀಟಿಸಿದ್ದಾರೆ
#WannaCry propagation payload contains previously unregistered domain, execution fails now that domain has been sinkholedpic.twitter.com/z2ClEnZAD2
-
Some analysts are suggesting by sinkholing the domain we stopped the infection? Can anyone confirm?
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.