Why Was the WannaCry Attack Such a Big Deal?

  Рет қаралды 919,231

SciShow

SciShow

7 жыл бұрын

On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
Hosted by: Hank Green
----------
Support SciShow by becoming a patron on Patreon: / scishow
----------
Dooblydoo thanks go to the following Patreon supporters-we couldn't make SciShow without them! Shout out to Kevin, Bealer, Mark Terrio-Cameron, KatieMarie Magnone, Patrick Merrithew, Charles Southerland, Fatima Iqbal, Sultan Alkhulaifi, Tim Curwick, Scott Satovsky Jr, Philippe von Bergen, Bella Nash, Bryce Daifuku, Chris Peters, Patrick D. Ashmore, Piya Shedden, Charles George
----------
Looking for SciShow elsewhere on the internet?
Facebook: / scishow
Twitter: / scishow
Tumblr: / scishow
Instagram: / thescishow
----------
Sources:
www.cnet.com/news/wannacry-wa...
www.npr.org/sections/thetwo-wa...
www.cnet.com/news/ransomware-...
www.symantec.com/connect/blog...
technet.microsoft.com/en-us/l...
www.wired.com/2017/05/acciden...
arstechnica.com/security/2017...
money.cnn.com/2017/05/16/techn...
www.elliptic.co/wannacry/
www.ft.com/content/fa5ed73a-3...
www.bbc.com/news/world-europe-...
www.theverge.com/2017/5/14/15...
www.wired.com/2017/05/wannacr...

Пікірлер: 1 500
@AnotherGenericGamingChannel
@AnotherGenericGamingChannel 7 жыл бұрын
The guy who stopped it wasn't anonymous for long. He tweeted about how tabloids doxed his friends and blackmailed them to get his address, phone number etc. He said it was the worst experience of his life
@CrispyChicken44
@CrispyChicken44 7 жыл бұрын
Jebus Gaming Journalism at it's finest.
@idkidk8884
@idkidk8884 6 жыл бұрын
Do you know his twitter?
@alexisleftist778
@alexisleftist778 5 жыл бұрын
Tabloid owners and journalists should be shot lol
@jerm8319
@jerm8319 4 жыл бұрын
Justin Craig I know this is hella late but doxing someone means to release someone’s personal information without their consent
@Cherry_Meatloaf
@Cherry_Meatloaf 3 жыл бұрын
@@idkidk8884 his name is Marcus Hutchins
@Imbedersup
@Imbedersup 7 жыл бұрын
"Cyber-security whack-a-mole." Made my night.
@n124lp
@n124lp 7 жыл бұрын
There are many ways in which cybersecurity is a game of Whack-a-Mole.
@watsoncole8908
@watsoncole8908 7 жыл бұрын
823 likes WOW!
@playinetgames
@playinetgames 6 жыл бұрын
You'd be surprised how often that sort of thing pops up in computer science as a whole.
@sampletext8036
@sampletext8036 5 жыл бұрын
Shadow *BROKERS* Definitely not English speaking.. so maybe Russian.
@liammccauslin912
@liammccauslin912 5 жыл бұрын
kill-a-viris
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
Can we discuss for a moment that our hero was doxed by british tabloids? Real shitty way to treat someone who prevented extreme infrastructure damages.
@naskoBG26
@naskoBG26 7 жыл бұрын
Anyone that cared about the anonymous guy's identity could've looked up who's the owner of the domain... Yeah it's shitty they didn't respect his wish. But it's not like it was that hard to find his identity either, since it was basically public.
@Bird_Dog00
@Bird_Dog00 7 жыл бұрын
That surprises you? News media - and tabloids in particular - would sell their own mother for a few readers more. Though the public isn't blameless. For years - or even decades, "serious" news outletts have strugled to make a buck with waining subscriptions. The level of journalism has droped as readers flock to "free" ad-based formats that use click-bait sensationalism to generate traffic. The reasons for this development are many and complex, so I won't go further into detail (hell, I think I could make a plausible argument for how the modern economy - and the industry in particular - is in part to be blamed for this).
@nursejennyk40
@nursejennyk40 7 жыл бұрын
Bird_Dog it can be dumbed down to Subscription news- accurate but directly costs users Ad based- grumpy little chucks who will do anything for views
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
They didn't "Just look him up", they blackmailed several people he was familiar with to get all the information they could on him.
@Laloscuenta
@Laloscuenta 7 жыл бұрын
Whether you can find it easily or not doesn't mean it's alright to write an article and publish it for all to see.
@porteal8986
@porteal8986 7 жыл бұрын
adding that kill switch is like mad scientist putting a big self destruct button on a giant evil robot
@jerrycan1756
@jerrycan1756 6 жыл бұрын
It was supposed to make it harder to analyze, the idea being that in a quarantined machine, registering the domain within the quarantine would kill the sample. Unfortunately for the hacker, the guy analyzing it did not have his sample quarantined.
@furinick
@furinick 6 жыл бұрын
And the button is in its foot
@bentton7311
@bentton7311 5 жыл бұрын
phineas and ferb anyone?
@jamie-ov4dp
@jamie-ov4dp 5 жыл бұрын
god dammit I was going to make a comment on that phineas and ferb reference but you people beat me to it :U
@baulvicork5199
@baulvicork5199 3 жыл бұрын
Doofinshmertiz
@baconpopcorn2565
@baconpopcorn2565 7 жыл бұрын
Microsoft should have said in the update "NSA did a goof, now there's a gaping hole in your security and this update fixes it."
@addust
@addust 5 жыл бұрын
Agreed.
@HyperTextMarkupLanguage-HTML
@HyperTextMarkupLanguage-HTML 2 жыл бұрын
Or just made it force you to update.
@Kajayacht
@Kajayacht 5 жыл бұрын
I remember when WannaCry hit, I was doing contracted dev work for Telefonica, and they were a real pain to deal with. Got the week off work, 10/10 would recommend.
@pcption
@pcption 3 жыл бұрын
love this.
@cosmicjenny4508
@cosmicjenny4508 7 жыл бұрын
"What operating system does it use?" "It's... erm... Vista!" "WE'RE GOING TO DIE!"
@soultransmuter8166
@soultransmuter8166 4 жыл бұрын
It crowd?
@dolphinyoin9219
@dolphinyoin9219 3 жыл бұрын
Yessir
@ShamelessJack
@ShamelessJack 7 жыл бұрын
Seems obvious to me that NSA should pay for this, and then some. Teach them to snoop around.
@childeater7327
@childeater7327 6 жыл бұрын
Shameless Jack snooping kind of is the nsas job
@Kr4zYm0f0
@Kr4zYm0f0 6 жыл бұрын
USA should pay for it.
@phunkyphresh3799
@phunkyphresh3799 6 жыл бұрын
Should the DoD pay for any damages from Chinese and other militaries that are able to copy or make use of US designs? Or should we stop building to air crafts? Every other country gets advantages of snooping on other countries. Unless you want to cripple our military, empower enemies who still use spies, etc. the NSA should be allowed to keep looking into technical weaknesses to exploit. Because if you're willing to shoot artillery shells at our enemies and potentially have guns fall into hands of our enemies, why not allow our military to use cyber weapons? Otherwise, just ban the use of m16's then because they'll fall into the hands of bad guys too much.
@ghost_ship_supreme
@ghost_ship_supreme 6 жыл бұрын
I think I we should have the hackers heads on a stick, they're the ones who remade it into a virus.
@bulletl187
@bulletl187 6 жыл бұрын
Why should they pay for it? If you see a gun on the street and you don’t take/use it, would it be your fault? No could you prevent it? Yes! Do you have to? No, you owe nobody something
@TylerMatthewHarris
@TylerMatthewHarris 7 жыл бұрын
the vast majority of affected users were using Windows 7
@PistonAvatarGuy
@PistonAvatarGuy 7 жыл бұрын
Windows is nothing but spyware, the NSA is massively ineffective, and now they're actually creating security risks. This is what having a bloated military budget does for you.
@rjfaber1991
@rjfaber1991 7 жыл бұрын
Yes, unpatched Windows 7.
@ag4ve
@ag4ve 7 жыл бұрын
Correct - I've heard multiple people say (fb friends who do IR) that it's hard to get xp infected before it crashes.
@ag4ve
@ag4ve 7 жыл бұрын
I really think (a week after the attack) something this simple should've been caught pretty early in the writing process.
@bdorsey19
@bdorsey19 3 жыл бұрын
Glad I stopped using it lol
@Blabla130
@Blabla130 7 жыл бұрын
Here's the thing though, when software companies consistently release patches or updates that make the software worse for end users, like adding more advertising, placing additional restrictions, changing UI, or generaly pushing unwanted "features" (I'm looking at you, Skype), I can't say I totally blame people for being reluctant to update.
@Charmlethehedgehog
@Charmlethehedgehog 7 жыл бұрын
"This is like SKYPE, every time they fix something, SOMETHING ELSE BREAKS!" -Kiandymundi (I totally understand skype's gone down hill :/)
@Spartan0430
@Spartan0430 7 жыл бұрын
i remember a skype update that was so bad that it was just using up 90% of my CPU for no reason.
@sirBrouwer
@sirBrouwer 7 жыл бұрын
Blabla130 then advice companies to use Unix software i use ubuntu and for all the years that I do i never had problems with any computer.
@DharmaJannyter
@DharmaJannyter 7 жыл бұрын
You can opt to install only security updates.
@mwbgaming28
@mwbgaming28 7 жыл бұрын
Blabla130 especially the old trick with Microsoft hiding a windows 10 pop-up ad generator in a windows 7 security update and they lied about it until someone showed a demonstration on KZfaq and posted it to Microsoft's forums
@lancester8634
@lancester8634 7 жыл бұрын
Or, was it Microsoft saying "Hey, Update or else!!!"
@RKthehedgehog
@RKthehedgehog 6 жыл бұрын
Boberdown Annon Also, "internet files that decrypt as long as you haven't reboot". Not only does that sounds suspicious but also completely useless because WannaCry encrypted files are 100% unrecoverable and you MUST reboot in order to activate Safe Mode to remove WannaCry.
@Llama-cx3np
@Llama-cx3np 5 жыл бұрын
Subaru? Do you work for Microsoft you seem to know alot about computers
@Du7chy
@Du7chy 5 жыл бұрын
OMG is my PC trying to kill me...😟😲😐😰
@universenerdd
@universenerdd 3 жыл бұрын
@@RKthehedgehog no, the encryption keys are stored in memory, they fetch that from memory and rely on the fact that it is still there, you don't know what your talking about
@gamerhurley
@gamerhurley 3 жыл бұрын
@@universenerdd we have the same pfp what a chance
@the11382
@the11382 7 жыл бұрын
"Having a kill switch is an amateur mistake": Viruses are usually things you have no control over, releasing a virus is a risk for your own computer as well.
@wlfshertz4362
@wlfshertz4362 7 жыл бұрын
Just want to say this....Love you scishow :)
@mimsie496
@mimsie496 7 жыл бұрын
Sara Huang army!
@bassamn4276
@bassamn4276 7 жыл бұрын
Lesson learned: always update your OS and if you're using XP this was a harsh lesson :) I bet Microsoft is going to make more money than the "Hackers" by selling a lot of Windows 10
@vybezD
@vybezD 7 жыл бұрын
Bassam N plot twist: Microsoft was behind it all along.
@dylantruong897
@dylantruong897 7 жыл бұрын
John too.
@spartan99947
@spartan99947 7 жыл бұрын
Microsoft released a patch on march so they are definitely not behind it
@thorerik
@thorerik 7 жыл бұрын
XP wasn't among the infected computers, the only confirmed infections of XP was researchers infecting it by hand. Windows 7 was the main infected OS. As for the "kill switch" it's most likely a sandbox detection thing, not a killswitch, but it was badly implemented.
@pies765
@pies765 7 жыл бұрын
This has already probably been said, but the prevailing theory on why the kill switch domain was in the code was to make it harder for people to analyse the virus. A general practice in malware analysis is to put the virus in an environment where it cannot do much harm or get out. These environments also usually just respond to any requests the program makes with fake data, so it thinks it is getting out but it is not. The kill switch worked by the thought that if it gets anything back from the fake website, it must be due to it being studied. Obviously this did not work as planned, but that at least says what they wanted to do.
@jaykoerner
@jaykoerner 7 жыл бұрын
Ryaji-San thats the therory, the thing is the best practice for that is for the malware to generate a completely random url(a random string of characters has almost no chance of being used), the environment that the malware is trying to figure out if it is specifically is a virtual machine, the reason being is that it is much easier to study and view what it does, get memory snapshots ect... one of the common things vm's do is reply that a domain is registered when it isn't since its just forwarding agent to the real computer, other common practices for finding out if you are in a vm or protecting from study is if the cpu is less then or equal to 2 and stop running or just armoring the malware, using memory obfuscation, code obfuscation, messing with the memory table so that memory snapshots can not be analyzed, the list goes on....
@wolfegalvin1685
@wolfegalvin1685 7 жыл бұрын
or maybe they have a killswitch just so that it can be stopped incase things really got outa hand.
@pies765
@pies765 7 жыл бұрын
Wolfe Galvin I mean, I don't see how it could get out of hand, it's purpose is to spread as much as possible. So getting huge and fast is kind of the point.
@jaykoerner
@jaykoerner 7 жыл бұрын
Wolfe Galvin it can't be known if thats why, but if so they would normally use C&C servers to do such things, you are already breaking the law and blackmailing people, why would you care
@jaykoerner
@jaykoerner 7 жыл бұрын
Ryaji-San yep, thats basically the point of this stuff, and if they wanted to stop it or update the malware they would just send patches from the command and control server like most malware does
@bitcores
@bitcores 7 жыл бұрын
The killswitch exists because in a lot of virtual machines unregistered domain names will return an IP address (and unused local network IP address) so it is used as a method of detecting if the malware has infected a VM system, which is usually not worth encrypting for ransom.
@RandallStephens397
@RandallStephens397 7 жыл бұрын
I love the portrayal of the ransom payment system here--it assumes the hacker actually intended to restore anyone's files after they paid.
@theVoluminousPoo
@theVoluminousPoo 7 жыл бұрын
Randall Stephens Hence the part where he mentioned there was no reliable way to get files back to those ransomed and many infected that paid did not see restoration.
@rjfaber1991
@rjfaber1991 7 жыл бұрын
True, but that's not such an odd assumption; past ransomware attacks typically have resulted in people's files getting decrypted upon payment. Why the hackers bothered is frankly beyond me, but it does make the fact they didn't bother with WannaCry at least slightly notable.
@LeezShadowbringer
@LeezShadowbringer 7 жыл бұрын
Robert Faber probably to give people a reason to actually pay up
@antalz
@antalz 7 жыл бұрын
Becaise they might consider making more ransomware. If you don't provide decryption your first hit will also be your last.
@oskarjankowski5709
@oskarjankowski5709 7 жыл бұрын
what I was gonna say
@SheosMan117
@SheosMan117 7 жыл бұрын
Wait, Shadow Brokers? You mean, Mass Effect's most infamous information trader is real?
@screamsofthedead
@screamsofthedead 7 жыл бұрын
They wish they were that cool.
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
Well, they serve a very important purpose. I think they're much cooler than fictional orginazations if they're doing the same things IRL.
@unclevivid9028
@unclevivid9028 7 жыл бұрын
SheosMan117 information trading is one of the oldest and most lucrative business to ever exist. And shadow broker is a cool af name but also kind of teenage edgy
@thesuckysix4242
@thesuckysix4242 7 жыл бұрын
DEEPKNOWERS DARKSEERS NIGHTSNOOPERS
@cpob2013
@cpob2013 7 жыл бұрын
well, it IS just a title passed down
@hatty7090
@hatty7090 7 жыл бұрын
And I just clicked "later" on an update as this video was starting 😂
@muneebmuzammal3987
@muneebmuzammal3987 3 жыл бұрын
Watched many videos on the WannaCry attack but this one is the best and concise video available on the whole youtube!
@sleepydrifter4667
@sleepydrifter4667 7 жыл бұрын
seems like wanna cry was a distraction, but could've been something a lot more... troublesome.
@almerakbar
@almerakbar 7 жыл бұрын
Sleepy Drifter A distraction from what though?
@PistonAvatarGuy
@PistonAvatarGuy 7 жыл бұрын
I doubt it, it should be a wake up call to everyone. People need to realize that the NSA isn't making them safer, it's putting them at risk.
@ThreadBomb
@ThreadBomb 7 жыл бұрын
EternalRocks looks to be harmless. www.bleepingcomputer.com/news/security/author-of-eternalrocks-smb-worm-calls-it-quits-after-intense-media-coverage
@Wielkimati
@Wielkimati 7 жыл бұрын
Heh, this incident only shows that something simillar may be happening right now. And we don't know it yet.
@beojack4592
@beojack4592 7 жыл бұрын
I'm 25th! I'm so happy I wannacry edit: by 25th I meant 25th comment btw but I appreciate the birthday well wishes. I'll try to remember them when I turn 25.
@willynebula6193
@willynebula6193 7 жыл бұрын
BeoJack 👏
@doryyonder1533
@doryyonder1533 7 жыл бұрын
BeoJack kk
@pristineinferno
@pristineinferno 7 жыл бұрын
BeoJack happy birthday 🎂
@conf1rmed819
@conf1rmed819 7 жыл бұрын
BeoJack I get that joke
@Matt_10203
@Matt_10203 7 жыл бұрын
[iX]smasher Well then, you must be smart.
@BurkeLCH
@BurkeLCH 7 жыл бұрын
Thanks for the upload
@rakastettu2237
@rakastettu2237 2 жыл бұрын
I'm late to watching this video, but I just wanted to comment and say thank you for the explanation that was easy to understand. I don't know much about computers, but you explained this in a way that I could grasp.
@pokefreak3
@pokefreak3 7 жыл бұрын
Shadow brokers? Didn't know we were in Mass Effect 2.
@saidag
@saidag 7 жыл бұрын
I always update and backup almost everything I have on my PC. Gotta keep my memes safe!
@Lotharies
@Lotharies 7 жыл бұрын
thank you for making this
@kevinpenafiel8639
@kevinpenafiel8639 2 жыл бұрын
THANK YOU SO MUCH! im doing presentation on this soon and this explained everything so much better
@Brodym2433
@Brodym2433 7 жыл бұрын
thx for another gr8 vid john green
@aaronsilvera177
@aaronsilvera177 6 жыл бұрын
You mean hank green?
@cottoncandytory5928
@cottoncandytory5928 6 жыл бұрын
aaron silvera thats the joke
@sent4dc
@sent4dc 7 жыл бұрын
It was actually not entirely true. The number of Windows XP computers affected by WCry was very very low. It would simply BSOD on them. The bulk of affected computers were running Windows 7 x64 bit.
@westonholmes9503
@westonholmes9503 2 жыл бұрын
i love this dude taught me chemistry on youtube.... great teacher
@jordanmartin6700
@jordanmartin6700 7 жыл бұрын
Thanks again Hank!
@Master_Ed
@Master_Ed 3 жыл бұрын
To be honest, the only reason I don't update is because sometimes new things are added and maybe new filters on the screen or something is added which I don't want and can't remove. So updating to protect myself from a virus is not worth it if my computer is going to be near unusable in the first place.
@csbluechip
@csbluechip 7 жыл бұрын
it is well known why the "kill switch" existed - for vm detection ...and the hackers made $0 from the attack because the bitcions are NOT anonymous
@cliffsidekiller
@cliffsidekiller 7 жыл бұрын
For anyone wondering, the suspected reason for the inclusion of a killswitch was an attempt to delay people trying to crack Wannacry's code. From what I have read, when the virus is loaded into a simulator, the gibberish URL would read as registered and then immediately pull out of that system so that the virus could not be "tested". However, since they hardcoded the URL, it was much simpler to just register that URL so that it would keep pulling out of any system it infects.
@Kaihlik
@Kaihlik 7 жыл бұрын
I was reading on Ars Technica that Xp wasn't an infection vector for the attack because in XP the attack on the SMB caused the system to crash before the files could be encrypted. This overwhelmingly affected windows 7. 10 was never vulnerable to the SMB issue afaik.
@jfdd43
@jfdd43 7 жыл бұрын
The kill switch system makes sense. They can set up a their local networks to lead to a 'intranet' page whenever that URL is entered from within it. They might have been scared of accidentally infecting themself
@mwbgaming28
@mwbgaming28 7 жыл бұрын
I wouldn't mind updating if Microsoft didn't hide windows 10 ad generators or spyware programs in the updates
@mwbgaming28
@mwbgaming28 7 жыл бұрын
my windows 7 PC has a windows 10 ad generator that snuck in with a security update my laptop with windows 10 is full of microsoft spyware because i wont pay $900 for the enterprise version why does the enterprise version of wndows 10 have no ads, no spyware and being able to set updates to manual installation but the home and pro version are both loaded with spyware and ads in addition to the auto restart to install updates (even if you are using the computer)
@shrimpbisque
@shrimpbisque 6 жыл бұрын
Thank you, SciShow, for reminding me to update my backups. I'll have to get on that tomorrow.
@dashie6498
@dashie6498 2 жыл бұрын
did you update them yet?
@mukulsharma5738
@mukulsharma5738 2 жыл бұрын
did you do it ?? we would like to know !!
@raquelames6262
@raquelames6262 7 жыл бұрын
A small hospital near me had to pay the ransom (something like $40,000 USD) because they had no backups they had no choice but to pay
@glorvalmacglorvas171
@glorvalmacglorvas171 7 жыл бұрын
Maybe this was a test?...
@BeesQuestionMarkk
@BeesQuestionMarkk 7 жыл бұрын
Glorval MacGlorvas Nah. Just a lucky hacker group in Russia that had no clue how to manage ransomware.
@albertzhang5699
@albertzhang5699 7 жыл бұрын
why purposely put in a kill switch though? Seems odd. Not that they forgot to remove a kill switch, they **put in** a kill switch
@glorvalmacglorvas171
@glorvalmacglorvas171 7 жыл бұрын
Exactly why I think it was a test, they wouldve included the kill switch to turn it off if it got out of hand.
@pauldeddens5349
@pauldeddens5349 7 жыл бұрын
wouldnt the test getting out of hand BE what they want?
@pies765
@pies765 7 жыл бұрын
The kill switch was a misguided attempt at slowing down analysis. The environments we use would respond to that request, so they used this to tip the program off to the fact that it was being studied.
@glorvalmacglorvas171
@glorvalmacglorvas171 7 жыл бұрын
If someone infects one of my computers with ransom wear, I will just restore one of my older computers in the 3x3x3 computer block of computers behind me...
@glorvalmacglorvas171
@glorvalmacglorvas171 7 жыл бұрын
KZfaqs at it again, sending me an email for someone to replying to this but not showing it when I open this. Time to answer it anyway. There is only 2 computers on this network, that block is not plugged in. They are unused. So I would just pull out the two infected computers, and then just replace them after updating all software.
@MrGeekGamer
@MrGeekGamer 7 жыл бұрын
Or just backup your files you troglodyte.
@yourbrother7835
@yourbrother7835 7 жыл бұрын
MrGeekGamer Troglodyte?
@TheBuddyPal
@TheBuddyPal 7 жыл бұрын
Troglodyte basically means caveman.
@rancesuperking8731
@rancesuperking8731 7 жыл бұрын
CreamyGravy Ironically used by basement dwellers who could be seen as modern day cavemen
@JennAlessa
@JennAlessa 7 жыл бұрын
Greatly done!
@QuinSkew
@QuinSkew 7 жыл бұрын
Who knew having my PC disconnected saved me from this ransomware
@CumputersRULE
@CumputersRULE 7 жыл бұрын
If the NSA used the exploit, then when it was leaked why didn't they use their resources and update all the machines vulnerable. It's a national agency, they do unconstitutional stuff all the time anyway.
@EvelynDayless
@EvelynDayless 7 жыл бұрын
NSA's job is to gather intelligence on foreign countries not make sure you're keeping your operating system up to date.
@_MythicalWolf
@_MythicalWolf 7 жыл бұрын
So why are they looking into OUR computers rather then keeping it's citizens safe in the first place
@CumputersRULE
@CumputersRULE 7 жыл бұрын
Because the government can't trust it's own citizens.
@EvelynDayless
@EvelynDayless 7 жыл бұрын
Without a warrant they generally don't look into your computer, even with a warrant that's the FBI's job usually. NSA is far more concerned about the computer traffic in Russia and the middle east and how to exploit North Korean nuclear test equipment/computers than they are about your porn collection.
@CumputersRULE
@CumputersRULE 7 жыл бұрын
Red Star Linux was a disaster, they probably have a foothold in that already.
@august-5085
@august-5085 7 жыл бұрын
shadow brokers? Mass Effect, anyone?
@osotanuki3359
@osotanuki3359 6 жыл бұрын
I'm pretty sure I've only not heard of this because I don't use windows, one main reason is that it's just like "ok, time to update, I'm closing your stuff, bye, see ya in an hour or two!" And you can't stop it
@DK-dc8sl
@DK-dc8sl 7 жыл бұрын
SCISHOW!!!! you always make my day.
@Zoren364
@Zoren364 5 жыл бұрын
2:19 bruh
@entropy616
@entropy616 7 жыл бұрын
Plot twist: SciShow launched the attack just to make this video.
@mongster5780
@mongster5780 7 жыл бұрын
this made me wanna cry
@DemonicDemon6
@DemonicDemon6 4 жыл бұрын
Wannacry was actually somewhat kind to people. They were like in 6 moths they will have an event where you can get your files back if your to poor to buy them back.
@Shovlaxnet
@Shovlaxnet 6 жыл бұрын
3:19 You're welcome in advance.
@claytonharting9899
@claytonharting9899 7 жыл бұрын
Windows updates tend to break the OS. I'm never eager to update. EVER.
@Town159
@Town159 7 жыл бұрын
The hospital I work in didn't get infected as we use Windows 7 but we shut everything down as a precaution, that caused chaos as we're one of a few NHS trusts to be completely electronic. The hospital I worked in last year got infected as they use operating systems/programs from the late 80's/early 90's in some instances!
@arkcylerium3010
@arkcylerium3010 6 жыл бұрын
thank you scishow
@BazookaTooth707
@BazookaTooth707 7 жыл бұрын
We should be mad at the NSA
@kamrankazemi-far6420
@kamrankazemi-far6420 7 жыл бұрын
And this is a clear example of why businesses should update there systems.
@FearBoo
@FearBoo Жыл бұрын
fast and simple, thanks
@Prizm17
@Prizm17 6 күн бұрын
3:47 wow… what a plot twist… genuinely made my jaw drop
@Altherix
@Altherix 7 жыл бұрын
In MARCH, Microsoft released a patch. Vast majority of machines infected by WannaCry, were Windows 7 machines still supported by Microsoft. Why is it, people seem to think avoiding patches is a game? Every major computer outbreak in recent times it's the same story, a patch to fix the hole/bug/exploit was released months if not years before the major exploit of it. We've gotten to the point you can no longer blame the software, it's the space between the keyboard and the chair that's the problem. (The User) To the argument a patch breaking your software, I'd rather deal with a scheduled software break than an unscheduled software attack.
@jerrycan1756
@jerrycan1756 6 жыл бұрын
In all cybersecurity, the user is the weakest link that one has to work around. Remember that an entire political campaign for President of the United States was sunk by a virus that a 14-year-old could make because the user was technologically illiterate.
@vkillion
@vkillion 7 жыл бұрын
There are a few problems with this video. Windows 10 was never in danger. The exploit didn't exist on Windows 10. Also, a security patch (the first in 3 years) was released for Windows XP, despite being out of support. WannaCrypt affected Windows XP, 7, 8, and the related server versions, all of which have now received patches (assuming the update has been installed).
@vkillion
@vkillion 7 жыл бұрын
I see you listed the patch for XP later in the video, after saying there was no support for Windows XP earlier in the video. Oops.
@LeoMRogers
@LeoMRogers 7 жыл бұрын
The kill switch was probably a way for the malware to detect if it was being studied in a lab. This is quite common, malware writers often try to make it so that their malware will behave differently when it is being studied (ie, debugging software, virtual machines etc).
@brycebilyeu5832
@brycebilyeu5832 7 жыл бұрын
I've learned so much from you and John. Thank you both for your service :)
@Terminalss
@Terminalss 7 жыл бұрын
"Haha take that Windows" said apple looking for its lost 300 dollar earpods
@diegoantoniorosariopalomin4977
@diegoantoniorosariopalomin4977 7 жыл бұрын
not for linux or bsd users
@diegoantoniorosariopalomin4977
@diegoantoniorosariopalomin4977 7 жыл бұрын
or comapanies using them
@diegoantoniorosariopalomin4977
@diegoantoniorosariopalomin4977 7 жыл бұрын
SirOswald many are stuck on xp because they are greedy bastards
@diegoantoniorosariopalomin4977
@diegoantoniorosariopalomin4977 7 жыл бұрын
Dont they know about free software or dont care ?
@vsmash2
@vsmash2 7 жыл бұрын
right.. *mubles something about heartbleed*
@30LayersOfKevlar
@30LayersOfKevlar 7 жыл бұрын
No, it's because those companies are running proprietary software that's outdated.
@icedragonair
@icedragonair Жыл бұрын
Mass overhauling an os for a large scale is actually incredibly difficult, because doing it all at once can often leave the whole system down and needing to replace large amounts of things all at once and it takes out the operations for way too long. If trying to do it in parts, the parts of the system are usually interconnected, so taking one part offline to change it basically wrecks anything adjacent that relies on it. We had this issue in a big store chain i worked at. Our inventory system was incredibly inefficient and relied solely on human knowledge. We carried a large array of things from just about everywhere, our inventory was different every single day. And i dont just mean season to season, we basically had no set inventory, think thrift store. So if you needed info on an item, you had to call someone who just knew roughly where it belonged to check the prices. People basically generally knew what types of things we carried and what the price was likely to be and how to estimate one if needed. You gained that knowledge simply by working there long enough to get a feel for how we did things. Obviously this was incredibly inefficient and reliant on competent workers. But to overhaul it would have meant changing absolutely everything. The way we sort, how we scan, all our equipment. It was possible to set it up as automatic for sure, but for an extremely busy store in a worldwide company the effort would have been enormous. Basically they decided that having an inefficient human powered system was still cheaper and less hassle than overhauling it. That's the thing, just because there is a better option, doesn't mean its actually more suited. If all you need is to work with word documents, using a supercomputer isnt actually more useful than an old beat lappy. Yeah, you could make dog leashes out of kevlar sting, but nylon is more than enough. In factories many processes could be done by robots, but they still hire just a ton of people to do rote repetitive tiny work, because, especially for smaller orders its STILL cheaper to just pay people to basically just be a biomechanical arm. Upgrading to win 10 when xp is already doing exactly what you need is a waste of time and resources. Unfortunately stuff like this pops up occasionally.
@Male_Parent
@Male_Parent 6 жыл бұрын
now I'm glad that I got the update yesterday.
@tkzsfen
@tkzsfen 7 жыл бұрын
let me cleat something - in the industry nobody cares about the latest OS if it is practically the same and doesn't bring any benefit for the money paid. the lasers in our factory will forever run on XP, because there is no point in updating it. the software runs perfectly, so why bother?!
@jacobcleveland1858
@jacobcleveland1858 7 жыл бұрын
they still havent released a patch for window 95 im pissed.
@cheesingiron3145
@cheesingiron3145 7 жыл бұрын
Didn't know this was happening until now
@howtoexist6636
@howtoexist6636 5 жыл бұрын
WannaCry having a kill switch is like every cartoon supervillain with a self-destruct button on their creations.
@phantasm1234
@phantasm1234 7 жыл бұрын
Hey there, SciShow! I have a personal request for the topic of cerebral aneurysms! I experienced a rupture when I 19 and the suddenness and severity of them would make for a good informative video for the public! Thank you!
@Cirkustanz
@Cirkustanz 7 жыл бұрын
I'm sure thousands of people have said this, but what if they did this on purpose...just to get people to update, and to entice people to CONTINUE to update? And not for altruistic reasons, I mean for nefarious ones. "Mwahahahaha, we released an update that has taken all of their base, now it will belong to us!"
@Charmlethehedgehog
@Charmlethehedgehog 7 жыл бұрын
I mean... they can keep the bad/old software... they make updates for a reason... (also ALL YOUR BASE ARE BELONG TO US!)
@sirBrouwer
@sirBrouwer 7 жыл бұрын
Cirkustanz with ubuntu software run systems nothing over here got effected.
@yeyu8521
@yeyu8521 7 жыл бұрын
wow this had just opened my eyes
@lostinbago
@lostinbago 7 жыл бұрын
MS surely wouldn't take advantage of millions just for more money than God. Could that be why they stopped supporting XP one of their best systems and kept 'upgrading' to win7, win 8, Vista, Win 10. New version every couple of years and millions of users at 100 a pop and MS is the Tree that grows money. Now we have to be wary of upgrades, because in some cases they were adding tracking spyware to your system as part of the 'upgrade'. Vile company with few morals.
@Charmlethehedgehog
@Charmlethehedgehog 7 жыл бұрын
^^ they're right... XP's seen the most love from MS. They were all sad they had to stop 'improving' it...
@gg-96
@gg-96 Жыл бұрын
0:49 backups do 999999999999 damage to ransomware
@rapturas
@rapturas 7 жыл бұрын
I recently had an IT interview with the NHS, they assured me that it was impossible to hack their systems - I didn't get the job, but I came away laughing at them, not their patients who were the ones who really suffered.
@LazerLord10
@LazerLord10 7 жыл бұрын
Lol, it seems like everyone forgets Win8. Still my favorite operating system. After a few slight mods, it runs way better than 7 or 10.
@alkaupadhyay7650
@alkaupadhyay7650 3 жыл бұрын
But why will you use windows on server?
@jesscorbin5981
@jesscorbin5981 3 жыл бұрын
What does Apple use for their servers?
@thesymbolism5623
@thesymbolism5623 2 жыл бұрын
WHAT ABOUT WIN 7?
@theshermantanker7043
@theshermantanker7043 4 жыл бұрын
The kill switch was far from a amateur mistake. It was designed so that when the malware was being studied in a computer laboratory to find out how it worked the worm would instantly realise it was being studied and immediately terminate all of its processes
@kellyvtec
@kellyvtec 7 жыл бұрын
good stuff!
@alexdiviney1316
@alexdiviney1316 6 жыл бұрын
At my dad's hospital (he works in IT, and is married to an IG manager) they shut down all of the computers, so they couldn't be infected, but then they still couldn't access the data...
@swirff
@swirff 7 жыл бұрын
when did this attack happen exactly?
@9voltbattery
@9voltbattery 7 жыл бұрын
adsadwas awsd friday, may 12th
@adisonwail6522
@adisonwail6522 7 жыл бұрын
a few weeks ago
@joshuapeacock1302
@joshuapeacock1302 7 жыл бұрын
did hank say 'only' about $100,000 that's more than some people make in 2 years
@kynigosthewolf4573
@kynigosthewolf4573 7 жыл бұрын
Joshua Peacock Relativity.
@katykat5099
@katykat5099 6 жыл бұрын
I’m a computer gamer... Who just happened to not be on my computer for 80% of 2017. Including those days. Wow. Soooo lucky.
@mackysplace
@mackysplace 7 жыл бұрын
As Hank said, all the MRI machines and other such things needed specific software to run and upgrading would cost time and money and require re-calibrating which would've added long waiting times. And the Government didn't give enough funding to NHS IT departments which is so desperately needed.
@porteal8986
@porteal8986 7 жыл бұрын
hospitals need to get their computers off of windows
@Dancingpinata-
@Dancingpinata- 7 жыл бұрын
porteal Windows is very user friendly and has a lot of software (including security related) supporting it. The larger problem is the OS version. Problem is, older, use-specific hardware such as ATMs, MRIs, gas station pumps even, are often built to be able to run the most recent OS at that time. When it was new, as long as these machines stayed up-to-date, they were secure. When they didn't have the ability (such as processing power) to upgrade, and the OS became outdated is when they became vulnerable. Unfortunately, this is unlikely to change. Products are often built to serve a current function, not a possible future one, to save costs. The best option is just to keep important information backed up.
@blazemordly9746
@blazemordly9746 7 жыл бұрын
Young Brit girl: "I'm on me mum's computer...v-room v-room." Her mum: "Get off me computer!" Young girl: "Awwww."
@ClockworkRBLX
@ClockworkRBLX 5 жыл бұрын
um
@machinegirI
@machinegirI 3 жыл бұрын
Um
@igorz3551
@igorz3551 3 жыл бұрын
Um
@darkmaster9607
@darkmaster9607 7 жыл бұрын
The "Kill switch" was only used as a way to determine whether it was sandboxed. A sand boxing application would have returned something to the program, so it didn't get suspicious. However, knowing that it was a garbage URL, wannacry would stop in it's tracks, because it would know it was sand boxed. It wasn't a kill switch, but a clever tactic to see if it was running on a live system or sand boxed.
@melody_florum
@melody_florum 5 жыл бұрын
Well I’m never gonna skip another update again
@kcwidman
@kcwidman 7 жыл бұрын
That URL kill switch was a bait. This was just round one. Prepare for the second wave.
@Namela_
@Namela_ 6 жыл бұрын
Kai Widman 2018... still waiting
@poncho2431
@poncho2431 6 жыл бұрын
ill just be extra careful
@redstone8513
@redstone8513 6 жыл бұрын
I'm responding almost a year later, and nothing yet...
@juhppug3873
@juhppug3873 5 жыл бұрын
Kai Widman Been over a year.. So... Man im really curious to see what happends next.
@_.M_
@_.M_ 7 жыл бұрын
This is NOT TRUE. The NHS was not up and running again within a day of the attack. Staff were sent home for days after because they could not work on the computers.
@juliecorpuz5262
@juliecorpuz5262 6 жыл бұрын
Yay you published your vid on my birthday
@thomaslinssen1426
@thomaslinssen1426 4 жыл бұрын
You'd think the NSA would be held accountable for their blunder.
@FunnyFany
@FunnyFany 7 жыл бұрын
*[overeager conspiracy theorist voice]* So NSA did WannaCry. Got it.
@MrBlitzpunk
@MrBlitzpunk 7 жыл бұрын
it had to be russia isnt it?
@seankraus5246
@seankraus5246 7 жыл бұрын
MrBlitzpunk in russa its only a cyber crime if it effects russain computers.
@shoujahatsumetsu
@shoujahatsumetsu 7 жыл бұрын
A few days ago it was North Korea. Today it's Russia.
@piranha031091
@piranha031091 7 жыл бұрын
The "shadow brokers" who leaked EternalBlue (among other hacking tools) are thought to be russian, but no one's quite sure of who actually used it to code WannaCry.
@livinglifeform7974
@livinglifeform7974 7 жыл бұрын
it was da russias!
@miguelzavaleta1911
@miguelzavaleta1911 7 жыл бұрын
MrBlitzpunk Not that weird, to be honest. Russia is a well-known state-sponsor of cybercrime (along with China and NK).
@JarrodCoombes
@JarrodCoombes 7 жыл бұрын
Microsoft actually did release a patch for Windows XP to fix the SMB bug, which kind of surprised all of us in the IT field. But there was a bug in the WannaCry code that actually stopped it from being able to infect XP. Also the theory about the kill switch is that it was put there in order to help the Malware detect if it was in a sand box, which would mean a security researcher was testing it. Their mistake was to not just randomize the domain name it checks (ie random characters with a .com on the end).
@Chidy398
@Chidy398 7 жыл бұрын
I think a lot if not most ppl don't realize most updates you get, java, windows, adobe, etc. are specifically to patch security holes.
@tangchunhat
@tangchunhat 7 жыл бұрын
Nope. Lesson from this story is "Install those Leenuux and never revert to shitty proprietary OS'es again".
@RizkhyDestatama
@RizkhyDestatama 7 жыл бұрын
Tang Nhat you don't know that there are many exploit for linux, just because it doesn't leak meaning it is safe. it's NSA exploit with slight modification. linux run on servers so if that code leaks, surely the black hats will modified that code too.
@tangchunhat
@tangchunhat 7 жыл бұрын
When you wrote "it's NSA exploit" did you mean "it's NSA prebuiltin backdoor"? Because thats what it looks like. Surely linux has exploits, but mostly in third party packages (such as samba).
@tonktruck8053
@tonktruck8053 3 жыл бұрын
My girlfriend ransomware. I wannacry
@Euphytoseful
@Euphytoseful 7 жыл бұрын
"As long as you haven't rebooted your computer", that's very useful.
@nandorbacso4625
@nandorbacso4625 Жыл бұрын
The kill switch was added to check if the malware was run on a simulated network (this is a technique often used in virtual environments by malware analysts to emulate network traffic without actually having to let the malware wander around the internet)
AI Just Changed Everything … Again
18:28
Undecided with Matt Ferrell
Рет қаралды 167 М.
WANNACRY: The World's Largest Ransomware Attack (Documentary)
29:52
The TWS Channel
Рет қаралды 540 М.
Don’t take steroids ! 🙏🙏
00:16
Tibo InShape
Рет қаралды 74 МЛН
How Many ERRORS Can You Fit in a Video?!
20:40
ElectroBOOM
Рет қаралды 436 М.
Light sucking flames look like magic
18:05
Steve Mould
Рет қаралды 863 М.
How One Typo Destroyed Thousands Of Computers | Goggle.com
20:35
NationSquid
Рет қаралды 4,2 МЛН
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 807 М.
Operating System Basics
23:16
Brian Will
Рет қаралды 649 М.
Using AI to Create the Perfect Keyboard
12:05
adumb
Рет қаралды 1,4 МЛН
ILOVEYOU: Earth's Deadliest [Computer] Viruses
22:34
Disrupt
Рет қаралды 6 МЛН
hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters
25:11
Tomorrow Unlocked
Рет қаралды 1,7 МЛН
Myths that Everyone Just Seems to Believe
14:38
Sideprojects
Рет қаралды 76 М.
Visual Guide to Transformer Neural Networks - (Episode 2) Multi-Head & Self-Attention
15:25