It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WannaCry is a PsyOp

page: 1
4
<<   2 >>

log in

join
share:

posted on May, 15 2017 @ 07:49 PM
link   
I don't believe this virus exists. I have a clean Windows XP 64-Bit VM its bridged onto my lan, put the VM's IP in the DMZ and disabled Windows Firewall. I enabled Remote Desktop and File Sharing. Its been running for close to 4 hours nothing yet. I think this a PsyOp to see how people will react to a cyber attack




posted on May, 15 2017 @ 07:56 PM
link   
a reply to: jholt5638

www.microsoft.com/security



posted on May, 15 2017 @ 08:04 PM
link   
a reply to: dfnj2015

Guess I am confused by your reply. Care to explain instead of just posting a URL?



posted on May, 15 2017 @ 08:20 PM
link   
a reply to: jholt5638

A while hat hacker registered the name of a website because he noticed it was a "kill switch".

I think that was Saturday. He found another one too. 2 of 3 are covered now.

With 200 countries and 250,000 odd computers comprised, and MS issuing a patch for Xp... best pay-op ever?




posted on May, 15 2017 @ 08:27 PM
link   
Linux for the win!



posted on May, 15 2017 @ 08:28 PM
link   
a reply to: TEOTWAWKIAIFF

there is suppose to be a variant without the kill switch. That is what I am trying to catch. but I don't see any sign of it



posted on May, 15 2017 @ 09:05 PM
link   
_
edit on 15-5-2017 by dfnj2015 because: (no reason given)



posted on May, 15 2017 @ 09:06 PM
link   
a reply to: jholt5638

You are trying to catch the virus??????



posted on May, 15 2017 @ 09:17 PM
link   
a reply to: dfnj2015

yes I am trying to catch it in a VM. Which hasn't happened yet still clean. For the curious I setup a livestream of the VM on youtube



posted on May, 15 2017 @ 09:20 PM
link   
Well..You are wrong but its okay I know its a requirement on ATS to think everything is a PsyOp.

I mean basically that is like saying "you had unprotected sex and didnt get an STD so STD's are a PsyOp."



posted on May, 15 2017 @ 09:25 PM
link   

originally posted by: jholt5638
I don't believe this virus exists. I have a clean Windows XP 64-Bit VM its bridged onto my lan, put the VM's IP in the DMZ and disabled Windows Firewall. I enabled Remote Desktop and File Sharing. Its been running for close to 4 hours nothing yet. I think this a PsyOp to see how people will react to a cyber attack

WannaCry works via SMB, something your VM is almost certainly not using. It's pretty foolish of you to claim it's a "psyop" when you clearly don't even have a basic understanding of how it works or propagates itself.



posted on May, 15 2017 @ 09:28 PM
link   
a reply to: TEOTWAWKIAIFF

a patch for XP? I thought Microsoft stopped supporting XP a few years ago



posted on May, 15 2017 @ 09:29 PM
link   

originally posted by: Tardacus
a reply to: TEOTWAWKIAIFF

a patch for XP? I thought Microsoft stopped supporting XP a few years ago



They did, but due to the nature of WannaCry and the fact that many potential corporate and industrial targets still run XP, they've issued a patch for it.



posted on May, 15 2017 @ 09:29 PM
link   
Just for the sheer fact its a XP box directly exposed to the Internet It should've contracted something by now. Like back when CodeRed was going around you couldn't bring a fresh install online hell it infected during installation if your NIC was detected and on a direct connection
edit on 5/15/172017 by jholt5638 because: (no reason given)



posted on May, 15 2017 @ 09:34 PM
link   
a reply to: AdmireTheDistance

I have a BA in Computer network administration from a well known 4 year university, and a CompTIA A+ I know how to configure a network and yes it is using SMB I have file sharing enabled and Remote desktop is also enabled the VM is connected to my lan via a virtual bridge. The VM's IP is configured as being in the DMZ. AKA the required ports wannacry looks for are wide open I can confirm this with a online nmap scan. Nmap correctly identifies the OS of VM. This System should be getting screwed from every angle and nothing.
edit on 5/15/172017 by jholt5638 because: (no reason given)

edit on 5/15/172017 by jholt5638 because: (no reason given)



posted on May, 15 2017 @ 09:35 PM
link   

originally posted by: jholt5638
Just for the sheer fact its a XP box directly exposed to the Internet It should've contracted something by now.

No, it shouldn't. That's not how WannaCry works. Again, try to do some research and come to at least a rudimentary understanding of how it propagates.



posted on May, 15 2017 @ 09:40 PM
link   

originally posted by: jholt5638
a reply to: AdmireTheDistance

I have a BA in Computer network administration from a well known 4 year university, and a CompTIA A+ I know how to configure a network and yes it is using SMB I have file sharing enabled and Remote desktop is also enabled the VM is connected to my lan via a virtual bridge. The VM's IP is configured as being in the DMZ. This System getting screwed from every angle and nothing.


Well since you have a BA in Computer Network Admin and your machine hasnt been hit yet then MSFT, the hundreds of thousands of computers in multiple countries and all the companies patching for it must all be part of the PsyOp..

whats your VM weapon of choice? VBOX, ESXi, take your pick....



posted on May, 15 2017 @ 09:41 PM
link   
a reply to: jholt5638

Clyde Lewis is expanding on this on his show as we speak.

Also attributing it to the April 26 hoopla and the NSA. Good listen if you can.



posted on May, 15 2017 @ 09:42 PM
link   
For this I am using VirtualBox but I can switch to KVM or I can download vmware.



posted on May, 15 2017 @ 10:03 PM
link   
a reply to: jholt5638

You do know you have to download it via an attachment (I.E) first to be able to spread it via your network...right?




top topics



 
4
<<   2 >>

log in

join