Yes Ruben that is ok but is used the platform .orion to precisely not be
located and remain anonymous through thor browser with proxy relay.
Any of there attack attemps that we stopped may passed you these links
(think are obsolete now) so you can verify for yourself whether they are
legal or not.
http://sonuh5glplozc2m.tor2web.org/A4113B9D69E5094A
http://sonuh5glplozc2m.onion.to/A4113B9D69E5094A
or via thor:
sonuh5glplozc2m.onion/A4113B9D69E5094A
Follow the instructions of the site and then with the ID:A413B9D69E50F94A
!!!
and good luck with this...
73 de Gabriel YV5KXE
Venezuela AMPR-Coordinator
Message: 9
Date: Sun, 14 May 2017 15:29:41 +0000
From: Ruben ON3RVH <on3rvh(a)on3rvh.be>
To: AMPRNet working group <44net(a)hamradio.ucsd.edu>
Subject: Re: [44net] the current worldwide Windows ransomware
situation
Message-ID: <1B69D7CC-274E-4635-8D90-C162A950A5FF(a)on3rvh.be>
Content-Type: text/plain; charset="us-ascii"
Just a small correction as I don't like to see this kind of misinformation,
but .onion is the Tor network and Tor is not underground.
It's not because criminals like to use it that it is underground.
There are legit sites too within the .onion domain.
Ruben - ON3RVH
On 14 May 2017, at 16:59, Gabriel Medinas
<gmedinas(a)gmail.com> wrote:
(Please trim inclusions from previous messages)
_______________________________________________
Grettings to the group, this Rasomware theme is an evolving project, some
employe just opened an infected email and it was an attack vector on the
internal platform that runs around the LAN via the port 445 SMB protocol
using a security hole that already Microsoft solved two months ago.
Precisely the attackers know that many companies do not update the OS of
their internal pc for issues of licensing and budget that make them
vulnerable, also do not pay much attention to the safety of their
equipment, here was shown how fragile it is the windows platform for these
attacks and is the bulk of the equipment that these large companies have,
such as the case of Telefonica in Spain, FEDEX, hospital networks in
England, etc.
These themes are every day in BBVA Corporation in my IT Security
(Cybersecurity) Venezuela work, see this problem in a important evolution
but it is more to come because they will continue looking for new
possibilities to be able to collect the money with the Bitcoins.
On the question of the domains, those that are in the common Internet
those
> are not relevant, only the important are the .onion underground that they
> use to recolet the extortion money from people-companies through these
> crypto tools attacks.
>
> As Brian says, linux and mac are safe for now...
>
> 73 de Gabriel YV5KXE
> Venezuela AMPR-Coordinator
>
>
> Message: 2
> Date: Sat, 13 May 2017 04:51:33 +0000
> From: R P <ronenp(a)hotmail.com>
> To: AMPRNet working group <44net(a)hamradio.ucsd.edu>
> Subject: Re: [44net] the current worldwide Windows ransomware
> situation
> Message-ID:
> <BY2PR14MB04246C791B6C331478C3B033C7E30@BY2PR14MB0424.
> namprd14.prod.outlook.com>
>
> Content-Type: text/plain; charset="iso-8859-1"
>
> IM not sure that this is the right group but as i wrote before here we
> have top experts in it field so Ill try
>
> I read the explain on the virus in the sites ...
>
> The domain is well known .. someone pay for it
>
> is it so problem to catch the person who paid for this domain ???
>
> what about shutting out this domain and by that stop the spread of the
> software ?
>