Just a small correction as I don't like to see this kind of misinformation, but .onion
is the Tor network and Tor is not underground.
It's not because criminals like to use it that it is underground.
There are legit sites too within the .onion domain.
Ruben - ON3RVH
> On 14 May 2017, at 16:59, Gabriel Medinas <gmedinas(a)gmail.com> wrote:
>
> (Please trim inclusions from previous messages)
> _______________________________________________
> Grettings to the group, this Rasomware theme is an evolving project, some
> employe just opened an infected email and it was an attack vector on the
> internal platform that runs around the LAN via the port 445 SMB protocol
> using a security hole that already Microsoft solved two months ago.
>
> Precisely the attackers know that many companies do not update the OS of
> their internal pc for issues of licensing and budget that make them
> vulnerable, also do not pay much attention to the safety of their
> equipment, here was shown how fragile it is the windows platform for these
> attacks and is the bulk of the equipment that these large companies have,
> such as the case of Telefonica in Spain, FEDEX, hospital networks in
> England, etc.
>
> These themes are every day in BBVA Corporation in my IT Security
> (Cybersecurity) Venezuela work, see this problem in a important evolution
> but it is more to come because they will continue looking for new
> possibilities to be able to collect the money with the Bitcoins.
>
> On the question of the domains, those that are in the common Internet those
> are not relevant, only the important are the .onion underground that they
> use to recolet the extortion money from people-companies through these
> crypto tools attacks.
>
> As Brian says, linux and mac are safe for now...
>
> 73 de Gabriel YV5KXE
> Venezuela AMPR-Coordinator
>
>
> Message: 2
> Date: Sat, 13 May 2017 04:51:33 +0000
> From: R P <ronenp(a)hotmail.com>
> To: AMPRNet working group <44net(a)hamradio.ucsd.edu>
> Subject: Re: [44net] the current worldwide Windows ransomware
> situation
> Message-ID:
> <BY2PR14MB04246C791B6C331478C3B033C7E30@BY2PR14MB0424.
> namprd14.prod.outlook.com>
>
> Content-Type: text/plain; charset="iso-8859-1"
>
> IM not sure that this is the right group but as i wrote before here we
> have top experts in it field so Ill try
>
> I read the explain on the virus in the sites ...
>
> The domain is well known .. someone pay for it
>
> is it so problem to catch the person who paid for this domain ???
>
> what about shutting out this domain and by that stop the spread of the
> software ?
>