If they catch the WannaCry culprits

  • Thread starter Thread starter phyzguy
  • Start date Start date
Click For Summary

Discussion Overview

The discussion revolves around the WannaCry ransomware attack, exploring the implications of zero-day exploits, the responsibilities of software vendors, and the potential for government involvement in cybersecurity. Participants reference Asimov's works, draw parallels to historical narratives, and speculate on future cybersecurity measures and policies.

Discussion Character

  • Exploratory
  • Debate/contested
  • Technical explanation
  • Conceptual clarification

Main Points Raised

  • Some participants reference Asimov's "A Perfect Fit" in relation to the punishment of cybercriminals, suggesting a literary foresight into the consequences of such actions.
  • There is speculation about the likelihood of authorities catching the WannaCry perpetrators, with some expressing optimism about ongoing investigations.
  • Concerns are raised about the impact of ransomware on users of pirated software, particularly in regions like China and Russia, and the ethical dilemma of supporting such users to prevent harm.
  • Participants discuss the nature of zero-day exploits, noting that they are not limited to any single platform and pose risks across various technologies.
  • There are frustrations expressed regarding government policies on zero-day exploits, with some arguing that withholding information about vulnerabilities increases risks to critical infrastructure.
  • Some participants propose that the future may see a total lockdown on software updates unless AI can effectively manage malware detection.
  • There is a recurring theme of the cyclical nature of computing paradigms, with discussions on centralization versus decentralization of intelligence in devices.
  • Participants debate the ethics of allowing individuals or governments to "sit on" zero-day exploits, with some advocating for open auctions to manage the sale of such vulnerabilities.
  • Speculation exists about the motivations behind state-sponsored cyberattacks, particularly regarding North Korea, with differing opinions on their strategic value.

Areas of Agreement / Disagreement

Participants express a range of views on the ethical implications of zero-day exploits and the responsibilities of governments and software vendors. There is no clear consensus on whether it should be illegal to withhold zero-day vulnerabilities or on the motivations behind state-sponsored attacks.

Contextual Notes

Participants highlight the complexities surrounding the assessment of zero-day exploits, the implications of government policies, and the potential consequences of cyber warfare, without reaching definitive conclusions.

phyzguy
Science Advisor
Messages
5,305
Reaction score
2,394
Are any of you familiar with Asimov's short story "A Perfect Fit"? I was thinking that if they catch the perpetrators of the WannaCry ransomware attack, Asimov already saw this coming and has their punishment all ready.
 
Computer science news on Phys.org
I'm guessing the heat is on and they will find these guys.
 
It is also most interesting that those most affected are those who run pirated copies of Windows in China and Russia. According to the news, those who have been getting regular updates are immune. Will there be pressure now for software vendors to support pirate copies? Suppose refusing to do so causes deaths? Suppose pirated SW could accidentally launch nuke missiles in NK? It makes a real dilemma.

Zero day exploits, are not limited to Microsoft. Unix, hard drives, routers, NIC cards, and mother boards all have zero day exploits.

The government has a committee that is said to evaluate these zero day exploits to decide whether to conceal/exploit them or to reveal them to the SW vendor for patching. They are said to weigh the offensive value versus defensive risks. How in the world can one make a factual assessment of the max damage an exploit could cause? The mere idea of making such an assessment is preposterous.

I worked many years in SW relating to the security of the power grid and nuclear power. We don't use Microsoft and our critical stuff is air gapped, but we are forced to use the same merchant software and hardware as anybody else in the world. It infuriates me that we might have vulnerabilities in our systems that our government knows about but refuses to reveal so that we could fix them. It infuriates me even more when that same government comes with a pitch for public-private partnerships to improve security. The offensive cyber capabilities of our own government are a major source of risk to the defensive vulnerabilities of our civilian critical infrastructure.
 
  • Like
Likes   Reactions: jedishrfu
The exploitation of zero days is the outcome of countries jockeying for position in the world causing one country to not trust any other. Many countries have cyber war operations and all are seeking the best exploits.

It's so sad that we are balkanizing the openness of the internet in so many ways for so many reasons.

My guess is that eventually we will have a total lockdown on computer updates unless AI technology can somehow identify malware and eliminate it from being downloaded and installed.
 
  • Like
Likes   Reactions: Jamison Lahman
jedishrfu said:
My guess is that eventually we will have a total lockdown on computer updates unless AI technology can somehow identify malware and eliminate it from being downloaded and installed.

For consumer use, that wouldn't be so bad. A laptop with all software in ROM, non-alterable, non-updatable. Discard it when it becomes obsolete. Devices like the Chromebook are halfway there.

If you study The New Hacker's Dictionary, you'll see that we have been going back and forth on that concept for more than 60 years (I forget the term, it was "the cycle of ..." something). Push intelligence out to the perimeter (smart devices) or centralize the smarts and make the devices dumb. In the future, I predict that we will flip-flop and change our ideas on that issue again and again.
 
Yeah I've seen that trend of back and forth. We started with terminals. They got smarter when pcs came out then went back to terminals for X-windows and then back to pcs and now we see a resurgence of Remote Desktop usage and the air gap.
 
jedishrfu said:
The exploitation of zero days is the outcome of countries jockeying for position in the world causing one country to not trust any other. Many countries have cyber war operations and all are seeking the best exploits.

It's so sad that we are balkanizing the openness of the internet in so many ways for so many reasons.
Agreed. When you consider a zero-day exploit as a weapon, it's no wonder why countries invest heavily to stockpile them, though unlike conventional weapons, zero-days are only effective until exposed and patched.
 
  • Like
Likes   Reactions: jedishrfu
stoomart said:
Agreed. When you consider a zero-day exploit as a weapon, it's no wonder why countries invest heavily to stockpile them, though unlike conventional weapons, zero-days are only effective until exposed and patched.

People have already shown methods to automatically reverse engineer exploits FROM patches. This creates an interesting problem about how to distribute patches.
 
  • #10
Its not too bad of a problem if autoupdate is implemented. Machines would get the patch installed sooner than later making reverse engineering less feasible.

Of course that brings up the worry of the updating protocol getting hacked.
 
Last edited:
  • #11
jedishrfu said:
The exploitation of zero days is the outcome of countries jockeying for position in the world causing one country to not trust any other. Many countries have cyber war operations and all are seeking the best exploits.

It's so sad that we are balkanizing the openness of the internet in so many ways for so many reasons.

My guess is that eventually we will have a total lockdown on computer updates unless AI technology can somehow identify malware and eliminate it from being downloaded and installed.
I was right there with you and then you completely lost me haha. Why not just mandate rolling updates for any computer connected to the internet and make it illegal for government institutions to sit on zero-day exploits?
 
  • Like
Likes   Reactions: Routaran
  • #12
Jamison Lahman said:
make it illegal for government institutions to sit on zero-day exploits?
I would love to go further and say make it illegal for anyone to sit on zero days.
 
  • #13
Routaran said:
I would love to go further and say make it illegal for anyone to sit on zero days.
Interesting. I had never thought of that. It is certainly a possibility if you consider them a weapon of sorts. However, I think people should be allowed to sit on zero days for two reasons: one, the more rights the better imo and 2, programmers would no longer have an incentive to find exploits. Some people make a living finding security flaws in codes and they should be able to haggle with the companies to reach an appropriate price so they can patch the exploit.
 
  • #14
Perhaps an open auction for exploits would work where anyone could bid for them.
 
  • #15
jedishrfu said:
Perhaps an open auction for exploits would work where anyone could bid for them.
WHAT!? And get jailed as an "accessory" for selling to the wrong bidder?:olduhh:
 
  • #16
The bidder would get arrested too, right? Problem solved.

The idea is to take out of the Dark Web where this already happens and it allows companies to bid on it to keep it from prying eyes. The seller discovered it and waits until the best respectable bidder comes along but its out in the open where bad guys might fear to tread.

Folks could buy it up and then resell it giving the company an incentive to buy it for good or to change things so that its ineffective.
 
  • #17
I believe it was tracked to North Korea, although I wouldn't be surprised if they hadn't a clue and just blamed them because everyone would believe it.
 
  • #18
The dark web is a strange. Professional hackers can sell their exploits to anyone and mever know who buys it.

State actors like North Korea could easily have found stuff there.
 
  • #19
I don't see how a state actor such as NK has anything to gain from ransomware attacks.
It's just normal robbery as far as I can see, and although my own PC defense dealt with it, an attempted hack appeared to originate from Poland.
 
  • #20
The advantage to NK is added money to their coffers. The international community has shut down a lot of their revenue streams. The money is needed to keep the gifting economy going. This is the way the leaders of NK have maintained their grip on power all these years.

 
  • Like
Likes   Reactions: Jamison Lahman

Similar threads

Replies
35
Views
10K
Replies
8
Views
3K
  • · Replies 15 ·
Replies
15
Views
3K
  • · Replies 12 ·
Replies
12
Views
2K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 14 ·
Replies
14
Views
5K
Replies
10
Views
5K
Replies
4
Views
1K
Replies
14
Views
971
  • · Replies 3 ·
Replies
3
Views
4K