NotPetya and Standard User Account

preview_player
Показать описание
Music: Orbital- Omen

This video highlights a form of process elevation by malware which some may not be familiar with.
Рекомендации по теме
Комментарии
Автор

I knew about this. Happened to my wife some time ago. More concerning is Comodo who is holding a webinar saying, among other things, that sandboxing is no longer adequate or safe. If the Comodo sandbox is no longer secure, time to cancel the internet because it's superior to anything else of which I'm aware.

charlesbarone
Автор

Thank you for your excellent presentation. I think your videos are ditactically outstanding and very instructive.
I wonder if it is not useful to deactivate beside the current patches in the Windows registry WMI, SMB1 and PSEXEC?

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ LanmanServer \ Parameters

Dword: SMB1 = 0

Net stop winmgmt

SMB1 is deprecated and is no longer used, WMI and PSEXEC require only administrators.

psychdoc
Автор

Thanks for the video. So will comodo firewall protect with your recommended settings? I've seen dozens of antiransomware reviews and my conclusion seems to point that backup is the only solution against these threats, do you feel the same?

sonixPC
Автор

Hi Cruelsister1, I'm a little confused about what happened but my understanding is that Notpetya, waited until it had the admin rights in order to take full control of the system. Is this what you indicating? If so Petya, just doesn't react in SUA mode is that right. Thanks for the demo.

wilfredotorres
visit shbcf.ru